Merge pull request 'Update a lot of the articles to the new design' (#10) from Umbreon/SpywareWatchdog:master into master
Reviewed-on: https://codeberg.org/TheShadow/SpywareWatchdog/pulls/10
|
@ -1,42 +1,60 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<h1>1Password</h1>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
<img src="../images/1pw_logo.png" alt="1password Logo">
|
||||
<p>
|
||||
1password is a password management service
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
|
||||
<p>
|
||||
This article is a stub and sitll needs to be written. If you want to write it, email me so I dont duplicate effort.
|
||||
</p>
|
||||
<p>
|
||||
https://1password.com/legal/privacy/
|
||||
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
|
||||
https://paul.reviews/privacy-password-managers-a-reality-check/
|
||||
</p>
|
||||
<p>
|
||||
>Third-Party Data Processors
|
||||
>Your Secure and Service data are held by third party data processors, who provide us with hosting and other infrastructure services. The locations of these are described above. In many cases (but we cannot promise that this will always be the case) even Service data held by these entities is encrypted with keys held only by us.
|
||||
>Data needed to process payments is collected by our payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy Shield Framework. See https://stripe.com/privacy-shield-policy
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>1Password - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was created on 6/16/2018
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was last edited on 6/16/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
</body>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/1pw_logo.png" alt="1Password Logo" />
|
||||
<h1>1Password</h1>
|
||||
<p>
|
||||
1password is a password management service
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
|
||||
<p>
|
||||
This article is a stub and still needs to be written. If you want to
|
||||
write it, email me so I dont duplicate effort.
|
||||
https://1password.com/legal/privacy/
|
||||
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
|
||||
https://paul.reviews/privacy-password-managers-a-reality-check/
|
||||
>Third-Party Data Processors >Your Secure and Service data are held by
|
||||
third party data processors, who provide us with hosting and other
|
||||
infrastructure services. The locations of these are described above.
|
||||
In many cases (but we cannot promise that this will always be the
|
||||
case) even Service data held by these entities is encrypted with keys
|
||||
held only by us. >Data needed to process payments is collected by our
|
||||
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
|
||||
Shield Framework. See https://stripe.com/privacy-shield-policy
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<b>This article was created on 6/16/2018</b><br />
|
||||
<b>This article was last edited on 6/16/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,68 +1,144 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Spyware Watchdog</title>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>AMD - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<h1>AMD CPU Family</h1>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
<img src="../images/amd_logo.png" alt="One of the logos AMD uses for its CPU's">
|
||||
<h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1>
|
||||
<p>
|
||||
Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the
|
||||
article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this
|
||||
article.
|
||||
</p>
|
||||
<p>
|
||||
Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O.
|
||||
<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
This article isn't complete. This is a work-in-progress and so this article is not formatted properly..
|
||||
</p>
|
||||
<p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p>
|
||||
<p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p>
|
||||
<p>Possible uses … DRM</p>
|
||||
<p>
|
||||
Researchers have already been able to identify exploits in AMD’s Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSP’s TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
|
||||
</p>
|
||||
<hr>
|
||||
<p>Please note that Family 16h and
|
||||
|
||||
Family 15h-Models60h and later contain a PSP</p>
|
||||
<h2><font color=red>NOT TRUSTED:</font></h2>
|
||||
<ul>
|
||||
<li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6)
|
||||
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li>
|
||||
<li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li>
|
||||
<li>All Zen based CPUs (17h family)</li>
|
||||
</ul>
|
||||
<h2><font color=yellow>POTENTIALLY TRUSTED:</font></h2>
|
||||
<ul>
|
||||
<li>Jaguar (the only 16h family CPU that does NOT have PSP): http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip (page 8) https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar</li>
|
||||
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li>
|
||||
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li>
|
||||
</ul>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">AMD Security and Server innovation</a>
|
||||
<a href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">[web.archive.org]</a>
|
||||
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 1/10/2019
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<h1>
|
||||
<span class="red">UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</span>
|
||||
</h1>
|
||||
<img src="../images/amd_logo.png" alt="amd Logo" />
|
||||
<h1>AMD CPU Family</h1>
|
||||
<p>
|
||||
This part of the article should have the name of the program and what
|
||||
it does, and who develops it.
|
||||
</p>
|
||||
<p>
|
||||
Advanced Micro Devices, Inc. is an American multinational
|
||||
semiconductor company based in Santa Clara, California, that develops
|
||||
computer processors and related technologies for business and consumer
|
||||
markets. This article is specifically about the CPU's that are
|
||||
produced by AMD and nothing else. The logo is one of many logos used
|
||||
by AMD, but the article is not about any one specific CPU.
|
||||
<b>No rating is given</b> because this is not an article about any
|
||||
specific product, and the rating system is difficult to fit into this
|
||||
article.
|
||||
</p>
|
||||
<p>
|
||||
Modern CPU models produced by AMD contain an embedded ARM co-processor
|
||||
called the Platform Security Processor (PSP). Nearly all AMD CPU's
|
||||
produced since 2013 operate under the supervision of this separate,
|
||||
more privileged, environment consisting of an integrated ARM processor
|
||||
with access to isolated resources as well as main system memory and
|
||||
I/O.
|
||||
<sup><a href="#s1">[1]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
This article isn't complete. This is a work-in-progress and so this
|
||||
article is not formatted properly..
|
||||
</p>
|
||||
<p>
|
||||
http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
|
||||
(page 11)
|
||||
</p>
|
||||
<p>
|
||||
While ARM and AMD tout the “Trusted Execution Environment” as useful
|
||||
for secure payment, anti-theft and malware protection, they also
|
||||
discuss content protection or DRM as a use case.
|
||||
https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
|
||||
</p>
|
||||
<p>Possible uses … DRM</p>
|
||||
<p>
|
||||
Researchers have already been able to identify exploits in AMD’s
|
||||
Platform Security Processor. In 2018 researchers published a
|
||||
vulnerability in which a specially crafted certificate could lead to a
|
||||
stack overflow in the PSP’s TPM firmware allowing for remote code
|
||||
execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
|
||||
group goes on to detail how an attacker might leverage exploits
|
||||
RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
|
||||
systems.
|
||||
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
|
||||
</p>
|
||||
<hr/>
|
||||
<p>
|
||||
Please note that Family 16h and Family 15h-Models60h and later contain
|
||||
a PSP
|
||||
</p>
|
||||
<h2><font color="red">NOT TRUSTED:</font></h2>
|
||||
<ul>
|
||||
<li>
|
||||
Kaveri (Steamroller “BDv3”)
|
||||
https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
|
||||
(page 6)
|
||||
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
|
||||
</li>
|
||||
<li>
|
||||
Carrizo/Bristol Ridge (Excavator “BDv4”)
|
||||
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
|
||||
</li>
|
||||
<li>All Zen based CPUs (17h family)</li>
|
||||
</ul>
|
||||
<h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
|
||||
<ul>
|
||||
<li>
|
||||
Jaguar (the only 16h family CPU that does NOT have PSP):
|
||||
http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
|
||||
(page 8)
|
||||
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
|
||||
</li>
|
||||
<li>
|
||||
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
|
||||
</li>
|
||||
<li>
|
||||
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a
|
||||
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
|
||||
>AMD Security and Server innovation</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 1/10/2019</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
|
||||
><img class="icon" src="../images/cc0.png" alt="CC0 License"
|
||||
/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -1,91 +1,171 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Bing - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/bing_logo.png" alt="Bing logo">
|
||||
<h1>Bing</h1>
|
||||
<p>
|
||||
Bing is a search engine created and owned by Microsoft.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Bing is yet another spyware search engine that collects your information and sells it to advertisers. It's strongly recommended that you
|
||||
do not use Bing.
|
||||
</p>
|
||||
<p>
|
||||
At some point Bing had a privacy policy, but Microsoft doesnt seem to be hosting it anymore. So, this article will look at the
|
||||
Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup> to help us understand what information Bing collects.
|
||||
Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand
|
||||
in great detail what kind of information one single program could be collecting. (although this policy is more specific)
|
||||
</p>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>Bing - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<h3>Bing collects your search history</h3>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/bing_logo.png" alt="Bing Logo" />
|
||||
<h1>Bing</h1>
|
||||
<p>
|
||||
This part of the article should have the name of the program and what
|
||||
it does, and who develops it.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Bing is yet another spyware search engine that collects your
|
||||
information and sells it to advertisers. It's strongly recommended
|
||||
that you do not use Bing.
|
||||
</p>
|
||||
<p>
|
||||
At some point Bing had a privacy policy, but Microsoft doesnt seem to
|
||||
be hosting it anymore. So, this article will look at the Microsoft
|
||||
Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us
|
||||
understand what information Bing collects. Similarly to the privacy
|
||||
policies of Google and Apple, the Microsoft privacy statement eclipses
|
||||
the entire spyware platform and does not help you understand in great
|
||||
detail what kind of information one single program could be
|
||||
collecting. (although this policy is more specific)
|
||||
</p>
|
||||
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
|
||||
<h3>Bing collects your search history</h3>
|
||||
|
||||
<p><i>
|
||||
"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described
|
||||
below...You provide some of this data directly, such as when you...submit a search query to Bing"
|
||||
</i></p>
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
|
||||
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your:
|
||||
<i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as
|
||||
picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p>
|
||||
<p>
|
||||
<i>
|
||||
"Microsoft collects data from you, through our interactions with you
|
||||
and through our products for a variety of purposes described
|
||||
below...You provide some of this data directly, such as when
|
||||
you...submit a search query to Bing"
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information
|
||||
in a process that takes 18 months to complete.<p>
|
||||
<p>
|
||||
Later in the Interactions -> Device and usage data section of this
|
||||
statement, it is clarified again that Microsoft collects your:
|
||||
<i>"Browse History. Data about the web pages you visit."</i>, as well
|
||||
as your:
|
||||
<i
|
||||
>"Images. Images and related information, such as picture metadata.
|
||||
For example, we collect the image you provide when you use a Bing
|
||||
image-enabled service."</i
|
||||
>
|
||||
</p>
|
||||
|
||||
<p><i>
|
||||
"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify
|
||||
stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. "
|
||||
</i></p>
|
||||
<p>
|
||||
Microsoft claims to store this information for an unlimited amount of
|
||||
time, but it claims that it will eventually anonymize this information
|
||||
in a process that takes 18 months to complete.
|
||||
</p>
|
||||
<p></p>
|
||||
|
||||
<h3>Bing uses your search history to profile you for advertising</h3>
|
||||
<p>
|
||||
<i>
|
||||
"Has Microsoft adopted and announced a specific retention period for
|
||||
a certain data type? For example, for Bing search queries, we
|
||||
de-identify stored queries by removing the entirety of the IP
|
||||
address after 6 months, and cookie IDs and other cross-session
|
||||
identifiers after 18 months. "
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
|
||||
<p><i>
|
||||
"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."
|
||||
</i></p>
|
||||
<p>
|
||||
So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for
|
||||
advertising. And of course, this is confirmed in this section:
|
||||
</p>
|
||||
<h3>Bing uses your search history to profile you for advertising</h3>
|
||||
|
||||
<p><i>
|
||||
"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how
|
||||
you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements
|
||||
about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle."
|
||||
</i></p>
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"Microsoft may use data we collect to select and deliver some of the
|
||||
ads you see on Microsoft web properties, such as Microsoft.com, MSN
|
||||
and Bing."
|
||||
</i>
|
||||
</p>
|
||||
<p>
|
||||
So since your search history is part of the "data we collect", the
|
||||
natrual conclusion is that, your search queiries are being used to
|
||||
profile you for advertising. And of course, this is confirmed in this
|
||||
section:
|
||||
</p>
|
||||
|
||||
<h3>Bing sells your search history to other spyware platforms</h3>
|
||||
<p>
|
||||
<i>
|
||||
"The ads that you see may be selected based on data we process about
|
||||
you, such as your interests and favorites, your location, your
|
||||
transactions, how you use our products,
|
||||
<b>
|
||||
<font color="red"> your search queries </font>
|
||||
</b>
|
||||
, or the content you view. For example, if you view content on MSN
|
||||
about automobiles, we may show advertisements about cars; if you
|
||||
search “pizza places in Seattle” on Bing, you may see advertisements
|
||||
in your search results for restaurants in Seattle."
