Merge pull request 'Update a lot of the articles to the new design' (#10) from Umbreon/SpywareWatchdog:master into master

Reviewed-on: https://codeberg.org/TheShadow/SpywareWatchdog/pulls/10
This commit is contained in:
Baobab 2020-07-29 19:08:48 +02:00
commit 69d2925d12
100 changed files with 2140 additions and 1226 deletions

View File

@ -1,42 +1,60 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
/>
<title>1Password - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body>
<h1>1Password</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/1pw_logo.png" alt="1password Logo">
<p>
1password is a password management service
</p>
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
<p>
This article is a stub and sitll needs to be written. If you want to write it, email me so I dont duplicate effort.
</p>
<p>
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
</p>
<p>
>Third-Party Data Processors
>Your Secure and Service data are held by third party data processors, who provide us with hosting and other infrastructure services. The locations of these are described above. In many cases (but we cannot promise that this will always be the case) even Service data held by these entities is encrypted with keys held only by us.
>Data needed to process payments is collected by our payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy Shield Framework. See https://stripe.com/privacy-shield-policy
</p> <body>
<hr> <div class="case">
<p><b> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
This article was created on 6/16/2018 <div class="main">
</b></p> <img src="../images/1pw_logo.png" alt="1Password Logo" />
<p><b> <h1>1Password</h1>
This article was last edited on 6/16/2018
</b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. 1password is a password management service
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a> <h2>Spyware Level: <span class="red">Not Rated</span></h2>
<p>
This article is a stub and still needs to be written. If you want to
write it, email me so I dont duplicate effort.
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
>Third-Party Data Processors >Your Secure and Service data are held by
third party data processors, who provide us with hosting and other
infrastructure services. The locations of these are described above.
In many cases (but we cannot promise that this will always be the
case) even Service data held by these entities is encrypted with keys
held only by us. >Data needed to process payments is collected by our
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
Shield Framework. See https://stripe.com/privacy-shield-policy
</p>
</div>
<hr />
<div class="footer">
<b>This article was created on 6/16/2018</b><br />
<b>This article was last edited on 6/16/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,68 +1,144 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
/>
<title>AMD - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>
<span class="red">UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</span>
</h1>
<img src="../images/amd_logo.png" alt="amd Logo" />
<h1>AMD CPU Family</h1> <h1>AMD CPU Family</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/amd_logo.png" alt="One of the logos AMD uses for its CPU's">
<h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1>
<p> <p>
Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the This part of the article should have the name of the program and what
article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this it does, and who develops it.
article.
</p> </p>
<p> <p>
Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O. Advanced Micro Devices, Inc. is an American multinational
<sup><a href="#1">[1]</a></sup> semiconductor company based in Santa Clara, California, that develops
computer processors and related technologies for business and consumer
markets. This article is specifically about the CPU's that are
produced by AMD and nothing else. The logo is one of many logos used
by AMD, but the article is not about any one specific CPU.
<b>No rating is given</b> because this is not an article about any
specific product, and the rating system is difficult to fit into this
article.
</p> </p>
<p> <p>
This article isn't complete. This is a work-in-progress and so this article is not formatted properly.. Modern CPU models produced by AMD contain an embedded ARM co-processor
called the Platform Security Processor (PSP). Nearly all AMD CPU's
produced since 2013 operate under the supervision of this separate,
more privileged, environment consisting of an integrated ARM processor
with access to isolated resources as well as main system memory and
I/O.
<sup><a href="#s1">[1]</a></sup>
</p>
<p>
This article isn't complete. This is a work-in-progress and so this
article is not formatted properly..
</p>
<p>
http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
(page 11)
</p>
<p>
While ARM and AMD tout the “Trusted Execution Environment” as useful
for secure payment, anti-theft and malware protection, they also
discuss content protection or DRM as a use case.
https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
</p> </p>
<p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p>
<p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p>
<p>Possible uses … DRM</p> <p>Possible uses … DRM</p>
<p> <p>
Researchers have already been able to identify exploits in AMDs Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSPs TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire) Researchers have already been able to identify exploits in AMDs
Platform Security Processor. In 2018 researchers published a
vulnerability in which a specially crafted certificate could lead to a
stack overflow in the PSPs TPM firmware allowing for remote code
execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
group goes on to detail how an attacker might leverage exploits
RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
systems.
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
</p> </p>
<hr> <hr/>
<p>Please note that Family 16h and <p>
Please note that Family 16h and Family 15h-Models60h and later contain
Family 15h-Models60h and later contain a PSP</p> a PSP
<h2><font color=red>NOT TRUSTED:</font></h2> </p>
<h2><font color="red">NOT TRUSTED:</font></h2>
<ul> <ul>
<li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6) <li>
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li> Kaveri (Steamroller “BDv3”)
<li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li> https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
(page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
</li>
<li>
Carrizo/Bristol Ridge (Excavator “BDv4”)
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
</li>
<li>All Zen based CPUs (17h family)</li> <li>All Zen based CPUs (17h family)</li>
</ul> </ul>
<h2><font color=yellow>POTENTIALLY TRUSTED:</font></h2> <h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
<ul> <ul>
<li>Jaguar (the only 16h family CPU that does NOT have PSP): http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip (page 8) https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar</li> <li>
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li> Jaguar (the only 16h family CPU that does NOT have PSP):
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li> http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
(page 8)
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
</ul> </ul>
<hr> </div>
<h2>Sources</h2> <hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>AMD Security and Server innovation</a
>
<a
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>[web.archive.org]</a
>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 1/10/2019</b>
<!--Dont change-->
<p> <p>
<a name="1">1.</a> If you want to edit this article, or contribute your own article(s),
<a href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">AMD Security and Server innovation</a> contact us on XMPP over in spyware@conference.nuegia.net, or visit us
<a href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">[web.archive.org]</a> at the git repo on
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br> <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<hr>
<p><b>
This article was last edited on 1/10/2019
</b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. All contributions must be licensed under the CC0 license to be
accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,91 +1,171 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Bing - Spyware Watchdog</title> <title>Bing - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/bing_logo.png" alt="Bing logo"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/bing_logo.png" alt="Bing Logo" />
<h1>Bing</h1> <h1>Bing</h1>
<p> <p>
Bing is a search engine created and owned by Microsoft. This part of the article should have the name of the program and what
it does, and who develops it.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
Bing is yet another spyware search engine that collects your information and sells it to advertisers. It's strongly recommended that you Bing is yet another spyware search engine that collects your
do not use Bing. information and sells it to advertisers. It's strongly recommended
that you do not use Bing.
</p> </p>
<p> <p>
At some point Bing had a privacy policy, but Microsoft doesnt seem to be hosting it anymore. So, this article will look at the At some point Bing had a privacy policy, but Microsoft doesnt seem to
Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup> to help us understand what information Bing collects. be hosting it anymore. So, this article will look at the Microsoft
Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us
in great detail what kind of information one single program could be collecting. (although this policy is more specific) understand what information Bing collects. Similarly to the privacy
policies of Google and Apple, the Microsoft privacy statement eclipses
the entire spyware platform and does not help you understand in great
detail what kind of information one single program could be
collecting. (although this policy is more specific)
</p> </p>
<h3>Bing collects your search history</h3> <h3>Bing collects your search history</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <p>
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
>:
</p>
<p><i> <p>
"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described <i>
below...You provide some of this data directly, such as when you...submit a search query to Bing" "Microsoft collects data from you, through our interactions with you
</i></p> and through our products for a variety of purposes described
below...You provide some of this data directly, such as when
you...submit a search query to Bing"
</i>
</p>
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your: <p>
<i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as Later in the Interactions -> Device and usage data section of this
picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p> statement, it is clarified again that Microsoft collects your:
<i>"Browse History. Data about the web pages you visit."</i>, as well
as your:
<i
>"Images. Images and related information, such as picture metadata.