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
|
||||
<p><i>
|
||||
"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products,
|
||||
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. "
|
||||
</i></p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a>
|
||||
<a href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement">[web.archive.org]</a>
|
||||
<a href="https://archive.li/u7eZJ">[archive.li]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 5/30/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</body>
|
||||
</html>
|
||||
<h3>Bing sells your search history to other spyware platforms</h3>
|
||||
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"We may share data we collect with third parties, such as Oath,
|
||||
AppNexus, or Facebook (see below), so that the ads you see in our
|
||||
products, their products, or other sites and apps serviced by these
|
||||
partners are more relevant and valuable to you. "
|
||||
</i>
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://privacy.microsoft.com/en-us/privacystatement"
|
||||
>Microsoft Privacy Statement</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/u7eZJ">[archive.li]</a><br />
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 5/30/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,125 +1,306 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>Outdated Brave - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<img src="../images/brave_logo.png" alt="Brave logo">
|
||||
<h1>Brave Browser</h1>
|
||||
<h3><font color=red>Note: This article is outdated. I will try to update it soon. </font></h3>
|
||||
<br>
|
||||
<p>
|
||||
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup> With the built-in privacy protections, some would seem to agree with that. Let's see how it stacks up when we take everything into account.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=orange>High</font></h2>
|
||||
<p>
|
||||
Auto-updates that can be turned off only by hacky workarounds. <a href="../articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="../articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are.
|
||||
</p>
|
||||
<h3>Whitelisting spyware from Facebook and Twitter</h3>
|
||||
<p>
|
||||
On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. It’s our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware
|
||||
scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of
|
||||
it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about
|
||||
supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation:
|
||||
</p>
|
||||
<p><i>
|
||||
"Loading a script from an edge-cache does not track a user without third-party cookies or equivalent browser-local storage, which Brave always blocks and always will block. In other words, sending requests and receiving responses without cookies or other means of identifying users does not necessarily create a tracking threat."
|
||||
</i><sup><a href="#7">[7]</a></sup></p>
|
||||
<p>
|
||||
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit right now, to see just how much information a JavaScript program designed to track you can get.
|
||||
</p>
|
||||
<center>
|
||||
<p>
|
||||
Here are a few:
|
||||
<br>
|
||||
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br>
|
||||
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a><br>
|
||||
</center>
|
||||
</p>
|
||||
<h3>Auto-updates</h3>
|
||||
<p>
|
||||
Brave will check for updates every time you run it, and you CANNOT turn it off (except through fiddling with DNS and such) ! What is the devs' answer? From their GitHub page<sup><a href="#2">[2]</a></sup>: </p>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/brave_logo.png" alt="Brave Logo" />
|
||||
<h1>Brave</h1>
|
||||
<h2>
|
||||
<font color="red"
|
||||
>Note: This article is outdated. I will try to update it soon.
|
||||
</font>
|
||||
</h2>
|
||||
<p>
|
||||
Brave Browser is a Chromium fork with many interesting features not
|
||||
found elsewhere, such as built-in Adblock and other extensions,
|
||||
fingerprinting protection, cleaner Preferences menu than other Chrome
|
||||
forks, and the (opt-in) ability to automatically support (pay) the
|
||||
websites you visit. The developers describe it as
|
||||
<i>"A browser with your interests at heart."</i
|
||||
><sup><a href="#s1">[1]</a></sup> With the built-in privacy
|
||||
protections, some would seem to agree with that. Let's see how it
|
||||
stacks up when we take everything into account.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="orange">High</span></h2>
|
||||
<p>
|
||||
Auto-updates that can be turned off only by hacky workarounds.
|
||||
<a href="../articles/google.html">Google</a> as default search engine.
|
||||
Analytics on Brave's home page. Two other requests made at each start
|
||||
of Brave. Whitelisting spyware from Facebook and Twitter.<sup
|
||||
><a href="#s5">[5]</a></sup
|
||||
>
|
||||
Has some decent privacy protections built in, but uMatrix is still
|
||||
better. Some privacy features are there by default, but, it's still
|
||||
trying to work with advertisers (same as Mozilla did with their
|
||||
Sponsored Tiles). Despite claiming to be
|
||||
<i>"A browser with your interests at heart."</i
|
||||
><sup><a href="#s1">[1]</a></sup
|
||||
>, it has <a href="../articles/google.html">Google</a> as default
|
||||
search engine, as well as shitty forced updates. Anyway, despite the
|
||||
privacy protections, you should stay away from this browser - it seems
|
||||
to have a "mission" to switch the internet to its version of
|
||||
"user-respecting" ads, (we know how that turned out for Mozilla), and
|
||||
that's slimy and suspicious. Beyond that it has repeatedly shown
|
||||
itself to be dishonest and disingenuous about what it's mission and
|
||||
goals and operations are.
|
||||
</p>
|
||||
<h3>Whitelisting spyware from Facebook and Twitter</h3>
|
||||
<p>
|
||||
On it's website, Brave claims that
|
||||
<i
|
||||
>"Brave fights malware and prevents tracking, keeping your
|
||||
information safe and secure. It’s our top priority."</i
|
||||
><sup><a href="#s6">[6]</a></sup
|
||||
>. Yet despite this claim, Brave actually
|
||||
<b><font color="red">disables</font></b> its tracking protections for
|
||||
Facebook and Twitter's spyware scripts that allow them to track people
|
||||
across the web.<sup><a href="#s5">[5]</a></sup> Brave's spyware
|
||||
protections, and any claims that it makes to work in the interests of
|
||||
it's users,
|
||||
<b><font color="orange">cannot be taken seriously.</font></b> Brave is
|
||||
actively working
|
||||
<b><font color="red">against its users</font></b> while lying to them
|
||||
about supposed privacy protections that it offers. This problem
|
||||
becomes even more serious when you take into account Brave's response
|
||||
to this situation:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"Loading a script from an edge-cache does not track a user without
|
||||
third-party cookies or equivalent browser-local storage, which Brave
|
||||
always blocks and always will block. In other words, sending
|
||||
requests and receiving responses without cookies or other means of
|
||||
identifying users does not necessarily create a tracking threat."
|
||||
</i>
|
||||
<sup>
|
||||
<a href="#s7">[7]</a>
|
||||
</sup>
|
||||
</p>
|
||||
<p>
|
||||
This statement is just,
|
||||
<b>
|
||||
<font color="red">completely wrong</font>
|
||||
</b>
|
||||
. Just because a website isn't able to store cookies, does not mean
|
||||
that it cannot uniquely identify you. Executing JavaScript spyware
|
||||
from Facebook and Twitter is
|
||||
<b>
|
||||
more than enough.
|
||||
</b>
|
||||
Blocking cookies is not going to stop them from tracking you. This
|
||||
isn't even information that is difficult to verify. There are many
|
||||
websites that you can visit right now, to see just how much
|
||||
information a JavaScript program designed to track you can get.
|
||||
</p>
|
||||
<center>
|
||||
<p>
|
||||
Here are a few:
|
||||
<br />
|
||||
<a href="https://browserleaks.com/">https://browserleaks.com/</a>
|
||||
<br />
|
||||
<a href="https://panopticlick.eff.org/"
|
||||
>https://panopticlick.eff.org/</a
|
||||
>
|
||||
<br />
|
||||
</p>
|
||||
</center>
|
||||
<h3>Auto-updates</h3>
|
||||
<p>
|
||||
Brave will check for updates every time you run it, and you CANNOT
|
||||
turn it off (except through fiddling with DNS and such) ! What is the
|
||||
devs' answer? From their GitHub page
|
||||
<sup><a href="#s2">[2]</a></sup
|
||||
>:
|
||||
</p>
|
||||
|
||||
<p><i>"We don't plan on adding in UI to disable updates, but users can easily adjust environment variables if they really want to put themselves at risk."</i></p>
|
||||
<p>
|
||||
<i>
|
||||
"We don't plan on adding in UI to disable updates, but users can
|
||||
easily adjust environment variables if they really want to put
|
||||
themselves at risk."
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<p>and</p>
|
||||
<p>and</p>
|
||||
|
||||
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p>
|
||||
<p>
|
||||
<i>
|
||||
"i feel that being able to figure out how to do this is a
|
||||
sufficiently high bar for users who want to turn off autoupdating
|
||||
(to prove they know what they're doing and understand the security
|
||||
implications)"
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. Extensions are also updated often. <img class="screenshot" src="../images/brave_partners.png">
|
||||
</p>
|
||||
<p>
|
||||
So according to the devs, you have to hunt down random internet
|
||||
comments to be able to disable auto-updating. Brave will also update
|
||||
what looks like the list of its "partners" every time you run it.
|
||||
Extensions are also updated often.
|
||||
<img class="screenshot" src="../images/brave_partners.png" />
|
||||
</p>
|
||||
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>
|
||||
<a href="../articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all.
|
||||
</p>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>
|
||||
<a href="../articles/google.html">Google</a>
|
||||
is the default search engine of Brave, and the issues with it are well
|
||||
known and would take a book to describe them all.
|
||||
</p>
|
||||
|
||||
<h3>Brave's start page contains analytics</h3>
|
||||
<p>
|
||||
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img class="screenshot" src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page.
|
||||
</p>
|
||||
<h3>Crash reports</h3>
|
||||
<p>Enabled by default, but can be disabled from the preferences menu.</p>
|
||||
<h3>Other requests</h3>
|
||||
<p>Brave will make a connection to this site every time it is started up: <img class="screenshot" src="../images/brave_bat.png"> It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request which downloads the rulesets for HTTPS Everywhere: <img class="screenshot" src="../images/brave_httpse.png"></p>
|
||||
<h3>Brave's privacy protections</h3>
|
||||
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works).
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Credits</h2>
|
||||
<p>
|
||||
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Formatting changes were done by the site maintainer.
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://brave.com">Brave's website</a>
|
||||
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a>
|
||||
<br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://github.com/brave/browser-laptop/issues/1877">How to stop autoupdate of brave?</a>
|
||||
<a href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877">[web.archive.org]</a>
|
||||
<a href="https://archive.li/AJZr5">[archive.li]</a><br>
|
||||
<a name="3">3.</a>
|
||||
<a href="https://basicattentiontoken.org">Basic Attention Token</a>
|
||||
<a href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org">[web.archive.org]</a>
|
||||
<a href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org">[wayback.archive-it.org]</a><br>
|
||||
<a name="4">4.</a>
|
||||
<a href="https://laptop-updates.brave.com/promo/custom-headers">Laptop Headers</a>
|
||||
<a href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/ecx6L">[archive.fo]</a><br>
|
||||
<a name="5">5.</a>
|
||||
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a>
|
||||
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/X98Xz">[archive.fo]</a><br>
|
||||
|
||||
<a name="6">6.</a>
|
||||
<a href="https://brave.com/features/">Brave Browser Features</a>
|
||||
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br>
|
||||
|
||||
<a name="7">7.</a>
|
||||
<a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a>
|
||||
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a>
|
||||
<a href="http://archive.fo/Qopen">[archive.fo]</a><br>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 2/13/2019
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was created on 5/7/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<h3>Brave's start page contains analytics</h3>
|
||||
<p>
|
||||
Brave will connect to its home page, https://brave.com, automatically
|
||||
on the first run of Brave, and that page contains Piwik's analytics
|
||||
scripts. This is the full request:
|
||||
<img class="screenshot" src="../images/brave_piwik.png" />
|
||||
It will also make a connection to Google to download some fonts. You
|
||||
can disable these on subsequent runs by changing the start page.
|
||||
</p>
|
||||
<h3>Crash reports</h3>
|
||||
<p>
|
||||
Enabled by default, but can be disabled from the preferences menu.
|
||||
</p>
|
||||
<h3>Other requests</h3>
|
||||
<p>
|
||||
Brave will make a connection to this site every time it is started up:
|
||||
<img class="screenshot" src="../images/brave_bat.png" />
|
||||
It probably has something to do with their project of working with
|
||||
advertisers to provide more relevant targeted ads, which sounds pretty
|
||||
disgusting, but can be turned off ("Notify me about token
|
||||
promotions"). You can read more about it here
|
||||
<sup><a href="#s3">[3]</a></sup>
|
||||
.It will also make this request which downloads the rulesets for HTTPS
|
||||
Everywhere:
|
||||
<img class="screenshot" src="../images/brave_httpse.png" />
|
||||
</p>
|
||||
<h3>Brave's privacy protections</h3>
|
||||
<p>
|
||||
Brave Browser also contains in-built privacy protections such as HTTPS
|
||||
Everywhere, AdBlock, cookie blocking, script blocking, and
|
||||
fingerprinting protections - that are configurable site by site. This
|
||||
is commendable of course, but in the end, uMatrix outclasses them.
|
||||
Trackers, for example, easily avoid pure AdBlock (so you will be
|
||||
tracked by Facebook and such), and binary script blocking breaks
|
||||
sites. Nice effort on Brave's part though, and the fingerprinting
|
||||
protection I don't think is found in any other browser (but I didn't
|
||||
confirm if it actually works).
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div>
|
||||
<h4>Credits</h4>
|
||||
<ol>
|
||||
This article was written by
|
||||
<a href="https://digdeeper.neocities.org/"
|
||||
>digdeeper.neocities.org</a
|
||||
><br />
|
||||
Formatting changes were done by the site maintainer.
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://brave.com">Brave's website</a>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180609070708/https://brave.com"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://github.com/brave/browser-laptop/issues/1877"
|
||||
>How to stop autoupdate of brave?</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/AJZr5">[archive.li]</a>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="https://basicattentiontoken.org"
|
||||
>Basic Attention Token</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org"
|
||||
>[wayback.archive-it.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s4">
|
||||
<a href="https://laptop-updates.brave.com/promo/custom-headers"
|
||||
>Laptop Headers</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.fo/ecx6L">[archive.fo]</a>
|
||||
</li>
|
||||
<li id="s5">
|
||||
<a
|
||||
href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
|
||||
>Facebook, Twitter Trackers Whitelisted by Brave Browser</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.fo/X98Xz">[archive.fo]</a>
|
||||
</li>
|
||||
<li id="s6">
|
||||
<a href="https://brave.com/features/">Brave Browser Features</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20190124134301/https://brave.com/features/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s7">
|
||||
<a href="https://brave.com/script-blocking-exceptions-update/"
|
||||
>Script Blocking Exceptions Update</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="http://archive.fo/Qopen">[archive.fo]</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was created on 5/7/2018</b><br />
|
||||
<b>This article was last edited on 2/13/2019</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
|
||||
><img class="icon" src="../images/cc0.png" alt="CC0 License"
|
||||
/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
</html>
|
||||
|
|
|
@ -1,142 +1,302 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Comparison between web browsers - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<center>
|
||||
<h1>Comparison between web browsers</h1>
|
||||
<p>
|
||||
This purpose of this article is not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the
|
||||
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how
|
||||
much privacy can be gained by configuring it.
|
||||
</p>
|
||||
<h2><font color=lime>Top Tier - Best Privacy</font></h2>
|
||||
<p>
|
||||
These are all browsers that require a minimal amount of configuration and can achive the required level of privacy needed to browse the modern web- compatibility with a
|
||||
comperhensive suite of content-blocking extensions that can block spyware providers correctly and fully. Iridium and Pale Moon both are configured in a way that leaks
|
||||
user information and thus require additional configuration.
|
||||
</p>
|
||||
<table>
|
||||
<tr>
|
||||
<td><center><img src="../images/tor_logo.png" alt="TOR Logo"></center></td>
|
||||
<td><center><img src="../images/icecat_logo.png" alt="GNU IceCat Logo"></center></td>
|
||||
<td><center><img src="../images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td>
|
||||
<td><center><img src="../images/iridium_logo.jpg" alt="Iridium Logo"></center></td>
|
||||
<td><center><img src="../images/palemoon_logo.png" alt="Pale Moon Logo"></center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center><b><a href="../articles/tor.html">TOR Browser</a></b></center></td>
|
||||
<td><center><b><a href="../articles/icecat.html">GNU IceCat</a></b></center></td>
|
||||
<td><center><b><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td>
|
||||
<td><center><b><a href="../articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td>
|
||||
<td><center><b><a href="../articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td>
|
||||
</tr>
|
||||
</table>
|
||||
<h2><font color=lime>High Tier - Good Privacy</font></h2>
|
||||
<p>
|
||||
These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and
|
||||
do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer.
|
||||
</p>
|
||||
<table>
|
||||
<tr>
|
||||
<td><center><img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td>
|
||||
<td><center><img src="../images/falkon_logo.png" alt="Falkon Logo"></center></td>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>Comparison between web browsers - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
|
||||
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center><b><a href="../articles/otter.html">Otter Browser</a></b></center></td>
|
||||
<td><center><b><a href="../articles/falkon.html">Falkon</a></b></center></td>
|
||||
|
||||
|
||||
|
||||
</tr>
|
||||
</table>
|
||||
<h2><font color=yellow>Mid Tier - Ok Privacy</font></h2>
|
||||
<p>
|
||||
These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't
|
||||
have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers.
|
||||
</p>
|
||||
<table>
|
||||
<tr>
|
||||
|
||||
<td><center><img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td>
|
||||
<td><center><img src="../images/sphere_logo.png" alt="SphereLogo"></center></td>
|
||||
|
||||
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center><b><a href="../articles/qutebrowser.html">Qutebrowser</a></b></center></td>
|
||||
<td><center><b><a href="../articles/sphere.html">Sphere Browser</a></b></center></td>
|
||||
|
||||
</tr>
|
||||
</table>
|
||||
<h2><font color=orange>Low Tier - Poor Privacy</font></h2>
|
||||
<p>
|
||||
These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general.
|
||||
Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point
|
||||
where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy
|
||||
<b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys
|
||||
going to be better to pick a browser higher on this list.
|
||||
<table>
|
||||
<tr>
|
||||
<td><center><img src="../images/waterfox logo.png" alt="Waterfox Logo"></center></td>
|
||||
<td><img src="../images/brave_logo.png" alt="Brave logo"></td>
|
||||
<td><img src="../images/firefox_logo.png" alt="firefox Logo"></td>
|
||||
<td><img src="../images/vivaldi_logo.png" alt="vivaldi Logo"></td>
|
||||
<td><img src="../images/dissenter_logo.png" alt="Dissenter Logo"></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center><b><a href="../articles/waterfox.html">Waterfox</a></b></center></td>
|
||||
<td><center><b><a href="../articles/brave.html">Brave</a></b></center></td>
|
||||
<td><center><b><a href="../articles/firefox.html">Firefox</a></b></center></td>
|
||||
<td><center><b><a href="../articles/vivaldi.html">Vivaldi</a></b></center></td>
|
||||
<td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td>
|
||||
</tr>
|
||||
</table>
|
||||
<h2><font color=red>Rock Bottom - No Privacy</font></h2>
|
||||
<p>
|
||||
These browsers are unashamedly designed to collect as much information about the user as possible (all are rated EXTREMELY HIGH by the site). Only SRWare Iron has it's source code availible, and all the developers have mistreated their users (complete disregard for privacy and / or false advertising) for a long time. These browsers are actively hostile against their users and thus should not be used at all.
|
||||
</p>
|
||||
<table>
|
||||
<tr>
|
||||
<td> <img src="../images/chrome_logo.png" alt="chrome logo"></td>
|
||||
<td> <img src="../images/opera_logo.png" alt="opera logo"></td>
|
||||
<td> <img src="../images/slimjet_logo.png" alt="SlimJet logo"></td>
|
||||
<td> <img src="../images/webdiscover_logo.png" alt="WebDiscover logo"></td>
|
||||
<td> <img src="../images/srware_logo.png" alt="Iron logo"></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center><b><a href="../articles/chrome.html">Google Chrome</a></b></center></td>
|
||||
<td><center><b><a href="../articles/opera.html">Opera</a></b></center></td>
|
||||
<td><center><b><a href="../articles/slimjet.html">SlimJet</a></b></center></td>
|
||||
<td><center><b><a href="../articles/webdiscover.html">WebDiscover</a></b></center></td>
|
||||
<td><center><b><a href="../articles/iron.html">SRWare Iron</a></b></center></td>
|
||||
|
||||
</tr>
|
||||
</table>
|
||||
<hr>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people,
|
||||
with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide
|
||||
to make your decision, so, you should probably read a few more, these are some good ones.
|
||||
</p>
|
||||
<a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper - How to choose a browser for everyday use?</a><br>
|
||||
<a href="https://clarkycat.neocities.org/browser.html">Clarkycat - Browser Recommendation and Addons</a><br>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 2/20/2019
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</body>
|
||||
</html>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<h1>Comparison between web browsers</h1>
|
||||
<p>
|
||||
This purpose of this article is not to rate each web browser in a
|
||||
vaccum, like articles on this website that focus on one specific web
|
||||
browser, but rather to compare all of the web browsers that have been
|
||||
rated on this website against each other. This is a ranking that is
|
||||
based on how much Pirvacy a browser offers by default, as well as, how
|
||||
much privacy can be gained by configuring it.
|
||||
</p>
|
||||
<h2><span class="lime">Top Tier - Best Privacy</span></h2>
|
||||
<p>
|
||||
These are all browsers that require a minimal amount of configuration
|
||||
and can achive the required level of privacy needed to browse the
|
||||
modern web- compatibility with a comperhensive suite of
|
||||
content-blocking extensions that can block spyware providers correctly
|
||||
and fully. Iridium and Pale Moon both are configured in a way that
|
||||
leaks user information and thus require additional configuration.
|
||||
</p>
|
||||
<table>
|
||||
<center>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td>
|
||||
<img src="../images/tor_browser_logo.png" alt="TOR Logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/icecat_logo.png" alt="GNU IceCat Logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img
|
||||
src="../images/chromium_logo.png"
|
||||
alt="Ungoogled Chromium Logo"
|
||||
/>
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/iridium_logo.png" alt="Iridium Logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/palemoon_logo.png" alt="Pale Moon Logo" />
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<b><a href="../articles/tor.html">TOR Browser</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/icecat.html">GNU IceCat</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b
|
||||
><a href="../articles/ungoogled_chromium.html"
|
||||
>Ungoogled Chromium</a
|
||||
></b
|
||||
>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/iridium.html">Iridium Browser</a></b
|
||||
><br /><small
|
||||
><a href="../guides/iridium.html"
|
||||
>Configuration Guide</a
|
||||
></small
|
||||
>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/palemoon.html">Pale Moon</a></b
|
||||
><br /><small
|
||||
><a href="../guides/palemoon.html"
|
||||
>Configuration Guide</a
|
||||
></small
|
||||
>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</center>
|
||||
</table>
|
||||
<h2><span class="lime">High Tier - Good Privacy</span></h2>
|
||||
<p>
|
||||
These browsers do not have privacy issues, but they also do not have
|
||||
enough privacy features to make it to the highest tier. These browsers
|
||||
both have simple ad-blockers, and do not have any privacy issues,
|
||||
however, these tools are not as good as the comperhensive privacy
|
||||
tools that Top Tier browsers offer.
|
||||
</p>
|
||||
<table>
|
||||
<center>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td>
|
||||
<img
|
||||
src="../images/otter_browser_logo.png"
|
||||
alt="Otter Browser Logo"
|
||||
/>
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/falkon_logo.png" alt="Falkon Logo" />
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<b><a href="../articles/otter.html">Otter Browser</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/falkon.html">Falkon</a></b>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</center>
|
||||
</table>
|
||||
<h2><span class="yellow">Mid Tier - Ok Privacy</span></h2>
|
||||
<p>
|
||||
These browsers do not have any big privacy flaws, but they also do not
|
||||
have sufficent privacy protections. Qutebrowser has a very basic
|
||||
adblocker in it. Both browsers don't have access to extensions either.
|
||||
So, it's just not enough to be able to browse the modern web
|
||||
privately, despite the developers not putting spyware into their
|
||||
browsers.