For example, we collect the image you provide when you use a Bing
image-enabled service."</i
>
</p>
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information <p>
in a process that takes 18 months to complete.<p> Microsoft claims to store this information for an unlimited amount of
time, but it claims that it will eventually anonymize this information
in a process that takes 18 months to complete.
</p>
<p></p>
<p><i> <p>
"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify <i>
stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. " "Has Microsoft adopted and announced a specific retention period for
</i></p> a certain data type? For example, for Bing search queries, we
de-identify stored queries by removing the entirety of the IP
address after 6 months, and cookie IDs and other cross-session
identifiers after 18 months. "
</i>
</p>
<h3>Bing uses your search history to profile you for advertising</h3> <h3>Bing uses your search history to profile you for advertising</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i>
"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."
</i></p>
<p> <p>
So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
advertising. And of course, this is confirmed in this section: >:
</p>
<p>
<i>
"Microsoft may use data we collect to select and deliver some of the
ads you see on Microsoft web properties, such as Microsoft.com, MSN
and Bing."
</i>
</p>
<p>
So since your search history is part of the "data we collect", the
natrual conclusion is that, your search queiries are being used to
profile you for advertising. And of course, this is confirmed in this
section:
</p> </p>
<p><i> <p>
"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how <i>
you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements "The ads that you see may be selected based on data we process about
about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle." you, such as your interests and favorites, your location, your
</i></p> transactions, how you use our products,
<b>
<font color="red"> your search queries </font>
</b>
, or the content you view. For example, if you view content on MSN
about automobiles, we may show advertisements about cars; if you
search “pizza places in Seattle” on Bing, you may see advertisements
in your search results for restaurants in Seattle."
</i>
</p>
<h3>Bing sells your search history to other spyware platforms</h3> <h3>Bing sells your search history to other spyware platforms</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i>
"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products,
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. "
</i></p>
<hr>
<center>
<h2>Sources</h2>
<p> <p>
<a name="1">1.</a> From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
<a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a> >:
<a href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement">[web.archive.org]</a>
<a href="https://archive.li/u7eZJ">[archive.li]</a><br>
</p> </p>
<hr>
<p><b>
This article was last edited on 5/30/2018
</b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <i>
"We may share data we collect with third parties, such as Oath,
AppNexus, or Facebook (see below), so that the ads you see in our
products, their products, or other sites and apps serviced by these
partners are more relevant and valuable to you. "
</i>
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> </div>
<p><a href="../articles/index.html">Back to catalog</a></p> <hr />
</center> <div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://privacy.microsoft.com/en-us/privacystatement"
>Microsoft Privacy Statement</a
>
<a
href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement"
>[web.archive.org]</a
>
<a href="https://archive.li/u7eZJ">[archive.li]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 5/30/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,125 +1,306 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Outdated Brave - Spyware Watchdog</title> <title>Outdated Brave - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/brave_logo.png" alt="Brave logo"> <div class="case">
<h1>Brave Browser</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<h3><font color=red>Note: This article is outdated. I will try to update it soon. </font></h3> <div class="main">
<br> <img src="../images/brave_logo.png" alt="Brave Logo" />
<h1>Brave</h1>
<h2>
<font color="red"
>Note: This article is outdated. I will try to update it soon.
</font>
</h2>
<p> <p>
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup> With the built-in privacy protections, some would seem to agree with that. Let's see how it stacks up when we take everything into account. Brave Browser is a Chromium fork with many interesting features not
found elsewhere, such as built-in Adblock and other extensions,
fingerprinting protection, cleaner Preferences menu than other Chrome
forks, and the (opt-in) ability to automatically support (pay) the
websites you visit. The developers describe it as
<i>"A browser with your interests at heart."</i
><sup><a href="#s1">[1]</a></sup> With the built-in privacy
protections, some would seem to agree with that. Let's see how it
stacks up when we take everything into account.
</p> </p>
<h2>Spyware Level: <font color=orange>High</font></h2> <h2>Spyware Level: <span class="orange">High</span></h2>
<p> <p>
Auto-updates that can be turned off only by hacky workarounds. <a href="../articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="../articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are. Auto-updates that can be turned off only by hacky workarounds.
<a href="../articles/google.html">Google</a> as default search engine.
Analytics on Brave's home page. Two other requests made at each start
of Brave. Whitelisting spyware from Facebook and Twitter.<sup
><a href="#s5">[5]</a></sup
>
Has some decent privacy protections built in, but uMatrix is still
better. Some privacy features are there by default, but, it's still
trying to work with advertisers (same as Mozilla did with their
Sponsored Tiles). Despite claiming to be
<i>"A browser with your interests at heart."</i
><sup><a href="#s1">[1]</a></sup
>, it has <a href="../articles/google.html">Google</a> as default
search engine, as well as shitty forced updates. Anyway, despite the
privacy protections, you should stay away from this browser - it seems
to have a "mission" to switch the internet to its version of
"user-respecting" ads, (we know how that turned out for Mozilla), and
that's slimy and suspicious. Beyond that it has repeatedly shown
itself to be dishonest and disingenuous about what it's mission and
goals and operations are.
</p> </p>
<h3>Whitelisting spyware from Facebook and Twitter</h3> <h3>Whitelisting spyware from Facebook and Twitter</h3>
<p> <p>
On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. Its our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware On it's website, Brave claims that
scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of <i
it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about >"Brave fights malware and prevents tracking, keeping your
supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation: information safe and secure. Its our top priority."</i
><sup><a href="#s6">[6]</a></sup
>. Yet despite this claim, Brave actually
<b><font color="red">disables</font></b> its tracking protections for
Facebook and Twitter's spyware scripts that allow them to track people
across the web.<sup><a href="#s5">[5]</a></sup> Brave's spyware
protections, and any claims that it makes to work in the interests of
it's users,
<b><font color="orange">cannot be taken seriously.</font></b> Brave is
actively working
<b><font color="red">against its users</font></b> while lying to them
about supposed privacy protections that it offers. This problem
becomes even more serious when you take into account Brave's response
to this situation:
</p> </p>
<p><i>
"Loading a script from an edge-cache does not track a user without third-party cookies or equivalent browser-local storage, which Brave always blocks and always will block. In other words, sending requests and receiving responses without cookies or other means of identifying users does not necessarily create a tracking threat."
</i><sup><a href="#7">[7]</a></sup></p>
<p> <p>
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit right now, to see just how much information a JavaScript program designed to track you can get. <i>
"Loading a script from an edge-cache does not track a user without
third-party cookies or equivalent browser-local storage, which Brave
always blocks and always will block. In other words, sending
requests and receiving responses without cookies or other means of
identifying users does not necessarily create a tracking threat."
</i>
<sup>
<a href="#s7">[7]</a>
</sup>
</p>
<p>
This statement is just,
<b>
<font color="red">completely wrong</font>
</b>
. Just because a website isn't able to store cookies, does not mean
that it cannot uniquely identify you. Executing JavaScript spyware
from Facebook and Twitter is
<b>
more than enough.
</b>
Blocking cookies is not going to stop them from tracking you. This
isn't even information that is difficult to verify. There are many
websites that you can visit right now, to see just how much
information a JavaScript program designed to track you can get.
</p> </p>
<center> <center>
<p> <p>
Here are a few: Here are a few:
<br> <br />
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br> <a href="https://browserleaks.com/">https://browserleaks.com/</a>
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a><br> <br />
</center> <a href="https://panopticlick.eff.org/"
>https://panopticlick.eff.org/</a
>
<br />
</p> </p>
</center>
<h3>Auto-updates</h3> <h3>Auto-updates</h3>
<p> <p>
Brave will check for updates every time you run it, and you CANNOT turn it off (except through fiddling with DNS and such) ! What is the devs' answer? From their GitHub page<sup><a href="#2">[2]</a></sup>: </p> Brave will check for updates every time you run it, and you CANNOT
turn it off (except through fiddling with DNS and such) ! What is the
devs' answer? From their GitHub page
<sup><a href="#s2">[2]</a></sup
>:
</p>
<p><i>"We don't plan on adding in UI to disable updates, but users can easily adjust environment variables if they really want to put themselves at risk."</i></p> <p>
<i>
"We don't plan on adding in UI to disable updates, but users can
easily adjust environment variables if they really want to put
themselves at risk."
</i>
</p>
<p>and</p> <p>and</p>
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p> <p>
<i>
"i feel that being able to figure out how to do this is a
sufficiently high bar for users who want to turn off autoupdating
(to prove they know what they're doing and understand the security
implications)"
</i>
</p>
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. Extensions are also updated often. <img class="screenshot" src="../images/brave_partners.png"> <p>
So according to the devs, you have to hunt down random internet
comments to be able to disable auto-updating. Brave will also update
what looks like the list of its "partners" every time you run it.
Extensions are also updated often.
<img class="screenshot" src="../images/brave_partners.png" />
</p> </p>
<h3>Anti-privacy search engine by default</h3> <h3>Anti-privacy search engine by default</h3>
<p> <p>
<a href="../articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all. <a href="../articles/google.html">Google</a>
is the default search engine of Brave, and the issues with it are well
known and would take a book to describe them all.
</p> </p>
<h3>Brave's start page contains analytics</h3> <h3>Brave's start page contains analytics</h3>
<p> <p>
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img class="screenshot" src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page. Brave will connect to its home page, https://brave.com, automatically
on the first run of Brave, and that page contains Piwik's analytics
scripts. This is the full request:
<img class="screenshot" src="../images/brave_piwik.png" />
It will also make a connection to Google to download some fonts. You
can disable these on subsequent runs by changing the start page.
</p> </p>
<h3>Crash reports</h3> <h3>Crash reports</h3>
<p>Enabled by default, but can be disabled from the preferences menu.</p> <p>
Enabled by default, but can be disabled from the preferences menu.
</p>
<h3>Other requests</h3> <h3>Other requests</h3>
<p>Brave will make a connection to this site every time it is started up: <img class="screenshot" src="../images/brave_bat.png"> It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request which downloads the rulesets for HTTPS Everywhere: <img class="screenshot" src="../images/brave_httpse.png"></p> <p>
Brave will make a connection to this site every time it is started up:
<img class="screenshot" src="../images/brave_bat.png" />
It probably has something to do with their project of working with
advertisers to provide more relevant targeted ads, which sounds pretty
disgusting, but can be turned off ("Notify me about token
promotions"). You can read more about it here
<sup><a href="#s3">[3]</a></sup>
.It will also make this request which downloads the rulesets for HTTPS
Everywhere:
<img class="screenshot" src="../images/brave_httpse.png" />
</p>
<h3>Brave's privacy protections</h3> <h3>Brave's privacy protections</h3>
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works).
</p>
<hr>
<center>
<h2>Credits</h2>
<p> <p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br> Brave Browser also contains in-built privacy protections such as HTTPS
Everywhere, AdBlock, cookie blocking, script blocking, and
fingerprinting protections - that are configurable site by site. This
is commendable of course, but in the end, uMatrix outclasses them.
Trackers, for example, easily avoid pure AdBlock (so you will be
tracked by Facebook and such), and binary script blocking breaks
sites. Nice effort on Brave's part though, and the fingerprinting
protection I don't think is found in any other browser (but I didn't
confirm if it actually works).
</p>
</div>
<hr />
<div class="footer">
<div>
<h4>Credits</h4>
<ol>
This article was written by
<a href="https://digdeeper.neocities.org/"
>digdeeper.neocities.org</a
><br />
Formatting changes were done by the site maintainer. Formatting changes were done by the site maintainer.
</p> </ol>
<hr> </div>
<h2>Sources</h2> <hr />
<p> <div class="sources">
<a name="1">1.</a> <h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://brave.com">Brave's website</a> <a href="https://brave.com">Brave's website</a>
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a> <a
<br> href="https://web.archive.org/web/20180609070708/https://brave.com"
<a name="2">2.</a> >[web.archive.org]</a
<a href="https://github.com/brave/browser-laptop/issues/1877">How to stop autoupdate of brave?</a> >
<a href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877">[web.archive.org]</a> </li>
<a href="https://archive.li/AJZr5">[archive.li]</a><br> <li id="s2">
<a name="3">3.</a> <a href="https://github.com/brave/browser-laptop/issues/1877"
<a href="https://basicattentiontoken.org">Basic Attention Token</a> >How to stop autoupdate of brave?</a
<a href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org">[web.archive.org]</a> >
<a href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org">[wayback.archive-it.org]</a><br> <a
<a name="4">4.</a> href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877"
<a href="https://laptop-updates.brave.com/promo/custom-headers">Laptop Headers</a> >[web.archive.org]</a
<a href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers">[web.archive.org]</a> >
<a href="https://archive.fo/ecx6L">[archive.fo]</a><br> <a href="https://archive.li/AJZr5">[archive.li]</a>
<a name="5">5.</a> </li>
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a> <li id="s3">
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a> <a href="https://basicattentiontoken.org"
<a href="https://archive.fo/X98Xz">[archive.fo]</a><br> >Basic Attention Token</a
>
<a name="6">6.</a> <a
href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org"
>[web.archive.org]</a
>
<a
href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org"
>[wayback.archive-it.org]</a
>
</li>
<li id="s4">
<a href="https://laptop-updates.brave.com/promo/custom-headers"
>Laptop Headers</a
>
<a
href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers"
>[web.archive.org]</a
>
<a href="https://archive.fo/ecx6L">[archive.fo]</a>
</li>
<li id="s5">
<a
href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>Facebook, Twitter Trackers Whitelisted by Brave Browser</a
>
<a
href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>[web.archive.org]</a
>
<a href="https://archive.fo/X98Xz">[archive.fo]</a>
</li>
<li id="s6">
<a href="https://brave.com/features/">Brave Browser Features</a> <a href="https://brave.com/features/">Brave Browser Features</a>
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br> <a
href="http://web.archive.org/web/20190124134301/https://brave.com/features/"
<a name="7">7.</a> >[web.archive.org]</a
<a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a> >
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a> </li>
<a href="http://archive.fo/Qopen">[archive.fo]</a><br> <li id="s7">
<a href="https://brave.com/script-blocking-exceptions-update/"
</p> >Script Blocking Exceptions Update</a
<hr> >
<p><b> <a
This article was last edited on 2/13/2019 href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/"
</b></p> >[web.archive.org]</a
<p><b> >
This article was created on 5/7/2018 <a href="http://archive.fo/Qopen">[archive.fo]</a>
</b></p> </li>
</ol>
</div>
<hr />
<b>This article was created on 5/7/2018</b><br />
<b>This article was last edited on 2/13/2019</b>
<!--Dont change-->
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <p>
<p><a href="../articles/index.html">Back to catalog</a></p> All contributions must be licensed under the CC0 license to be
</center> accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,142 +1,302 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Comparison between web browsers - Spyware Watchdog</title> <title>Comparison between web browsers - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<center> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>Comparison between web browsers</h1> <h1>Comparison between web browsers</h1>
<p> <p>
This purpose of this article is not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the This purpose of this article is not to rate each web browser in a
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how vaccum, like articles on this website that focus on one specific web
much privacy can be gained by configuring it. browser, but rather to compare all of the web browsers that have been
rated on this website against each other. This is a ranking that is
based on how much Pirvacy a browser offers by default, as well as, how
much privacy can be gained by configuring it.