|
||||
</p>
|
||||
<table>
|
||||
<center>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td>
|
||||
<img
|
||||
src="../images/qutebrowser_logo.png"
|
||||
alt="Qutebrowser Logo"
|
||||
/>
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/sphere_logo.png" alt="SphereLogo" />
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<b><a href="../articles/qutebrowser.html">Qutebrowser</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/sphere.html">Sphere Browser</a></b>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</center>
|
||||
</table>
|
||||
<h2><span class="orange">Low Tier - Poor Privacy</span></h2>
|
||||
<p>
|
||||
These browsers do not protect your privacy, but they are not in the
|
||||
lowest tier since they still have something to offer, although, they
|
||||
should not be used in general. Vivaldi does not let you disable all of
|
||||
the spyware features, Brave whitelists trackers and has forced
|
||||
updates, and Firefox and Waterfox are loaded with spyware, to the
|
||||
point where configuring them is so
|
||||
<a href="https://github.com/intika/Librefox">non-trivial</a> that you
|
||||
might as well use a version of Firefox that respects your privacy
|
||||
<b>by default</b>, rather than diving into the uncertainty of digging
|
||||
out all of the spyware features (and repeating the process every time
|
||||
the browser is updated). It's awalys going to be better to pick a
|
||||
browser higher on this list.
|
||||
</p>
|
||||
<table>
|
||||
<center>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td>
|
||||
<img src="../images/waterfox_logo.png" alt="Waterfox Logo" />
|
||||
</td>
|
||||
<td><img src="../images/brave_logo.png" alt="Brave logo" /></td>
|
||||
<td>
|
||||
<img src="../images/firefox_logo3.svg" alt="firefox Logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/vivaldi_logo.png" alt="vivaldi Logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img src="../images/dissenter_logo.png"alt="Dissenter Logo"/>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<b><a href="../articles/waterfox.html">Waterfox</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/brave.html">Brave</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/firefox.html">Firefox</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/vivaldi.html">Vivaldi</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/dissenter.html">Dissenter</a></b>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</center>
|
||||
</table>
|
||||
<h2><span class="red">Rock Bottom - No Privacy</span></h2>
|
||||
<p>
|
||||
These browsers are unashamedly designed to collect as much information
|
||||
about the user as possible (all are rated EXTREMELY HIGH by the site).
|
||||
Only SRWare Iron has it's source code availible, and all the
|
||||
developers have mistreated their users (complete disregard for privacy
|
||||
and / or false advertising) for a long time. These browsers are
|
||||
actively hostile against their users and thus should not be used at
|
||||
all.
|
||||
</p>
|
||||
<table>
|
||||
<center>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td>
|
||||
<img src="../images/chrome_logo.png" alt="chrome logo" />
|
||||
</td>
|
||||
<td><img src="../images/opera_logo.png" alt="opera logo" /></td>
|
||||
<td>
|
||||
<img src="../images/slimjet_logo.png" alt="SlimJet logo" />
|
||||
</td>
|
||||
<td>
|
||||
<img
|
||||
src="../images/webdiscover_logo.png"
|
||||
alt="WebDiscover logo"
|
||||
/>
|
||||
</td>
|
||||
<td><img src="../images/srware_logo.png" alt="Iron logo" /></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<b><a href="../articles/chrome.html">Google Chrome</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/opera.html">Opera</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/slimjet.html">SlimJet</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/webdiscover.html">WebDiscover</a></b>
|
||||
</td>
|
||||
<td>
|
||||
<b><a href="../articles/iron.html">SRWare Iron</a></b>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</center>
|
||||
</table>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div>
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<p>
|
||||
This isn't the only guide on what web browser to pick, with an
|
||||
emphasis on privacy, to exist, and many other people, with their
|
||||
own knowlege and prespectives, have written their own guides. It
|
||||
would be a waste to only read one guide to make your decision, so,
|
||||
you should probably read a few more, these are some good ones.
|
||||
<br /><a
|
||||
href="https://digdeeper.neocities.org/ghost/browsers.html"
|
||||
>Digdeeper - How to choose a browser for everyday use?</a
|
||||
>
|
||||
<br /><a href="https://clarkycat.neocities.org/browser.html"
|
||||
>Clarkycat - Browser Recommendation and Addons</a
|
||||
>
|
||||
</p>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 2/20/2019</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,99 +1,177 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>CCleaner - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/ccleaner_logo.png" alt="ccleaner logo">
|
||||
<h1>CCleaner</h1>
|
||||
<p>
|
||||
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
CCleaner is spyware that collects your personal information to advertise to you. It also sells your information to third parties so that they can advertise to you.
|
||||
It collects a huge amount of very personal information, like your <b><font color=red>physical location.</font></b> CCleaner uses the technique of privacy policy obfusication
|
||||
where it provides one privacy policy for every single product its company offers, making it more difficult to know what parts of the privacy policy apply to which program.
|
||||
</p>
|
||||
<h3>CCleaner collects and sells user information to advertisers</h3>
|
||||
<p>
|
||||
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to
|
||||
advertisers:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
|
||||
<p>Image Source: <sup><a href="#2">[2]</a></sup></p>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>CCleaner - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<h3>CCleaner tracks a huge amount of personal information</h3>
|
||||
<p>
|
||||
If we look at the privacy policy, we can see that CCleaner reports the following<sup><a href="#3">[3]</a></sup>:
|
||||
</p>
|
||||
<ul>
|
||||
<li>IP Address
|
||||
<li>Unique User ID
|
||||
<li>Operating System
|
||||
<li>Other Avast Products installed
|
||||
<li><b><font color=red>physical location</font></b>
|
||||
</ul>
|
||||
<p>
|
||||
Beyond this, CCleaner is integrated with the following spyware platforms, which all collect their own sets of information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Google Analytics
|
||||
<li>Logentries
|
||||
</ul>
|
||||
<p>
|
||||
It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be
|
||||
enough to understand that CCleaner is full of third party spyware, as well as first party spyware.
|
||||
</p>
|
||||
<h3>CCleaner sends you spam email</h3>
|
||||
<p>From the privacy policy<sup><a href="#3">[3]</a></sup>:</p>
|
||||
<p><i>
|
||||
"When we collect your email address, we may market our other products and services to you. You may choose to unsubscribe from future email marketing by following the instructions in the email."
|
||||
</i></p>
|
||||
</p>
|
||||
<h3>CCleaner tracks your physical location</h3>
|
||||
<p>
|
||||
According to the privacy policy, the ccleaner website tries to track your physical location.<sup><a href="#3">[3]</a></sup>
|
||||
</p>
|
||||
<p><i>
|
||||
"Our websites use cookies to acquire data that may be used to determine your physical location via your Internet Protocol address (“IP Address”) and automated geolocation techniques, or to acquire basic information about the computer, tablet, or mobile phone that you use to visit us."
|
||||
</i></p>
|
||||
<p>
|
||||
<i>"location data"</i> is also mentioned when talking about the information that ccleaner itself collects about it's users.
|
||||
</p>
|
||||
<h3>Past Security Flaws</h3>
|
||||
<p>
|
||||
In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">
|
||||
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users
|
||||
</a>
|
||||
<a href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">[web.archive.org]</a><br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">CCleaner Privacy Issue </a>
|
||||
<a href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/HJFBP">[archive.is]</a><br>
|
||||
<a name="3">3.</a>
|
||||
<a href="http://www.ccleaner.com/about/privacy-policy">What Happens to Your Data</a>
|
||||
<a href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy">[web.archive.org]</a>
|
||||
<a href="http://archive.is/HJFBP">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/21/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</body>
|
||||
</html>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ccleaner_logo.png" alt="CCleaner Logo" />
|
||||
<h1>CCleaner</h1>
|
||||
<p>
|
||||
CCleaner, developed by Piriform, is a utility program used to clean
|
||||
potentially unwanted files and invalid Windows Registry entries from a
|
||||
computer.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
CCleaner is spyware that collects your personal information to
|
||||
advertise to you. It also sells your information to third parties so
|
||||
that they can advertise to you. It collects a huge amount of very
|
||||
personal information, like your
|
||||
<b><font color="red">physical location.</font></b> CCleaner uses the
|
||||
technique of privacy policy obfusication where it provides one privacy
|
||||
policy for every single product its company offers, making it more
|
||||
difficult to know what parts of the privacy policy apply to which
|
||||
program.
|
||||
</p>
|
||||
<h3>CCleaner collects and sells user information to advertisers</h3>
|
||||
<p>
|
||||
CCleaner clearly shows in its privacy settings that it is collecting
|
||||
information about your comptuer and selling that information to
|
||||
advertisers:
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/ccleaner_privacy.png"
|
||||
alt="Ccleaner privacy settings"
|
||||
/>
|
||||
<p>
|
||||
Image Source: <sup><a href="#s2">[2]</a></sup>
|
||||
</p>
|
||||
|
||||
<h3>CCleaner tracks a huge amount of personal information</h3>
|
||||
<p>
|
||||
If we look at the privacy policy, we can see that CCleaner reports the
|
||||
following<sup><a href="#s3">[3]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Unique User ID</li>
|
||||
<li>Operating System</li>
|
||||
<li>Other Avast Products installed</li>
|
||||
<li>
|
||||
<b><font color="red">physical location</font></b>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Beyond this, CCleaner is integrated with the following spyware
|
||||
platforms, which all collect their own sets of information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Google Analytics</li>
|
||||
<li>Logentries</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
It would be very time consuming to go through all of those privacy
|
||||
policies (especially because many of these are obfusicated), but it
|
||||
should be enough to understand that CCleaner is full of third party
|
||||
spyware, as well as first party spyware.
|
||||
</p>
|
||||
<h3>CCleaner sends you spam email</h3>
|
||||
<p>
|
||||
From the privacy policy<sup><a href="#s3">[3]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"When we collect your email address, we may market our other
|
||||
products and services to you. You may choose to unsubscribe from
|
||||
future email marketing by following the instructions in the email."
|
||||
</i>
|
||||
</p>
|
||||
<h3>CCleaner tracks your physical location</h3>
|
||||
<p>
|
||||
According to the privacy policy, the ccleaner website tries to track
|
||||
your physical location.<sup><a href="#s3">[3]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"Our websites use cookies to acquire data that may be used to
|
||||
determine your physical location via your Internet Protocol address
|
||||
(“IP Address”) and automated geolocation techniques, or to acquire
|
||||
basic information about the computer, tablet, or mobile phone that
|
||||
you use to visit us."
|
||||
</i>
|
||||
</p>
|
||||
<p>
|
||||
<i>"location data"</i> is also mentioned when talking about the
|
||||
information that ccleaner itself collects about it's users.
|
||||
</p>
|
||||
<h3>Past Security Flaws</h3>
|
||||
<p>
|
||||
In the past, CCleaner has been compromised and backdoors have been
|
||||
added to it.<sup><a href="#s1">[1]</a></sup>
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a
|
||||
href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
|
||||
>
|
||||
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud
|
||||
v1.07.3191 for 32-bit Windows users
|
||||
</a>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a
|
||||
href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
|
||||
>CCleaner Privacy Issue
|
||||
</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="http://archive.is/HJFBP">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="http://www.ccleaner.com/about/privacy-policy"
|
||||
>What Happens to Your Data</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="http://archive.is/HJFBP">[archive.is]</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 8/21/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
|
||||
><img class="icon" src="../images/cc0.png" alt="CC0 License"
|
||||
/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,48 +1,85 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>CDex - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<img src="../images/cdex_logo.png" alt="cdex logo">
|
||||
<h1>CDex</h1>
|
||||
<p>
|
||||
CDex is an Open Source Digital Audio CD Extractor.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
|
||||
<p>
|
||||
CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out.
|
||||
Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but
|
||||
I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2.
|
||||
The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my
|
||||
tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open.
|
||||
</p>
|
||||
<h3>Bundling with spyware</h3>
|
||||
<p>
|
||||
CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be.
|
||||
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen">
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/Orpq6">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 7/29/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/cdex_logo.png" alt="CDex Logo" />
|
||||
<h1>CDex</h1>
|
||||
<p>
|
||||
CDex is an Open Source Digital Audio CD Extractor.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>
|
||||
CDex's installer bundles it with spyware, and it will randomly suggest
|
||||
a spyware program to the user, with a chance to opt-out. Usually it
|
||||
attempts to bundle itself with the webdiscover browser and one time I
|
||||
got it to try and offer me an antivirus program, but I wasn't able to
|
||||
reproduce this. The program was tested on Windows 7 32-bit with
|
||||
Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the
|
||||
program tested was 2.06.
|
||||
<b
|
||||
><font color="lime"
|
||||
>It did not make any connections to the internet</font
|
||||
></b
|
||||
>
|
||||
that my tests were able to find. To test the program I ripped the
|
||||
audio files out of a CD with both network monitoring programs open.
|
||||
</p>
|
||||
<h3>Bundling with spyware</h3>
|
||||
<p>
|
||||
CDex attempts to bundle it self with the
|
||||
<a href="../articles/webdiscover.html">WebDiscover</a> web browser.
|
||||
This is an Opt-out and not an Opt-in like it should be. This program
|
||||
is spyware, because according to it's privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>, it collects information about it's users.