</p> </p>
<h2><font color=lime>Top Tier - Best Privacy</font></h2> <h2><span class="lime">Top Tier - Best Privacy</span></h2>
<p> <p>
These are all browsers that require a minimal amount of configuration and can achive the required level of privacy needed to browse the modern web- compatibility with a These are all browsers that require a minimal amount of configuration
comperhensive suite of content-blocking extensions that can block spyware providers correctly and fully. Iridium and Pale Moon both are configured in a way that leaks and can achive the required level of privacy needed to browse the
user information and thus require additional configuration. modern web- compatibility with a comperhensive suite of
content-blocking extensions that can block spyware providers correctly
and fully. Iridium and Pale Moon both are configured in a way that
leaks user information and thus require additional configuration.
</p> </p>
<table> <table>
<center>
<tbody>
<tr> <tr>
<td><center><img src="../images/tor_logo.png" alt="TOR Logo"></center></td> <td>
<td><center><img src="../images/icecat_logo.png" alt="GNU IceCat Logo"></center></td> <img src="../images/tor_browser_logo.png" alt="TOR Logo" />
<td><center><img src="../images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td> </td>
<td><center><img src="../images/iridium_logo.jpg" alt="Iridium Logo"></center></td> <td>
<td><center><img src="../images/palemoon_logo.png" alt="Pale Moon Logo"></center></td> <img src="../images/icecat_logo.png" alt="GNU IceCat Logo" />
</td>
<td>
<img
src="../images/chromium_logo.png"
alt="Ungoogled Chromium Logo"
/>
</td>
<td>
<img src="../images/iridium_logo.png" alt="Iridium Logo" />
</td>
<td>
<img src="../images/palemoon_logo.png" alt="Pale Moon Logo" />
</td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="../articles/tor.html">TOR Browser</a></b></center></td> <td>
<td><center><b><a href="../articles/icecat.html">GNU IceCat</a></b></center></td> <b><a href="../articles/tor.html">TOR Browser</a></b>
<td><center><b><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td> </td>
<td><center><b><a href="../articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td> <td>
<td><center><b><a href="../articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td> <b><a href="../articles/icecat.html">GNU IceCat</a></b>
</td>
<td>
<b
><a href="../articles/ungoogled_chromium.html"
>Ungoogled Chromium</a
></b
>
</td>
<td>
<b><a href="../articles/iridium.html">Iridium Browser</a></b
><br /><small
><a href="../guides/iridium.html"
>Configuration Guide</a
></small
>
</td>
<td>
<b><a href="../articles/palemoon.html">Pale Moon</a></b
><br /><small
><a href="../guides/palemoon.html"
>Configuration Guide</a
></small
>
</td>
</tr> </tr>
</table> </tbody>
<h2><font color=lime>High Tier - Good Privacy</font></h2>
<p>
These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and
do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer.
</p>
<table>
<tr>
<td><center><img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td>
<td><center><img src="../images/falkon_logo.png" alt="Falkon Logo"></center></td>
</tr>
<tr>
<td><center><b><a href="../articles/otter.html">Otter Browser</a></b></center></td>
<td><center><b><a href="../articles/falkon.html">Falkon</a></b></center></td>
</tr>
</table>
<h2><font color=yellow>Mid Tier - Ok Privacy</font></h2>
<p>
These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't
have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers.
</p>
<table>
<tr>
<td><center><img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td>
<td><center><img src="../images/sphere_logo.png" alt="SphereLogo"></center></td>
</tr>
<tr>
<td><center><b><a href="../articles/qutebrowser.html">Qutebrowser</a></b></center></td>
<td><center><b><a href="../articles/sphere.html">Sphere Browser</a></b></center></td>
</tr>
</table>
<h2><font color=orange>Low Tier - Poor Privacy</font></h2>
<p>
These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general.
Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point
where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys
going to be better to pick a browser higher on this list.
<table>
<tr>
<td><center><img src="../images/waterfox logo.png" alt="Waterfox Logo"></center></td>
<td><img src="../images/brave_logo.png" alt="Brave logo"></td>
<td><img src="../images/firefox_logo.png" alt="firefox Logo"></td>
<td><img src="../images/vivaldi_logo.png" alt="vivaldi Logo"></td>
<td><img src="../images/dissenter_logo.png" alt="Dissenter Logo"></td>
</tr>
<tr>
<td><center><b><a href="../articles/waterfox.html">Waterfox</a></b></center></td>
<td><center><b><a href="../articles/brave.html">Brave</a></b></center></td>
<td><center><b><a href="../articles/firefox.html">Firefox</a></b></center></td>
<td><center><b><a href="../articles/vivaldi.html">Vivaldi</a></b></center></td>
<td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td>
</tr>
</table>
<h2><font color=red>Rock Bottom - No Privacy</font></h2>
<p>
These browsers are unashamedly designed to collect as much information about the user as possible (all are rated EXTREMELY HIGH by the site). Only SRWare Iron has it's source code availible, and all the developers have mistreated their users (complete disregard for privacy and / or false advertising) for a long time. These browsers are actively hostile against their users and thus should not be used at all.
</p>
<table>
<tr>
<td> <img src="../images/chrome_logo.png" alt="chrome logo"></td>
<td> <img src="../images/opera_logo.png" alt="opera logo"></td>
<td> <img src="../images/slimjet_logo.png" alt="SlimJet logo"></td>
<td> <img src="../images/webdiscover_logo.png" alt="WebDiscover logo"></td>
<td> <img src="../images/srware_logo.png" alt="Iron logo"></td>
</tr>
<tr>
<td><center><b><a href="../articles/chrome.html">Google Chrome</a></b></center></td>
<td><center><b><a href="../articles/opera.html">Opera</a></b></center></td>
<td><center><b><a href="../articles/slimjet.html">SlimJet</a></b></center></td>
<td><center><b><a href="../articles/webdiscover.html">WebDiscover</a></b></center></td>
<td><center><b><a href="../articles/iron.html">SRWare Iron</a></b></center></td>
</tr>
</table>
<hr>
<h2>Further Reading</h2>
<p>
This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people,
with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide
to make your decision, so, you should probably read a few more, these are some good ones.
</p>
<a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper - How to choose a browser for everyday use?</a><br>
<a href="https://clarkycat.neocities.org/browser.html">Clarkycat - Browser Recommendation and Addons</a><br>
<hr>
<p><b>
This article was last edited on 2/20/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center> </center>
</table>
<h2><span class="lime">High Tier - Good Privacy</span></h2>
<p>
These browsers do not have privacy issues, but they also do not have
enough privacy features to make it to the highest tier. These browsers
both have simple ad-blockers, and do not have any privacy issues,
however, these tools are not as good as the comperhensive privacy
tools that Top Tier browsers offer.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img
src="../images/otter_browser_logo.png"
alt="Otter Browser Logo"
/>
</td>
<td>
<img src="../images/falkon_logo.png" alt="Falkon Logo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/otter.html">Otter Browser</a></b>
</td>
<td>
<b><a href="../articles/falkon.html">Falkon</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="yellow">Mid Tier - Ok Privacy</span></h2>
<p>
These browsers do not have any big privacy flaws, but they also do not
have sufficent privacy protections. Qutebrowser has a very basic
adblocker in it. Both browsers don't have access to extensions either.
So, it's just not enough to be able to browse the modern web
privately, despite the developers not putting spyware into their
browsers.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img
src="../images/qutebrowser_logo.png"
alt="Qutebrowser Logo"
/>
</td>
<td>
<img src="../images/sphere_logo.png" alt="SphereLogo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/qutebrowser.html">Qutebrowser</a></b>
</td>
<td>
<b><a href="../articles/sphere.html">Sphere Browser</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="orange">Low Tier - Poor Privacy</span></h2>
<p>
These browsers do not protect your privacy, but they are not in the
lowest tier since they still have something to offer, although, they
should not be used in general. Vivaldi does not let you disable all of
the spyware features, Brave whitelists trackers and has forced
updates, and Firefox and Waterfox are loaded with spyware, to the
point where configuring them is so
<a href="https://github.com/intika/Librefox">non-trivial</a> that you
might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging
out all of the spyware features (and repeating the process every time
the browser is updated). It's awalys going to be better to pick a
browser higher on this list.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/waterfox_logo.png" alt="Waterfox Logo" />
</td>
<td><img src="../images/brave_logo.png" alt="Brave logo" /></td>
<td>
<img src="../images/firefox_logo3.svg" alt="firefox Logo" />
</td>
<td>
<img src="../images/vivaldi_logo.png" alt="vivaldi Logo" />
</td>
<td>
<img src="../images/dissenter_logo.png"alt="Dissenter Logo"/>
</td>
</tr>
<tr>
<td>
<b><a href="../articles/waterfox.html">Waterfox</a></b>
</td>
<td>
<b><a href="../articles/brave.html">Brave</a></b>
</td>
<td>
<b><a href="../articles/firefox.html">Firefox</a></b>
</td>
<td>
<b><a href="../articles/vivaldi.html">Vivaldi</a></b>
</td>
<td>
<b><a href="../articles/dissenter.html">Dissenter</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="red">Rock Bottom - No Privacy</span></h2>
<p>
These browsers are unashamedly designed to collect as much information
about the user as possible (all are rated EXTREMELY HIGH by the site).
Only SRWare Iron has it's source code availible, and all the
developers have mistreated their users (complete disregard for privacy
and / or false advertising) for a long time. These browsers are
actively hostile against their users and thus should not be used at
all.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/chrome_logo.png" alt="chrome logo" />
</td>
<td><img src="../images/opera_logo.png" alt="opera logo" /></td>
<td>
<img src="../images/slimjet_logo.png" alt="SlimJet logo" />
</td>
<td>
<img
src="../images/webdiscover_logo.png"
alt="WebDiscover logo"
/>
</td>
<td><img src="../images/srware_logo.png" alt="Iron logo" /></td>
</tr>
<tr>
<td>
<b><a href="../articles/chrome.html">Google Chrome</a></b>
</td>
<td>
<b><a href="../articles/opera.html">Opera</a></b>
</td>
<td>
<b><a href="../articles/slimjet.html">SlimJet</a></b>
</td>
<td>
<b><a href="../articles/webdiscover.html">WebDiscover</a></b>
</td>
<td>
<b><a href="../articles/iron.html">SRWare Iron</a></b>
</td>
</tr>
</tbody>
</center>
</table>
</div>
<hr />
<div class="footer">
<div>
<h4>Further Reading:</h4>
<ol>
<p>
This isn't the only guide on what web browser to pick, with an
emphasis on privacy, to exist, and many other people, with their
own knowlege and prespectives, have written their own guides. It
would be a waste to only read one guide to make your decision, so,
you should probably read a few more, these are some good ones.
<br /><a
href="https://digdeeper.neocities.org/ghost/browsers.html"
>Digdeeper - How to choose a browser for everyday use?</a
>
<br /><a href="https://clarkycat.neocities.org/browser.html"
>Clarkycat - Browser Recommendation and Addons</a
>
</p>
</ol>
</div>
<hr />
<b>This article was last edited on 2/20/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,99 +1,177 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>CCleaner - Spyware Watchdog</title> <title>CCleaner - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/ccleaner_logo.png" alt="ccleaner logo"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/ccleaner_logo.png" alt="CCleaner Logo" />
<h1>CCleaner</h1> <h1>CCleaner</h1>
<p> <p>
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer. CCleaner, developed by Piriform, is a utility program used to clean
potentially unwanted files and invalid Windows Registry entries from a
computer.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
CCleaner is spyware that collects your personal information to advertise to you. It also sells your information to third parties so that they can advertise to you. CCleaner is spyware that collects your personal information to
It collects a huge amount of very personal information, like your <b><font color=red>physical location.</font></b> CCleaner uses the technique of privacy policy obfusication advertise to you. It also sells your information to third parties so
where it provides one privacy policy for every single product its company offers, making it more difficult to know what parts of the privacy policy apply to which program. that they can advertise to you. It collects a huge amount of very
personal information, like your
<b><font color="red">physical location.</font></b> CCleaner uses the
technique of privacy policy obfusication where it provides one privacy
policy for every single product its company offers, making it more
difficult to know what parts of the privacy policy apply to which
program.
</p> </p>
<h3>CCleaner collects and sells user information to advertisers</h3> <h3>CCleaner collects and sells user information to advertisers</h3>
<p> <p>
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to CCleaner clearly shows in its privacy settings that it is collecting
information about your comptuer and selling that information to
advertisers: advertisers:
</p> </p>
<img class="screenshot" src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings"> <img
<p>Image Source: <sup><a href="#2">[2]</a></sup></p> class="screenshot"
src="../images/ccleaner_privacy.png"
alt="Ccleaner privacy settings"
/>
<p>
Image Source: <sup><a href="#s2">[2]</a></sup>
</p>
<h3>CCleaner tracks a huge amount of personal information</h3> <h3>CCleaner tracks a huge amount of personal information</h3>
<p> <p>
If we look at the privacy policy, we can see that CCleaner reports the following<sup><a href="#3">[3]</a></sup>: If we look at the privacy policy, we can see that CCleaner reports the
following<sup><a href="#s3">[3]</a></sup
>:
</p> </p>
<ul> <ul>
<li>IP Address <li>IP Address</li>
<li>Unique User ID <li>Unique User ID</li>
<li>Operating System <li>Operating System</li>
<li>Other Avast Products installed <li>Other Avast Products installed</li>
<li><b><font color=red>physical location</font></b> <li>
<b><font color="red">physical location</font></b>
</li>
</ul> </ul>
<p> <p>
Beyond this, CCleaner is integrated with the following spyware platforms, which all collect their own sets of information: Beyond this, CCleaner is integrated with the following spyware
platforms, which all collect their own sets of information:
</p> </p>
<ul> <ul>
<li>Google Analytics <li>Google Analytics</li>
<li>Logentries <li>Logentries</li>
</ul> </ul>
<p> <p>
It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be It would be very time consuming to go through all of those privacy
enough to understand that CCleaner is full of third party spyware, as well as first party spyware. policies (especially because many of these are obfusicated), but it
should be enough to understand that CCleaner is full of third party
spyware, as well as first party spyware.
</p> </p>
<h3>CCleaner sends you spam email</h3> <h3>CCleaner sends you spam email</h3>
<p>From the privacy policy<sup><a href="#3">[3]</a></sup>:</p> <p>
<p><i> From the privacy policy<sup><a href="#s3">[3]</a></sup
"When we collect your email address, we may market our other products and services to you. You may choose to unsubscribe from future email marketing by following the instructions in the email." >:
</i></p> </p>
<p>
<i>
"When we collect your email address, we may market our other
products and services to you. You may choose to unsubscribe from
future email marketing by following the instructions in the email."