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/cdex_bundling.png"
|
||||
alt="CDex installer spyware opt-out screen"
|
||||
/>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/Orpq6">[archive.is]</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 7/29/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
</html>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,244 +1,418 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>Discord - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<img src="../images/discord_logo.png" alt="Discord-Logo">
|
||||
<h1>Discord</h1>
|
||||
<center>
|
||||
<a href="../articles/discord_es.html">Spanish Translation</a>
|
||||
</center>
|
||||
<p>
|
||||
Discord is an instant messaging application for MacOS, Windows, Linux,
|
||||
Android, and iOS. Discord is used to communicate via voice chat and
|
||||
text chat, and has image-sharing and file-sharing capabilities.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
<font color="lightgreen">
|
||||
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated.
|
||||
</font><br>
|
||||
</p>
|
||||
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
|
||||
<p>
|
||||
Discord is spyware because it collects all information that passes
|
||||
through its communication platform. As Discord is a centralized
|
||||
communication platform, all communications have to go through Discord's
|
||||
official servers, where all of that information can potentially be
|
||||
recorded. The vast majority of said information has been confirmed
|
||||
to be recorded, such as all communications between users. Discord has
|
||||
also been confirmed to use other spyware features such as various forms
|
||||
of telemetry. Discord's main source of income is from investment, from which
|
||||
it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from
|
||||
source and the source code for Discord is unavailable.
|
||||
</p>
|
||||
<h3>Discord does not make its source code available</h3>
|
||||
<p>
|
||||
It is impossible to download and examine Discord's source code,
|
||||
which means that it is impossible to prove that Discord is not
|
||||
spyware. Any program which does not make its source code available is
|
||||
potential spyware.
|
||||
</p>
|
||||
<h3>Discord confirms that it collects large amounts of sensitive user data</h3>
|
||||
<p>
|
||||
Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup> that it collects the following information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Device UUID</li>
|
||||
<li>User's e-mail address</li>
|
||||
<li>All text messages</li>
|
||||
<li>All images</li>
|
||||
<li>All VOIP data (voice chat)</li>
|
||||
<li>Open rates for e-mail sent by Discord</li>
|
||||
</ul>
|
||||
<p>
|
||||
Discord does not explictly confirm that it collects this information, but still collects it by default:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Logs of all of the other programs that are open on your computer</li>
|
||||
</ul>
|
||||
<p>
|
||||
The implications of this information can be broken down like this: By
|
||||
recording your IP address, Discord can track your general location
|
||||
(about as precise as which county you are in). Discord can also tell
|
||||
which devices you use, as it uniquely identifies each device, and how
|
||||
much you use those devices, as it can record your device usage habits
|
||||
(since Discord is usually open in the background so that it can receive
|
||||
messages). Discord also records every single interaction you have with
|
||||
other users through its service. This means that Discord is confirmed
|
||||
to log every conversation that you have through Discord, and record
|
||||
everything that you say on Discord, and view all images that you send
|
||||
through Discord. Therefore, none of your interactions on Discord are
|
||||
private. Discord's privacy policy also contains several occurrences of
|
||||
phrases such as "including but not limited to," which is an explicit
|
||||
confirmation that Discord contains more spyware features that are not
|
||||
disclosed to the user.
|
||||
</p>
|
||||
<h3>Discord contains features which allow integration with other spyware platforms</h3>
|
||||
<p>
|
||||
Discord contains the opt-in spyware feature known as "social media
|
||||
integration." This allows you to sync your persistent user identity
|
||||
on Discord with your persistent user identity on other spyware
|
||||
platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>,
|
||||
Discord has confirmed that if you opt in to this spyware feature,
|
||||
Discord will obtain an undisclosed amount of access to information
|
||||
obtained about you by the spyware platforms that you choose to sync
|
||||
with.
|
||||
</p>
|
||||
<h3>Discord contains a process logger</h3>
|
||||
<p>
|
||||
Discord has been confirmed to monitor the open processes on your
|
||||
operating system. This is a spyware feature known as a "process logger"
|
||||
that is generally used to record your program usage habits. This was
|
||||
confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup>
|
||||
In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is
|
||||
mandatory for several features of the platform. The CTO and a Discord engineer go on
|
||||
to claim that Discord does not use the process logger to send records
|
||||
of the open processes on the user's computer.
|
||||
</p>
|
||||
<p>
|
||||
The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with
|
||||
the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message"
|
||||
turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way.
|
||||
However when setting the "Display currently running game as a status message" turned on, the behavior
|
||||
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon">
|
||||
<p>
|
||||
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source
|
||||
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to
|
||||
Discord's servers when the process logger is turned on. But it's at least possible to turn it off.
|
||||
</p>
|
||||
<h3>Discord uses it's process logging for advertising</h3>
|
||||
<p>
|
||||
Discord shows this in it's privacy option here:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness">
|
||||
<p>
|
||||
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware),
|
||||
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising
|
||||
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build
|
||||
a statistical model of what programs you might buy/lisence in the future.</b></font>
|
||||
</p>
|
||||
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/discord_logo.png" alt="Discord Logo" />
|
||||
<h1>Discord</h1>
|
||||
<center>
|
||||
<a href="../articles/discord_es.html">Spanish Translation</a>
|
||||
</center>
|
||||
<p>
|
||||
Discord is an instant messaging application for MacOS, Windows, Linux,
|
||||
Android, and iOS. Discord is used to communicate via voice chat and
|
||||
text chat, and has image-sharing and file-sharing capabilities.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
<font color="lightgreen">
|
||||
Thanks to Richard Stallman for linking to our article
|
||||
<a href="https://stallman.org/discord.html"> here</a>!
|
||||
The spotlight is very much appreciated.
|
||||
</font>
|
||||
<br />
|
||||
</p>
|
||||
<a href="../articles/discord.html"
|
||||
><img
|
||||
class="icon"
|
||||
src="../images/discord-no-way-2.gif"
|
||||
alt="Discord? No Way!"
|
||||
/></a>
|
||||
<p>
|
||||
Discord is spyware because it collects all information that passes
|
||||
through its communication platform. As Discord is a centralized
|
||||
communication platform, all communications have to go through
|
||||
Discord's official servers, where all of that information can
|
||||
potentially be recorded. The vast majority of said information has
|
||||
been confirmed to be recorded, such as all communications between
|
||||
users. Discord has also been confirmed to use other spyware features
|
||||
such as various forms of telemetry. Discord's main source of income is
|
||||
from investment, from which it has received over $279.3 million
|
||||
dollars<sup><a href="#s4">[4]</a></sup
|
||||
>. Discord cannot be built from source and the source code for Discord
|
||||
is unavailable.
|
||||
</p>
|
||||
<h3>Discord does not make its source code available</h3>
|
||||
<p>
|
||||
It is impossible to download and examine Discord's source code, which
|
||||
means that it is impossible to prove that Discord is not spyware. Any
|
||||
program which does not make its source code available is potential
|
||||
spyware.
|
||||
</p>
|
||||
<h3>
|
||||
Discord confirms that it collects large amounts of sensitive user data
|
||||
</h3>
|
||||
<p>
|
||||
Discord explicitly confirms in its privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>
|
||||
that it collects the following information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Device UUID</li>
|
||||
<li>User's e-mail address</li>
|
||||
<li>All text messages</li>
|
||||
<li>All images</li>
|
||||
<li>All VOIP data (voice chat)</li>
|
||||
<li>Open rates for e-mail sent by Discord</li>
|
||||
</ul>
|
||||
<p>
|
||||
Discord does not explictly confirm that it collects this information,
|
||||
but still collects it by default:
|
||||
</p>
|
||||
<ul>
|
||||
<li>
|
||||
Logs of all of the other programs that are open on your computer
|
||||
</li>
|
||||
</ul>
|
||||
<p>
|
||||
The implications of this information can be broken down like this: By
|
||||
recording your IP address, Discord can track your general location
|
||||
(about as precise as which county you are in). Discord can also tell
|
||||
which devices you use, as it uniquely identifies each device, and how
|
||||
much you use those devices, as it can record your device usage habits
|
||||
(since Discord is usually open in the background so that it can
|
||||
receive messages). Discord also records every single interaction you
|
||||
have with other users through its service. This means that Discord is
|
||||
confirmed to log every conversation that you have through Discord, and
|
||||
record everything that you say on Discord, and view all images that
|
||||
you send through Discord. Therefore, none of your interactions on
|
||||
Discord are private. Discord's privacy policy also contains several
|
||||
occurrences of phrases such as "including but not limited to," which
|
||||
is an explicit confirmation that Discord contains more spyware
|
||||
features that are not disclosed to the user.
|
||||
</p>
|
||||
<h3>
|
||||
Discord contains features which allow integration with other spyware
|
||||
platforms
|
||||
</h3>
|
||||
<p>
|
||||
Discord contains the opt-in spyware feature known as "social media
|
||||
integration." This allows you to sync your persistent user identity on
|
||||
Discord with your persistent user identity on other spyware platforms,
|
||||
such as Facebook and Twitter. In its privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>, Discord has confirmed that if you opt in to this spyware feature,
|
||||
Discord will obtain an undisclosed amount of access to information
|
||||
obtained about you by the spyware platforms that you choose to sync
|
||||
with.
|
||||
</p>
|
||||
<h3>Discord contains a process logger</h3>
|
||||
<p>
|
||||
Discord has been confirmed to monitor the open processes on your
|
||||
operating system. This is a spyware feature known as a "process
|
||||
logger" that is generally used to record your program usage habits.
|
||||
This was confirmed by the CTO of Discord in a Reddit thread.<sup
|
||||
><a href="#s2">[2]</a></sup
|
||||
>
|
||||
In the same thread, the CTO also elaborates that this spyware feature
|
||||
(the monitoring of processes) is mandatory for several features of the
|
||||
platform. The CTO and a Discord engineer go on to claim that Discord
|
||||
does not use the process logger to send records of the open processes
|
||||
on the user's computer.
|
||||
</p>
|
||||
<p>
|
||||
The test to prove that Discord logs processes was done again by the
|
||||
writer with procmon on 4/11/2019 with the features: "Use data to
|
||||
customize my Discord Experience" and "Display currently running game
|
||||
as a status message" turned off. Discord did
|
||||
<font color="lime"><b>NOT</b></font> log all of the processes open
|
||||
this way. However when setting the "Display currently running game as
|
||||
a status message" turned on, the behavior described in<sup
|
||||
><a href="#s2">[2]</a></sup
|
||||
>
|
||||
was replecated. You can see that behavior here:
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_process_logging.png"
|
||||
alt="Discord process logging as described in [2] confirmed with procmon"
|
||||
/>
|
||||
<p>
|
||||
It turns out that this feature
|
||||
<font color="lime"><b>can be disabled through the UI.</b></font>
|
||||
Because of the nature of closed-source software it isn't possible for
|
||||
either this article or the Discord developers to prove how much
|
||||
information is being sent to Discord's servers when the process logger
|
||||
is turned on. But it's at least possible to turn it off.
|
||||
</p>
|
||||
<h3>Discord uses it's process logging for advertising</h3>
|
||||
<p>
|
||||
Discord shows this in it's privacy option here:
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_data.png"
|
||||
alt="Discord process logging usefulness"
|
||||
/>
|
||||
<p>
|
||||
That the process logging features of Discord are now being recorded on
|
||||
Discord's servers as a form of telemetry (spyware), and removes
|
||||
speculation about why this feature exists. It is clarified by Discord
|
||||
that this spyware feature is used for advertising to it's users.<sup
|
||||
><a href="#s8">[8]</a></sup
|
||||
>
|
||||
This means that Discord is
|
||||
<font color="red"
|
||||
><b
|
||||
>recording the programs you have open to build a statistical model
|
||||
of what programs you might buy/lisence in the future.</b
|
||||
></font
|
||||
>
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_2.png"
|
||||
alt="Discord confirms process logging is used for advertising"
|
||||
/>
|
||||
|
||||
<h3>Discord tries to force some users to give their Telephone numbers</h3>
|
||||
<p>
|
||||
Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord
|
||||
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out
|
||||
users isn't known.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/discord_verify.png" alt="discord phone verification">
|
||||
<h3>
|
||||
Discord tries to force some users to give their Telephone numbers
|
||||
</h3>
|
||||
<p>
|
||||
Discord will lock users out of it's service and will not allow them to
|
||||
continue using it without giving their phone number or contacting
|
||||
Discord support. This kind of feature is designed to extract very
|
||||
personal information out of it's users (phone numbers). The criteria
|
||||
for locking out users isn't known.
|
||||
<!--
|
||||
You can be locked out of your account for spamming
|
||||
multiple users in dm's a short ammount of time,
|
||||
This is due to the spam protection
|
||||
-->
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_verify.png"
|
||||
alt="discord phone verification"
|
||||
/>
|
||||
|
||||
<h3>Discord receives government requests for your information</h3>
|
||||
<p>
|
||||
Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup>
|
||||
that it does receive government requests for information. So, we know
|
||||
that the government potentially has access to all of the information
|
||||
that Discord collects about you. You can read a copy of the email image
|
||||
posted in the source <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">here</a> in case the link there dies.