</i>
</p> </p>
<h3>CCleaner tracks your physical location</h3> <h3>CCleaner tracks your physical location</h3>
<p> <p>
According to the privacy policy, the ccleaner website tries to track your physical location.<sup><a href="#3">[3]</a></sup> According to the privacy policy, the ccleaner website tries to track
your physical location.<sup><a href="#s3">[3]</a></sup>
</p> </p>
<p><i>
"Our websites use cookies to acquire data that may be used to determine your physical location via your Internet Protocol address (“IP Address”) and automated geolocation techniques, or to acquire basic information about the computer, tablet, or mobile phone that you use to visit us."
</i></p>
<p> <p>
<i>"location data"</i> is also mentioned when talking about the information that ccleaner itself collects about it's users. <i>
"Our websites use cookies to acquire data that may be used to
determine your physical location via your Internet Protocol address
(“IP Address”) and automated geolocation techniques, or to acquire
basic information about the computer, tablet, or mobile phone that
you use to visit us."
</i>
</p>
<p>
<i>"location data"</i> is also mentioned when talking about the
information that ccleaner itself collects about it's users.
</p> </p>
<h3>Past Security Flaws</h3> <h3>Past Security Flaws</h3>
<p> <p>
In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#1">[1]</a></sup> In the past, CCleaner has been compromised and backdoors have been
added to it.<sup><a href="#s1">[1]</a></sup>
</p> </p>
<hr> </div>
<center> <hr />
<h2>Sources</h2> <div class="footer">
<p> <div class="sources">
<a name="1">1.</a> <h4>Sources:</h4>
<a href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"> <ol>
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users <li id="s1">
<a
href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
>
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud
v1.07.3191 for 32-bit Windows users
</a> </a>
<a href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">[web.archive.org]</a><br> <a
<a name="2">2.</a> href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
<a href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">CCleaner Privacy Issue </a> >[web.archive.org]</a
<a href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">[web.archive.org]</a> >
<a href="http://archive.is/HJFBP">[archive.is]</a><br> </li>
<a name="3">3.</a> <li id="s2">
<a href="http://www.ccleaner.com/about/privacy-policy">What Happens to Your Data</a> <a
<a href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy">[web.archive.org]</a> href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
<a href="http://archive.is/HJFBP">[archive.is]</a><br> >CCleaner Privacy Issue
</p> </a>
<hr> <a
<p><b> href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
This article was last edited on 8/21/2018 >[web.archive.org]</a
</b></p> >
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
<li id="s3">
<a href="http://www.ccleaner.com/about/privacy-policy"
>What Happens to Your Data</a
>
<a
href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy"
>[web.archive.org]</a
>
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 8/21/2018</b>
<!--Dont change-->
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <p>
<p><a href="../articles/index.html">Back to catalog</a></p> All contributions must be licensed under the CC0 license to be
</center> accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,48 +1,85 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>CDex - Spyware Watchdog</title> <title>CDex - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/cdex_logo.png" alt="cdex logo"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/cdex_logo.png" alt="CDex Logo" />
<h1>CDex</h1> <h1>CDex</h1>
<p> <p>
CDex is an Open Source Digital Audio CD Extractor. CDex is an Open Source Digital Audio CD Extractor.
</p> </p>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2> <h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
<p> <p>
CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out. CDex's installer bundles it with spyware, and it will randomly suggest
Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but a spyware program to the user, with a chance to opt-out. Usually it
I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2. attempts to bundle itself with the webdiscover browser and one time I
The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my got it to try and offer me an antivirus program, but I wasn't able to
tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open. reproduce this. The program was tested on Windows 7 32-bit with
Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the
program tested was 2.06.
<b
><font color="lime"
>It did not make any connections to the internet</font
></b
>
that my tests were able to find. To test the program I ripped the
audio files out of a CD with both network monitoring programs open.
</p> </p>
<h3>Bundling with spyware</h3> <h3>Bundling with spyware</h3>
<p> <p>
CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be. CDex attempts to bundle it self with the
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users. <a href="../articles/webdiscover.html">WebDiscover</a> web browser.
This is an Opt-out and not an Opt-in like it should be. This program
is spyware, because according to it's privacy policy<sup
><a href="#s1">[1]</a></sup
>, it collects information about it's users.
</p> </p>
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen"> <img
<hr> class="screenshot"
<center> src="../images/cdex_bundling.png"
<h2>Sources</h2> alt="CDex installer spyware opt-out screen"
<p> />
<a name="1">1.</a> </div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a> <a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a> <a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
<a href="http://archive.is/Orpq6">[archive.is]</a><br> <a href="http://archive.is/Orpq6">[archive.is]</a>
</p> </li>
<hr> </ol>
<p><b> </div>
This article was last edited on 7/29/2018 <hr />
</b></p> <b>This article was last edited on 7/29/2018</b>
<!--Dont change-->
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <p>
<p><a href="../articles/index.html">Back to catalog</a></p> All contributions must be licensed under the CC0 license to be
</center> accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,50 +1,72 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Discord - Spyware Watchdog</title> <title>Discord - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/discord_logo.png" alt="Discord-Logo"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/discord_logo.png" alt="Discord Logo" />
<h1>Discord</h1> <h1>Discord</h1>
<center> <center>
<a href="../articles/discord_es.html">Spanish Translation</a> <a href="../articles/discord_es.html">Spanish Translation</a>
</center> </center>
<p> <p>
Discord is an instant messaging application for MacOS, Windows, Linux, Discord is an instant messaging application for MacOS, Windows, Linux,
Android, and iOS. Discord is used to communicate via voice chat and Android, and iOS. Discord is used to communicate via voice chat and
text chat, and has image-sharing and file-sharing capabilities. text chat, and has image-sharing and file-sharing capabilities.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
<font color="lightgreen"> <font color="lightgreen">
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated. Thanks to Richard Stallman for linking to our article
</font><br> <a href="https://stallman.org/discord.html"> here</a>!
The spotlight is very much appreciated.
</font>
<br />
</p> </p>
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a> <a href="../articles/discord.html"
><img
class="icon"
src="../images/discord-no-way-2.gif"
alt="Discord? No Way!"
/></a>
<p> <p>
Discord is spyware because it collects all information that passes Discord is spyware because it collects all information that passes
through its communication platform. As Discord is a centralized through its communication platform. As Discord is a centralized
communication platform, all communications have to go through Discord's communication platform, all communications have to go through
official servers, where all of that information can potentially be Discord's official servers, where all of that information can
recorded. The vast majority of said information has been confirmed potentially be recorded. The vast majority of said information has
to be recorded, such as all communications between users. Discord has been confirmed to be recorded, such as all communications between
also been confirmed to use other spyware features such as various forms users. Discord has also been confirmed to use other spyware features
of telemetry. Discord's main source of income is from investment, from which such as various forms of telemetry. Discord's main source of income is
it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from from investment, from which it has received over $279.3 million
source and the source code for Discord is unavailable. dollars<sup><a href="#s4">[4]</a></sup
>. Discord cannot be built from source and the source code for Discord
is unavailable.
</p> </p>
<h3>Discord does not make its source code available</h3> <h3>Discord does not make its source code available</h3>
<p> <p>
It is impossible to download and examine Discord's source code, It is impossible to download and examine Discord's source code, which
which means that it is impossible to prove that Discord is not means that it is impossible to prove that Discord is not spyware. Any
spyware. Any program which does not make its source code available is program which does not make its source code available is potential
potential spyware. spyware.