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Speculation on Discord's future</h2>
|
||||
<p>
|
||||
It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able
|
||||
to consistently raise new invesment capital, which is at a level where it could reasonably be covering
|
||||
all of its operating costs. However, Discord, like any other company, is not going to exist in a
|
||||
constant state of investment. Discord is going to have to transition away from an investment-financed
|
||||
business model to a revenue model that exclusively relies on generating revenue from the users of the
|
||||
platform.
|
||||
</p>
|
||||
<p>
|
||||
Discord has several ways of making money. It can lisence emoji's and other features of the program with
|
||||
Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's
|
||||
new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However both of these revenue
|
||||
sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup>
|
||||
and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back)
|
||||
</p>
|
||||
<p>
|
||||
If Discord is not able to satisfy it's obligation to it's investors, it has a third option- selling user information
|
||||
to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it
|
||||
is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>,
|
||||
and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy.
|
||||
This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current
|
||||
revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble,
|
||||
it probably will be forced to liquiate this asset.
|
||||
</p>
|
||||
<h3>Discord receives government requests for your information</h3>
|
||||
<p>
|
||||
Discord has confirmed in an email correspondence<sup
|
||||
><a href="#s6">[6]</a></sup
|
||||
>
|
||||
that it does receive government requests for information. So, we know
|
||||
that the government potentially has access to all of the information
|
||||
that Discord collects about you. You can read a copy of the email
|
||||
image posted in the source
|
||||
<a
|
||||
href="https://spyware.neocities.org/images/discord%20government%20requests.png"
|
||||
>here</a
|
||||
>
|
||||
in case the link there dies.
|
||||
</p>
|
||||
<hr />
|
||||
<h2>Speculation on Discord's future</h2>
|
||||
<p>
|
||||
It's unknown whether Discord currently is or isn't selling user
|
||||
information. Currently Discord has been able to consistently raise new
|
||||
invesment capital, which is at a level where it could reasonably be
|
||||
covering all of its operating costs. However, Discord, like any other
|
||||
company, is not going to exist in a constant state of investment.
|
||||
Discord is going to have to transition away from an
|
||||
investment-financed business model to a revenue model that exclusively
|
||||
relies on generating revenue from the users of the platform.
|
||||
</p>
|
||||
<p>
|
||||
Discord has several ways of making money. It can lisence emoji's and
|
||||
other features of the program with Discord Nitro<sup
|
||||
><a href="#s5">[5]</a></sup
|
||||
>, or it can make money lisencing video games through it's new online
|
||||
store, as a competitor to <a href="../articles/steam.html">Steam</a>.
|
||||
However both of these revenue sources may not be enough. Discord has
|
||||
raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup>
|
||||
and it has to return on this investment. (which is more than 279.3
|
||||
million dollars that has to be paid back)
|
||||
</p>
|
||||
<p>
|
||||
If Discord is not able to satisfy it's obligation to it's investors,
|
||||
it has a third option- selling user information to advertisers.
|
||||
Discord is already datamining it's users to produce it's
|
||||
recommendation system,<sup><a href="#s8">[8]</a></sup> which means
|
||||
that it is already turning it's userbase into extremely valueble,
|
||||
sellable, advertising data. Discord has 130 million users<sup
|
||||
><a href="#s7">[7]</a></sup
|
||||
>, and it can produce a statistical model of what games each user (who
|
||||
does not opt-out of advertising) owns, plays, and wants to buy. This
|
||||
is incredibly valueble information that Discord can sell if it cannot
|
||||
reach it's profit obligations with it's current revenue model. If
|
||||
Discord is a successful games store, then it wont need to do this. But
|
||||
if Discord gets in financial trouble, it probably will be forced to
|
||||
liquiate this asset.
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<a
|
||||
href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/"
|
||||
>Friends Don't Let Friends Use Discord</a
|
||||
>
|
||||
<a href="https://archive.is/Q4N9J">[archive.is]</a
|
||||
><br />
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<a
|
||||
href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
|
||||
>Help Me, Tom's Guide: Is Discord Tracking Me?</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
|
||||
>[archive.is]</a
|
||||
><br />
|
||||
|
||||
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
|
||||
<a href="https://archive.is/Q4N9J">[archive.is]</a><br>
|
||||
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0"
|
||||
>Why Discord is Trash</a
|
||||
><br />
|
||||
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU"
|
||||
>Why You Shouldn't Use Discord</a
|
||||
><br />
|
||||
|
||||
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
|
||||
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
|
||||
|
||||
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
|
||||
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
|
||||
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
|
||||
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://discordapp.com/privacy">Discord Privacy Policy</a>
|
||||
<a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a>
|
||||
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/qFcQA">[archive.is]</a><br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="https://discordapp.com/company">Discord</a>
|
||||
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a>
|
||||
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
|
||||
|
||||
<a name="4">4.</a>
|
||||
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a>
|
||||
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
|
||||
|
||||
<a name="5">5.</a>
|
||||
<a href="https://discordapp.com/nitro">Discord Nitro</a>
|
||||
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
|
||||
|
||||
<a name="6">6.</a>
|
||||
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a>
|
||||
<a href="https://archive.is/JrdJ9">[archive.is]</a>
|
||||
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br>
|
||||
|
||||
|
||||
<a name="7">7.</a>
|
||||
<a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a>
|
||||
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br>
|
||||
|
||||
|
||||
|
||||
<a name="8">8.</a>
|
||||
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a>
|
||||
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br>
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 4/11/2019
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was created on 11/23/17
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<a href="http://subvert.pw/res/discord.pdf"
|
||||
>THE DISCORD SITUATION</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://discordapp.com/privacy"
|
||||
>Discord Privacy Policy</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20180515102020/https://discordapp.com/privacy"
|
||||
>[archive.is]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a
|
||||
href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>Why is Discord recording our open programs and uploading
|
||||
them?</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/qFcQA">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="https://discordapp.com/company">Discord</a>
|
||||
<a
|
||||
href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
|
||||
>[wayback.archive-it.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s4">
|
||||
<a href="https://www.crunchbase.com/organization/discord"
|
||||
>Crunchbase</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s5">
|
||||
<a href="https://discordapp.com/nitro">Discord Nitro</a>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s6">
|
||||
<a
|
||||
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>Discord receives government requests. No plans on adding E2E
|
||||
Encryption any time soon.</a
|
||||
>
|
||||
<a href="https://archive.is/JrdJ9">[archive.is]</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s7">
|
||||
<a
|
||||
href=" https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>Number of registered Discord users</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s8">
|
||||
<a
|
||||
href="https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>Data Privacy Controls</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was created on 11/23/17</b><br />
|
||||
<b>This article was last edited on 4/11/2019</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
</html>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,51 +1,79 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>[Program/Service Name Here] - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>[Program/Service Name Here] - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/example_logo.png" alt="Images are in the ../images folder"/>
|
||||
<h1>[Program/Service Name Here]</h1>
|
||||
<p>
|
||||
This part of the article should have the name of the program and what it does, and who develops it.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="green">Not Rated</span></h2>
|
||||
<h2>Spyware Feature X</h2>
|
||||
<p>Proof goes here<sup><a href="#s1">[1]</a></sup>.</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<a href="">Source</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="">Source1</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li>
|
||||
<li id="s2"><a href="">Source2</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was created on mm/dd/yyyy</b>
|
||||
<b>This article was last edited on mm/dd/yyyy</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img
|
||||
src="../images/example_logo.png"
|
||||
alt="Images are in the ../images folder"
|
||||
/>
|
||||
<h1>[Program/Service Name Here]</h1>
|
||||
<p>
|
||||
This part of the article should have the name of the program and what
|
||||
it does, and who develops it.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="green">Not Rated</span></h2>
|
||||
<h2>Spyware Feature X</h2>
|
||||
<p>
|
||||
Proof goes here<sup><a href="#s1">[1]</a></sup
|
||||
>.
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<a href="">Source</a>
|
||||
<a href="">[web.archive.org]</a>
|
||||
<a href="">[archive.is]</a>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="">Source1</a>
|
||||
<a href="">[web.archive.org]</a>
|
||||
<a href="">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="">Source2</a>
|
||||
<a href="">[web.archive.org]</a>
|
||||
<a href="">[archive.is]</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was created on mm/dd/yyyy</b><br />
|
||||
<b>This article was last edited on mm/dd/yyyy</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s),
|
||||
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,59 +1,64 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Internet Explorer - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/ie_logo.png" alt="Internet Explorer Logo">
|
||||
<h1>Internet Explorer</h1>
|
||||
<p>
|
||||
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
|
||||
</p>
|
||||
<h3>Internet Explorer does not have available source code</h3>
|
||||
<p>
|
||||
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
|
||||
</p>
|
||||
<h3>Internet Explorer is self-updating software</h3>
|
||||
<p>
|
||||
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
|
||||
</p>
|
||||
<h3>Internet Explorer sends your search history to Microsoft</h3>
|
||||
<p>
|
||||
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
|
||||
</p>
|
||||
<h3>Internet Explorer can track your location</h3>
|
||||
<p>
|
||||
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
|
||||
</p>
|
||||
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
|
||||
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
|
||||
<a href="https://archive.is/EnsRH">[archive.is]</a><br>
|
||||
</p>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Internet Explorer - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
|
||||
<h1>Internet Explorer</h1>
|
||||
<p>
|
||||
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
|
||||
</p>
|
||||
<h3>Internet Explorer does not have available source code</h3>
|
||||
<p>
|
||||
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
|
||||
</p>
|
||||
<h3>Internet Explorer is self-updating software</h3>
|
||||
<p>
|
||||
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
|
||||
</p>
|
||||
<h3>Internet Explorer sends your search history to Microsoft</h3>
|
||||
<p>
|
||||
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
|
||||
</p>
|
||||
<h3>Internet Explorer can track your location</h3>
|
||||
<p>
|
||||
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
|
||||
</p>
|
||||
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
|
||||
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
|
||||
<a href="https://archive.is/EnsRH">[archive.is]</a><br></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 2/18/2019</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last updated on 2/18/2019
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</body>
|
||||
</html>
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -6,7 +7,7 @@
|
|||
<title>Firefox - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/firefox_logo.png" alt="Firefox logo">
|
||||
<img src="../images/firefox_logo3.svg" alt="Firefox logo">
|
||||
<h1>Mozilla Firefox</h1>
|
||||
<center>
|
||||
<a href="../articles/firefox_es.html">Spanish Translation</a>
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
|
||||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -12,7 +12,7 @@
|
|||
<a href="../articles/index.html">Back to catalog</a><br>
|
||||
<a href="../guides/firefox_es.html">Guía de mitigación</a>
|
||||
</p>
|
||||
<img src="../images/firefox_logo.png" alt="Firefox logo">
|
||||
<img src="../images/firefox_logo3.svg" alt="Firefox logo">
|
||||
<p>
|
||||
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
|
||||
</p>
|
||||
|
@ -20,7 +20,7 @@
|
|||
<p>
|
||||
Después de seguir la <a href="../guides/firefox.html">guía de mitigación</a>, este programa <font color=lime><b>No Es Spyware</b></font>.