</p> </p>
<h3>Discord confirms that it collects large amounts of sensitive user data</h3> <h3>
Discord confirms that it collects large amounts of sensitive user data
</h3>
<p> <p>
Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup> that it collects the following information: Discord explicitly confirms in its privacy policy<sup
><a href="#s1">[1]</a></sup
>
that it collects the following information:
</p> </p>
<ul> <ul>
<li>IP Address</li> <li>IP Address</li>
@ -56,189 +78,341 @@ Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup>
<li>Open rates for e-mail sent by Discord</li> <li>Open rates for e-mail sent by Discord</li>
</ul> </ul>
<p> <p>
Discord does not explictly confirm that it collects this information, but still collects it by default: Discord does not explictly confirm that it collects this information,
but still collects it by default:
</p> </p>
<ul> <ul>
<li>Logs of all of the other programs that are open on your computer</li> <li>
Logs of all of the other programs that are open on your computer
</li>
</ul> </ul>
<p> <p>
The implications of this information can be broken down like this: By The implications of this information can be broken down like this: By
recording your IP address, Discord can track your general location recording your IP address, Discord can track your general location
(about as precise as which county you are in). Discord can also tell (about as precise as which county you are in). Discord can also tell
which devices you use, as it uniquely identifies each device, and how which devices you use, as it uniquely identifies each device, and how
much you use those devices, as it can record your device usage habits much you use those devices, as it can record your device usage habits
(since Discord is usually open in the background so that it can receive (since Discord is usually open in the background so that it can
messages). Discord also records every single interaction you have with receive messages). Discord also records every single interaction you
other users through its service. This means that Discord is confirmed have with other users through its service. This means that Discord is
to log every conversation that you have through Discord, and record confirmed to log every conversation that you have through Discord, and
everything that you say on Discord, and view all images that you send record everything that you say on Discord, and view all images that
through Discord. Therefore, none of your interactions on Discord are you send through Discord. Therefore, none of your interactions on
private. Discord's privacy policy also contains several occurrences of Discord are private. Discord's privacy policy also contains several
phrases such as "including but not limited to," which is an explicit occurrences of phrases such as "including but not limited to," which
confirmation that Discord contains more spyware features that are not is an explicit confirmation that Discord contains more spyware
disclosed to the user. features that are not disclosed to the user.
</p> </p>
<h3>Discord contains features which allow integration with other spyware platforms</h3> <h3>
Discord contains features which allow integration with other spyware
platforms
</h3>
<p> <p>
Discord contains the opt-in spyware feature known as "social media Discord contains the opt-in spyware feature known as "social media
integration." This allows you to sync your persistent user identity integration." This allows you to sync your persistent user identity on
on Discord with your persistent user identity on other spyware Discord with your persistent user identity on other spyware platforms,
platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>, such as Facebook and Twitter. In its privacy policy<sup
Discord has confirmed that if you opt in to this spyware feature, ><a href="#s1">[1]</a></sup
Discord will obtain an undisclosed amount of access to information >, Discord has confirmed that if you opt in to this spyware feature,
obtained about you by the spyware platforms that you choose to sync Discord will obtain an undisclosed amount of access to information
with. obtained about you by the spyware platforms that you choose to sync
with.
</p> </p>
<h3>Discord contains a process logger</h3> <h3>Discord contains a process logger</h3>
<p> <p>
Discord has been confirmed to monitor the open processes on your Discord has been confirmed to monitor the open processes on your
operating system. This is a spyware feature known as a "process logger" operating system. This is a spyware feature known as a "process
that is generally used to record your program usage habits. This was logger" that is generally used to record your program usage habits.
confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup> This was confirmed by the CTO of Discord in a Reddit thread.<sup
In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is ><a href="#s2">[2]</a></sup
mandatory for several features of the platform. The CTO and a Discord engineer go on >
to claim that Discord does not use the process logger to send records In the same thread, the CTO also elaborates that this spyware feature
of the open processes on the user's computer. (the monitoring of processes) is mandatory for several features of the
platform. The CTO and a Discord engineer go on to claim that Discord
does not use the process logger to send records of the open processes
on the user's computer.
</p> </p>
<p> <p>
The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with The test to prove that Discord logs processes was done again by the
the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message" writer with procmon on 4/11/2019 with the features: "Use data to
turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way. customize my Discord Experience" and "Display currently running game
However when setting the "Display currently running game as a status message" turned on, the behavior as a status message" turned off. Discord did
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here: <font color="lime"><b>NOT</b></font> log all of the processes open
this way. However when setting the "Display currently running game as
a status message" turned on, the behavior described in<sup
><a href="#s2">[2]</a></sup
>
was replecated. You can see that behavior here:
</p> </p>
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon"> <img
class="screenshot"
src="../images/discord_process_logging.png"
alt="Discord process logging as described in [2] confirmed with procmon"
/>
<p> <p>
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source It turns out that this feature
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to <font color="lime"><b>can be disabled through the UI.</b></font>
Discord's servers when the process logger is turned on. But it's at least possible to turn it off. Because of the nature of closed-source software it isn't possible for
either this article or the Discord developers to prove how much
information is being sent to Discord's servers when the process logger
is turned on. But it's at least possible to turn it off.
</p> </p>
<h3>Discord uses it's process logging for advertising</h3> <h3>Discord uses it's process logging for advertising</h3>
<p> <p>
Discord shows this in it's privacy option here: Discord shows this in it's privacy option here:
</p> </p>
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness"> <img
class="screenshot"
src="../images/discord_data.png"
alt="Discord process logging usefulness"
/>
<p> <p>
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware), That the process logging features of Discord are now being recorded on
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising Discord's servers as a form of telemetry (spyware), and removes
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build speculation about why this feature exists. It is clarified by Discord
a statistical model of what programs you might buy/lisence in the future.</b></font> that this spyware feature is used for advertising to it's users.<sup
><a href="#s8">[8]</a></sup
>
This means that Discord is
<font color="red"
><b
>recording the programs you have open to build a statistical model
of what programs you might buy/lisence in the future.</b
></font
>
</p> </p>
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising"> <img
class="screenshot"
src="../images/discord_2.png"
alt="Discord confirms process logging is used for advertising"
/>
<h3>Discord tries to force some users to give their Telephone numbers</h3> <h3>
Discord tries to force some users to give their Telephone numbers
</h3>
<p> <p>
Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord Discord will lock users out of it's service and will not allow them to
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out continue using it without giving their phone number or contacting
users isn't known. Discord support. This kind of feature is designed to extract very
personal information out of it's users (phone numbers). The criteria
for locking out users isn't known.
<!--
You can be locked out of your account for spamming
multiple users in dm's a short ammount of time,
This is due to the spam protection
-->
</p> </p>
<img class="screenshot" src="../images/discord_verify.png" alt="discord phone verification"> <img
class="screenshot"
src="../images/discord_verify.png"
alt="discord phone verification"
/>
<h3>Discord receives government requests for your information</h3> <h3>Discord receives government requests for your information</h3>
<p> <p>
Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup> Discord has confirmed in an email correspondence<sup
><a href="#s6">[6]</a></sup
>
that it does receive government requests for information. So, we know that it does receive government requests for information. So, we know
that the government potentially has access to all of the information that the government potentially has access to all of the information
that Discord collects about you. You can read a copy of the email image that Discord collects about you. You can read a copy of the email
posted in the source <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">here</a> in case the link there dies. image posted in the source
<a
href="https://spyware.neocities.org/images/discord%20government%20requests.png"
>here</a
>
in case the link there dies.