|
||||
</p>
|
||||
<br/>
|
||||
<br/>
|
||||
<p>Este navegador envía bastante información de forma frecuente (mucha de la cual podría ser utilizada para identificarte de forma única). Todos los "servicios" que provee, como los buscadores que vienen por defecto y Pocket, son anti-privacidad. La clasificación puesta no es más alta porque al menos puedes desactivar or modificar la mayoría de estas características, aunque esto requiera lidiar bastante con about:config
|
||||
</p>
|
||||
<h3>Llamadas a casa</h3>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
|
||||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -6,7 +7,7 @@
|
|||
<title>Iridium Browser - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/iridium_logo.jpg" alt="Iridium Logo">
|
||||
<img src="../images/iridium_logo.png" alt="Iridium Logo">
|
||||
<h1>Iridium Browser</h1>
|
||||
<p>
|
||||
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.
|
||||
|
|
|
@ -1,180 +1,188 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>SRWare Iron - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo">
|
||||
<h1>SRWare Iron</h1>
|
||||
<p>
|
||||
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
|
||||
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
|
||||
the Chrome experience without Google's spyware. However when examining this program, these claims
|
||||
instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens
|
||||
connections to an enormous amount of servers on it's first run. It racks up a rough estimate of
|
||||
<b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new
|
||||
requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search
|
||||
engine, however it goes beyond that and routes your requests to Bing through it's own servers
|
||||
so that it can spy on your internet searches as well. The bottom line is that this browser is just
|
||||
another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b>
|
||||
</p>
|
||||
<p>
|
||||
Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4,
|
||||
and Sysinternals ProcMon were used to monitor the behavior of this program.
|
||||
</p>
|
||||
<h3>False Privacy Initiative</h3>
|
||||
<p>
|
||||
SRWare Iron claims on it's website that it is:
|
||||
</p>
|
||||
<p><i>
|
||||
"Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>
|
||||
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
|
||||
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
|
||||
claimed on SRWare's website and beleive it without doing any tests for themselves. Like
|
||||
<a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a>
|
||||
<a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a>
|
||||
that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome.
|
||||
The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser:
|
||||
</p>
|
||||
<p><i>
|
||||
"Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself."
|
||||
</i><sup><a href="#2">[2]</a></sup></p>
|
||||
<p>
|
||||
Which is just an amazing gem in the context of what is actually found when running tests on the software.
|
||||
</p>
|
||||
<h3>Massive amount of connections on first startup</h3>
|
||||
<p>
|
||||
When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and
|
||||
<code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain
|
||||
which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests
|
||||
but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it
|
||||
as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!)
|
||||
should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the
|
||||
amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads.
|
||||
There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own
|
||||
analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you
|
||||
begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you
|
||||
everywhere you go!
|
||||
</p>
|
||||
<p>
|
||||
When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount
|
||||
of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre
|
||||
all of the IP addresses that it connected, but should give you an idea.
|
||||
</p>
|
||||
<p>
|
||||
And just so that there is no ambiguity, this notice is shown when you load this homepage:
|
||||
</p>
|
||||
<p><i>
|
||||
"We use cookies to personalise content and ads, to provide social media features
|
||||
and to analyse our traffic. We also share information about your use of our site
|
||||
with our social media, advertising and analytics partners who may combine it
|
||||
with other information you’ve provided to them or they’ve collected from your
|
||||
use of their services."
|
||||
</i></p>
|
||||
<p>
|
||||
Just so that there is no doubt- you are being served tracking cookies by advertising companies.
|
||||
</p>
|
||||
<h3>Redirecting of internet searches through developer's domain</h3>
|
||||
<p>
|
||||
After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin
|
||||
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
|
||||
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
|
||||
<p>
|
||||
Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
|
||||
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
|
||||
<code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one
|
||||
spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar
|
||||
tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to
|
||||
Bing through it's own domains.
|
||||
</p>
|
||||
<h3>Motivations of the SRWare Iron developer?</h3>
|
||||
<p>
|
||||
If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of
|
||||
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#3">[3]</a></sup>
|
||||
</p>
|
||||
<xmp>
|
||||
<Kmos> Iron: why not contribute to it, instead of forking ?
|
||||
<Iron> because i removed all privacy-related code
|
||||
<Iron> e.g. RLZ
|
||||
<Iron> and URL tracking every 5 seconds after start
|
||||
<Iron> the original chrome is heavily communitating to google...i hate that
|
||||
<jamessan> all of those are supposed to have options to disable them, iirc
|
||||
<Iron> yes but they haven't options yet
|
||||
<Iron> and nobody knows when the next beta is released
|
||||
<jamessan> so work on getting the options added so they'll be there for the next release
|
||||
<mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code?
|
||||
<mgreenblatt> (assuming such a thing doesn't already exist)
|
||||
<Iron> because a fork will bring a lot of publicity to my person and my homepage
|
||||
<Iron> that means: a lot of money too ;)
|
||||
<Kmos> rotflol
|
||||
<Iron> what means rotful?
|
||||
<mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium?
|
||||
<Kmos> Iron: google about it
|
||||
<Iron> yes there is enough time to support it
|
||||
<jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing
|
||||
<Iron> i dont take money for my fork
|
||||
<Iron> but i have adsense on my page ;)
|
||||
<Iron> a lot of visitor -> a lot of clicka > a lot of money ;)
|
||||
<Kmos> and do you think google should support your fork
|
||||
<Kmos> lol
|
||||
<mgreenblatt> Iron.. it's always good to have dreams ;-)
|
||||
<Iron> we are here in germany
|
||||
<Iron> the press will love my fork
|
||||
<Iron> i talked to much journalists already
|
||||
<DrPizza> Why are you forking?
|
||||
<DrPizza> to do what?
|
||||
<Iron> to remove all things in source talking to google ;)
|
||||
<jamessan> to get fame and fortune
|
||||
<Iron> nobody here trusts google
|
||||
<Iron> the german people say: google is very evil
|
||||
<jamessan> yet you use google's adsense
|
||||
</xmp>
|
||||
<p>
|
||||
So, this could explain a lot... the motivation for this web browser to exist was to monetize
|
||||
privacy concerns by generating traffic to his website, where he could make money by serving spyware
|
||||
to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of
|
||||
spyware from all sorts of other companies... which he probably makes some amount of money from as well.
|
||||
(why else would he take the time to integrate these things into his browser? we can only speculate.)
|
||||
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a>
|
||||
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qMNlG">[archive.is]</a><br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a>
|
||||
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/TXJbh">[archive.is]</a><br>
|
||||
<a name="3">3.</a>
|
||||
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
|
||||
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 11/20/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
<center>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>SRWare Iron - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
|
||||
<h1>SRWare Iron</h1>
|
||||
<p>
|
||||
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
|
||||
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
|
||||
the Chrome experience without Google's spyware. However when examining this program, these claims
|
||||
instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens
|
||||
connections to an enormous amount of servers on it's first run. It racks up a rough estimate of
|
||||
<b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new
|
||||
requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search
|
||||
engine, however it goes beyond that and routes your requests to Bing through it's own servers
|
||||
so that it can spy on your internet searches as well. The bottom line is that this browser is just
|
||||
another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b>
|
||||
</p>
|
||||
<p>
|
||||
Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4,
|
||||
and Sysinternals ProcMon were used to monitor the behavior of this program.
|
||||
</p>
|
||||
<h3>False Privacy Initiative</h3>
|
||||
<p>
|
||||
SRWare Iron claims on it's website that it is:
|
||||
</p>
|
||||
<p><i>
|
||||
"Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern."
|
||||
</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>
|
||||
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
|
||||
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
|
||||
claimed on SRWare's website and beleive it without doing any tests for themselves. Like
|
||||
<a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a>
|
||||
<a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a>
|
||||
that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome.
|
||||
The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser:
|
||||
</p>
|
||||
<p><i>
|
||||
"Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself."
|
||||
</i><sup><a href="#s2">[2]</a></sup></p>
|
||||
<p>
|
||||
Which is just an amazing gem in the context of what is actually found when running tests on the software.
|
||||
</p>
|
||||
<h3>Massive amount of connections on first startup</h3>
|
||||
<p>
|
||||
When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and
|
||||
<code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain
|
||||
which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests
|
||||
but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it
|
||||
as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!)
|
||||
should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the
|
||||
amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads.
|
||||
There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own
|
||||
analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you
|
||||
begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you
|
||||
everywhere you go!
|
||||
</p>
|
||||
<p>
|
||||
When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount
|
||||
of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre
|
||||
all of the IP addresses that it connected, but should give you an idea.
|
||||
</p>
|
||||
<p>
|
||||
And just so that there is no ambiguity, this notice is shown when you load this homepage:
|
||||
</p>
|
||||
<p><i>
|
||||
"We use cookies to personalise content and ads, to provide social media features
|
||||
and to analyse our traffic. We also share information about your use of our site
|
||||
with our social media, advertising and analytics partners who may combine it
|
||||
with other information you’ve provided to them or they’ve collected from your
|
||||
use of their services."
|
||||
</i></p>
|
||||
<p>
|
||||
Just so that there is no doubt- you are being served tracking cookies by advertising companies.
|
||||
</p>
|
||||
<h3>Redirecting of internet searches through developer's domain</h3>
|
||||
<p>
|
||||
After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin
|
||||
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
|
||||
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
|
||||
<p>
|
||||
Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
|
||||
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
|
||||
<code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one
|
||||
spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar
|
||||
tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to
|
||||
Bing through it's own domains.
|
||||
</p>
|
||||
<h3>Motivations of the SRWare Iron developer?</h3>
|
||||
<p>
|
||||
If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of
|
||||
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#s3">[3]</a></sup>
|
||||
</p>
|
||||
<xmp>
|
||||
<Kmos> Iron: why not contribute to it, instead of forking ?
|
||||
<Iron> because i removed all privacy-related code
|
||||
<Iron> e.g. RLZ
|
||||
<Iron> and URL tracking every 5 seconds after start
|
||||
<Iron> the original chrome is heavily communitating to google...i hate that
|
||||
<jamessan> all of those are supposed to have options to disable them, iirc
|
||||
<Iron> yes but they haven't options yet
|
||||
<Iron> and nobody knows when the next beta is released
|
||||
<jamessan> so work on getting the options added so they'll be there for the next release
|
||||
<mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code?
|
||||
<mgreenblatt> (assuming such a thing doesn't already exist)
|
||||
<Iron> because a fork will bring a lot of publicity to my person and my homepage
|
||||
<Iron> that means: a lot of money too ;)
|
||||
<Kmos> rotflol
|
||||
<Iron> what means rotful?
|
||||
<mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium?
|
||||
<Kmos> Iron: google about it
|
||||
<Iron> yes there is enough time to support it
|
||||
<jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing
|
||||
<Iron> i dont take money for my fork
|
||||
<Iron> but i have adsense on my page ;)
|
||||
<Iron> a lot of visitor -> a lot of clicka > a lot of money ;)
|
||||
<Kmos> and do you think google should support your fork
|
||||
<Kmos> lol
|
||||
<mgreenblatt> Iron.. it's always good to have dreams ;-)
|
||||
<Iron> we are here in germany
|
||||
<Iron> the press will love my fork
|
||||
<Iron> i talked to much journalists already
|
||||
<DrPizza> Why are you forking?
|
||||
<DrPizza> to do what?
|
||||
<Iron> to remove all things in source talking to google ;)
|
||||
<jamessan> to get fame and fortune
|
||||
<Iron> nobody here trusts google
|
||||
<Iron> the german people say: google is very evil
|
||||
<jamessan> yet you use google's adsense
|
||||
</xmp>
|
||||
<p>
|
||||
So, this could explain a lot... the motivation for this web browser to exist was to monetize
|
||||
privacy concerns by generating traffic to his website, where he could make money by serving spyware
|
||||
to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of
|
||||
spyware from all sorts of other companies... which he probably makes some amount of money from as well.
|
||||
(why else would he take the time to integrate these things into his browser? we can only speculate.)
|
||||
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a>
|
||||
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qMNlG">[archive.is]</a><br>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a>
|
||||
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/TXJbh">[archive.is]</a><br>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
|
||||
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 11/20/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,95 +1,107 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Slimjet - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/slimjet_logo.png" alt="slimjet Logo">
|
||||
<h1>Slimjet</h1>
|
||||
<p>
|
||||
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
|
||||
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
|
||||
</p>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>
|
||||
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup>
|
||||
the moment I turn it on with MITMproxy running, I am greeted with this:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
|
||||
<p>
|
||||
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
|
||||
</p>
|
||||
<h3>Default Search Engine is Spyware</h3>
|
||||
<p>
|
||||
The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
|
||||
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
|
||||
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
|
||||
<p>
|
||||
So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad
|
||||
default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact
|
||||
with advertisments and it says that it uses information it collects about it's users to:
|
||||
</p>
|
||||
<p><i>
|
||||
"...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company."
|
||||
</i><sup><a href="#3">[3]</a></sup></p>
|
||||
<p>
|
||||
So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to
|
||||
an alternative like DuckDuckGo the requests to fpseek stop.
|
||||
</p>
|
||||
<h3>Collecting Information about Users</h3>
|
||||
<p>
|
||||
Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information
|
||||
to advertisters. However it is still opt-out spyware.
|
||||
</p>
|
||||
<h3>Using the Microsoft BITS service to upload search history to Google servers</h3>
|
||||
<p>
|
||||
When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer
|
||||
updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_google_BITS.png" alt="Bits1">
|
||||
<img class="screenshot" src="../images/sj_google_BITS_2.png" alt="Bits2">
|
||||
<img class="screenshot" src="../images/sj_google_BITS_3.png" alt="Bits3">
|
||||
<p>
|
||||
Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the
|
||||
"CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_cloud.png" alt="cloud sync feature">
|
||||
<p>
|
||||
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
|
||||
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/67qZa">[archive.is]</a><br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
|
||||
<a name="3">3.</a>
|
||||
<a href="http://info.fpseek.com/privacy-policy/">Privacy Policy – Fpseek</a>
|
||||
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/fHly1">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/4/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</body>
|
||||
<!--Old Style-->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Slimjet - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
|
||||
<h1>Slimjet</h1>
|
||||
<p>
|
||||
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#s1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
|
||||
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
|
||||
</p>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>
|
||||
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#s1">[1]</a></sup>
|
||||
the moment I turn it on with MITMproxy running, I am greeted with this:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
|
||||
<p>
|
||||
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#s2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
|
||||
</p>
|
||||
<h3>Default Search Engine is Spyware</h3>
|
||||
<p>
|
||||
The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
|
||||
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
|
||||
has it's own privacy policy<sup><a href="#s3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
|
||||
<p>
|
||||
So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad
|
||||
default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact
|
||||
with advertisments and it says that it uses information it collects about it's users to:
|
||||
</p>
|
||||
<p><i>
|
||||
"...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company."
|
||||
</i><sup><a href="#s3">[3]</a></sup></p>
|
||||
<p>
|
||||
So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to
|
||||
an alternative like DuckDuckGo the requests to fpseek stop.
|
||||
</p>
|
||||
<h3>Collecting Information about Users</h3>
|
||||
<p>
|
||||
Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information
|
||||
to advertisters. However it is still opt-out spyware.
|
||||
</p>
|
||||
<h3>Using the Microsoft BITS service to upload search history to Google servers</h3>
|
||||
<p>
|
||||
When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer
|
||||
updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_google_BITS.png" alt="Bits1">
|
||||
<img class="screenshot" src="../images/sj_google_BITS_2.png" alt="Bits2">
|
||||
<img class="screenshot" src="../images/sj_google_BITS_3.png" alt="Bits3">
|
||||
<p>
|
||||
Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the
|
||||
"CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sj_cloud.png" alt="cloud sync feature">
|
||||
<p>
|
||||
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
|
||||
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/67qZa">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="http://info.fpseek.com/privacy-policy/">Privacy Policy – Fpseek</a>
|
||||
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/fHly1">[archive.is]</a><br>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 8/4/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -1,4 +1,4 @@
|
|||
|
||||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -7,7 +8,7 @@
|
|||
</head>
|
||||
<body>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/tor_logo.png" alt="TOR browser logo">
|
||||
<img src="../images/tor_browser_logo.png" alt="TOR browser logo">
|
||||
<h1>Tor Browser</h1>
|
||||
<p>
|
||||
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -8,7 +9,7 @@
|
|||
<body>
|
||||
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo">
|
||||
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
|
||||
<h1>Ungoogled-Chromium</h1>
|
||||
<p>
|
||||
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
@ -6,7 +7,7 @@
|
|||
<title>Waterfox - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/waterfox logo.png" alt="Waterfox Logo">
|
||||
<img src="../images/waterfox_logo.png" alt="Waterfox Logo">
|
||||
<h1>Waterfox</h1>
|
||||
<p>
|
||||
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
|
||||
|
@ -22,7 +23,7 @@ information about you with Mozilla, and has other spyware features.
|
|||
If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably
|
||||
Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
|
||||
well as Waterfox's own update service. You can look at a list of these requests
|
||||
<a href="https://digdeeper.neocities.o../images/wfox.png">here</a> or a on mirror <a href="../images/wfox.png">here</a>.
|
||||
<a href="../images/wfox.png">here</a> or a on mirror <a href="https://digdeeper.neocities.org/images/wfox.png">here</a>.
|
||||
</p>
|
||||
<h3>Waterfox has a communication problem</h3>
|
||||
<p>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
<title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/iridium_logo.jpg">
|
||||
<img src="../images/iridium_logo.png">
|
||||
<h1>Iridium Browser Spyware Mitigation Guide</h1>
|
||||
<p>
|
||||
After configuring Iridium according to this guide it's rating changes like so:
|
||||
|
|
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 17 KiB |
Before Width: | Height: | Size: 5.8 KiB After Width: | Height: | Size: 3.8 KiB |
Before Width: | Height: | Size: 4.9 KiB After Width: | Height: | Size: 3.5 KiB |
Before Width: | Height: | Size: 11 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 5.7 KiB After Width: | Height: | Size: 3.1 KiB |
Before Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 24 KiB After Width: | Height: | Size: 31 KiB |
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 17 KiB |
Before Width: | Height: | Size: 11 KiB |
After Width: | Height: | Size: 12 KiB |
Before Width: | Height: | Size: 18 KiB After Width: | Height: | Size: 257 KiB |
Before Width: | Height: | Size: 5.5 KiB After Width: | Height: | Size: 13 KiB |
Before Width: | Height: | Size: 16 KiB After Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 9.4 KiB |
Before Width: | Height: | Size: 24 KiB After Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 8.4 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 14 KiB |
Before Width: | Height: | Size: 22 KiB After Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 6.9 KiB After Width: | Height: | Size: 10 KiB |
Before Width: | Height: | Size: 20 KiB After Width: | Height: | Size: 30 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 8.1 KiB |
Before Width: | Height: | Size: 5.5 KiB After Width: | Height: | Size: 7.2 KiB |
Before Width: | Height: | Size: 29 KiB After Width: | Height: | Size: 48 KiB |
Before Width: | Height: | Size: 4.1 KiB After Width: | Height: | Size: 9.1 KiB |
Before Width: | Height: | Size: 6.7 KiB After Width: | Height: | Size: 451 B |
Before Width: | Height: | Size: 6.5 KiB After Width: | Height: | Size: 9.9 KiB |
Before Width: | Height: | Size: 30 KiB After Width: | Height: | Size: 19 KiB |
After Width: | Height: | Size: 13 KiB |
Before Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 5.9 KiB |
Before Width: | Height: | Size: 13 KiB After Width: | Height: | Size: 20 KiB |
Before Width: | Height: | Size: 9.1 KiB After Width: | Height: | Size: 5.0 KiB |
Before Width: | Height: | Size: 18 KiB |
After Width: | Height: | Size: 10 KiB |
Before Width: | Height: | Size: 9.0 KiB After Width: | Height: | Size: 6.4 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 4.5 KiB |
Before Width: | Height: | Size: 8.3 KiB After Width: | Height: | Size: 3.9 KiB |
55
style.css
|
@ -6,10 +6,14 @@ body {
|
|||
font-family: sans;
|
||||
}
|
||||
p {
|
||||
max-width: 780px;
|
||||
max-width: 780px;
|
||||
margin: auto;
|
||||
}
|
||||
h1, h2, h3, h4, h5 {
|
||||
h1,
|
||||
h2,
|
||||
h3,
|
||||
h4,
|
||||
h5 {
|
||||
text-align: center;
|
||||
margin-right: auto;
|
||||
margin-left: auto;
|
||||
|
@ -22,15 +26,15 @@ h4 {
|
|||
margin-right: auto;
|
||||
margin-left: 1vw;
|
||||
}
|
||||
a {
|
||||
color: #006B9F;
|
||||
}
|
||||
a:hover {
|
||||
color: #094561;
|
||||
}
|
||||
:target a {
|
||||
color: #959800;
|
||||
}
|
||||
a {
|
||||
color: #006b9f;
|
||||
}
|
||||
a:hover {
|
||||
color: #094561;
|
||||
}
|
||||
.img-link a:hover {
|
||||
border: none;
|
||||
}
|
||||
|
@ -49,19 +53,21 @@ img {
|
|||
width: 780px;
|
||||
}
|
||||
hr {
|
||||
border: 1px solid #1A1A1A;
|
||||
border: 1px solid #1a1a1a;
|
||||
}
|
||||
ul {
|
||||
max-width: 780px;
|
||||
max-width: 780px;
|
||||
margin-left: auto;
|
||||
margin-right: auto;
|
||||
}
|
||||
table, th, td {
|
||||
table,
|
||||
th,
|
||||
td {
|
||||
text-align: center;
|
||||
border: 1px solid white;
|
||||
margin-left: auto;
|
||||
margin-right: auto;
|
||||
max-width: 780px;
|
||||
max-width: 780px;
|
||||
}
|
||||
td {
|
||||
padding-right: 10px;
|
||||
|
@ -79,7 +85,7 @@ code {
|
|||
padding-right: 5px;
|
||||
}
|
||||
ol {
|
||||
max-width: 780px;
|
||||
max-width: 780px;
|
||||
margin-left: auto;
|
||||
margin-right: auto;
|
||||
}
|
||||
|
@ -98,7 +104,7 @@ xmp {
|
|||
margin-right: auto;
|
||||
margin-top: 10px;
|
||||
margin-bottom: 10px;
|
||||
max-width: 500px;
|
||||
max-width: 500px;
|
||||
}
|
||||
.nav {
|
||||
margin-top: 0.5vh;
|
||||
|
@ -115,23 +121,26 @@ xmp {
|
|||
.nav a {
|
||||
text-decoration: none;
|
||||
}
|
||||
.lime {
|
||||
color: #00ff00;
|
||||
}
|
||||
.green {
|
||||
color: #00981B;
|
||||
color: #00981b;
|
||||
}
|
||||
.yellowgreen {
|
||||
color: #C8E63C;
|
||||
color: #c8e63c;
|
||||
}
|
||||
.yellow {
|
||||
color: #FFFF00;
|
||||
color: #ffff00;
|
||||
}
|
||||
.orange {
|
||||
color: #FF6100;
|
||||
color: #ff6100;
|
||||
}
|
||||
.red {
|
||||
color: #FF0000;
|
||||
color: #ff0000;
|
||||
}
|
||||
.case {
|
||||
border: 2px solid #1A1A1A;
|
||||
border: 2px solid #1a1a1a;
|
||||
border-radius: 15px;
|
||||
margin-left: 3vw;
|
||||
margin-right: 3vw;
|
||||
|
@ -144,10 +153,12 @@ xmp {
|
|||
.main {
|
||||
min-height: 60vh;
|
||||
}
|
||||
.sources, .futher {
|
||||
.sources,
|
||||
.futher {
|
||||
text-align: left;
|
||||
}
|
||||
.footer, .center {
|
||||
.footer,
|
||||
.center {
|
||||
margin-top: 1vh;
|
||||
text-align: center;
|
||||
}
|
||||
|
|