</p> </p>
<hr> <hr />
<h2>Speculation on Discord's future</h2> <h2>Speculation on Discord's future</h2>
<p> <p>
It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able It's unknown whether Discord currently is or isn't selling user
to consistently raise new invesment capital, which is at a level where it could reasonably be covering information. Currently Discord has been able to consistently raise new
all of its operating costs. However, Discord, like any other company, is not going to exist in a invesment capital, which is at a level where it could reasonably be
constant state of investment. Discord is going to have to transition away from an investment-financed covering all of its operating costs. However, Discord, like any other
business model to a revenue model that exclusively relies on generating revenue from the users of the company, is not going to exist in a constant state of investment.
platform. Discord is going to have to transition away from an
</p> investment-financed business model to a revenue model that exclusively
<p> relies on generating revenue from the users of the platform.
Discord has several ways of making money. It can lisence emoji's and other features of the program with </p>
Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's
new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However both of these revenue
sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back)
</p>
<p>
If Discord is not able to satisfy it's obligation to it's investors, it has a third option- selling user information
to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it
is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>,
and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy.
This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current
revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble,
it probably will be forced to liquiate this asset.
</p>
<hr>
<center>
<h2>Further Reading</h2>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
<a href="https://archive.is/Q4N9J">[archive.is]</a><br>
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br>
<hr>
<h2>Sources</h2>
<p> <p>
<a name="1">1.</a> Discord has several ways of making money. It can lisence emoji's and
<a href="https://discordapp.com/privacy">Discord Privacy Policy</a> other features of the program with Discord Nitro<sup
<a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a> ><a href="#s5">[5]</a></sup
<a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a><br> >, or it can make money lisencing video games through it's new online
store, as a competitor to <a href="../articles/steam.html">Steam</a>.
However both of these revenue sources may not be enough. Discord has
raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3
million dollars that has to be paid back)
</p>
<p>
If Discord is not able to satisfy it's obligation to it's investors,
it has a third option- selling user information to advertisers.
Discord is already datamining it's users to produce it's
recommendation system,<sup><a href="#s8">[8]</a></sup> which means
that it is already turning it's userbase into extremely valueble,
sellable, advertising data. Discord has 130 million users<sup
><a href="#s7">[7]</a></sup
>, and it can produce a statistical model of what games each user (who
does not opt-out of advertising) owns, plays, and wants to buy. This
is incredibly valueble information that Discord can sell if it cannot
reach it's profit obligations with it's current revenue model. If
Discord is a successful games store, then it wont need to do this. But
if Discord gets in financial trouble, it probably will be forced to
liquiate this asset.
</p>
</div>
<hr />
<div class="footer">
<div class="futher">
<h4>Further Reading:</h4>
<ol>
<a
href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/"
>Friends Don't Let Friends Use Discord</a
>
<a href="https://archive.is/Q4N9J">[archive.is]</a
><br />
<a name="2">2.</a> <a
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a> href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> >Help Me, Tom's Guide: Is Discord Tracking Me?</a
<a href="https://archive.li/qFcQA">[archive.is]</a><br> >
<a
href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
>[archive.is]</a
><br />
<a name="3">3.</a> <a href="https://www.hooktube.com/watch?v=cn4CENr5NV0"
>Why Discord is Trash</a
><br />
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU"
>Why You Shouldn't Use Discord</a
><br />
<a href="http://subvert.pw/res/discord.pdf"
>THE DISCORD SITUATION</a
>
<a
href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf"
>[web.archive.org]</a
>
</ol>
</div>
<hr />
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://discordapp.com/privacy"
>Discord Privacy Policy</a
>
<a
href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
>[web.archive.org]</a
>
<a
href="http://archive.is/20180515102020/https://discordapp.com/privacy"
>[archive.is]</a
>
</li>
<li id="s2">
<a
href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
>Why is Discord recording our open programs and uploading
them?</a
>
<a
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
>[web.archive.org]</a
>
<a href="https://archive.li/qFcQA">[archive.is]</a>
</li>
<li id="s3">
<a href="https://discordapp.com/company">Discord</a> <a href="https://discordapp.com/company">Discord</a>
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> <a
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
>[wayback.archive-it.org]</a
<a name="4">4.</a> >
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <a
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> href="http://archive.is/20170724163442/https://discordapp.com/company"
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> >[archive.is]</a
>
<a name="5">5.</a> </li>
<li id="s4">
<a href="https://www.crunchbase.com/organization/discord"
>Crunchbase</a
>
<a
href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
>[web.archive.org]</a
>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
>[archive.is]</a
>
</li>
<li id="s5">
<a href="https://discordapp.com/nitro">Discord Nitro</a> <a href="https://discordapp.com/nitro">Discord Nitro</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a
href="http://archive.is/20170724163442/https://discordapp.com/company"
<a name="6">6.</a> >[archive.is]</a
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> >
</li>
<li id="s6">
<a
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>Discord receives government requests. No plans on adding E2E
Encryption any time soon.</a
>
<a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://archive.is/JrdJ9">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br> <a
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>[web.archive.org]</a
<a name="7">7.</a> >
<a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a> </li>
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br> <li id="s7">
<a
href=" https://www.statista.com/statistics/746215/discord-user-number/"
>Number of registered Discord users</a
<a name="8">8.</a> >
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a> <a
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br> href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
</p> >[web.archive.org]</a
>
<hr> </li>
<p><b> <li id="s8">
This article was last edited on 4/11/2019 <a
</b></p> href="https://support.discordapp.com/hc/en-us/articles/360004109911"
<p><b> >Data Privacy Controls</a
This article was created on 11/23/17 >
</b></p> <a
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
>[web.archive.org]</a
>
</li>
</ol>
</div>
<hr />
<b>This article was created on 11/23/17</b><br />
<b>This article was last edited on 4/11/2019</b>
<!--Dont change-->
<p> <p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <p>
<p><a href="../articles/index.html">Back to catalog</a></p> All contributions must be licensed under the CC0 license to be
</center> accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,51 +1,79 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<head> <meta
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>[Program/Service Name Here] - Spyware Watchdog</title> <title>[Program/Service Name Here] - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/> <link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main"> <div class="main">
<img src="../images/example_logo.png" alt="Images are in the ../images folder"/> <img
src="../images/example_logo.png"
alt="Images are in the ../images folder"
/>
<h1>[Program/Service Name Here]</h1> <h1>[Program/Service Name Here]</h1>
<p> <p>
This part of the article should have the name of the program and what it does, and who develops it. This part of the article should have the name of the program and what
it does, and who develops it.
</p> </p>
<h2>Spyware Level: <span class="green">Not Rated</span></h2> <h2>Spyware Level: <span class="green">Not Rated</span></h2>
<h2>Spyware Feature X</h2> <h2>Spyware Feature X</h2>
<p>Proof goes here<sup><a href="#s1">[1]</a></sup>.</p> <p>
Proof goes here<sup><a href="#s1">[1]</a></sup
>.
</p>
</div> </div>
<hr> <hr />
<div class="footer"> <div class="footer">
<div class="futher"> <div class="futher">
<h4>Further Reading:</h4> <h4>Further Reading:</h4>
<ol> <ol>
<a href="">Source</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a> <a href="">Source</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</ol> </ol>
</div> </div>
<hr> <hr />
<div class="sources"> <div class="sources">
<h4>Sources:</h4> <h4>Sources:</h4>
<ol> <ol>
<li id="s1"><a href="">Source1</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li> <li id="s1">
<li id="s2"><a href="">Source2</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li> <a href="">Source1</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</li>
<li id="s2">
<a href="">Source2</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</li>
</ol> </ol>
</div> </div>
<hr> <hr />
<b>This article was created on mm/dd/yyyy</b> <b>This article was created on mm/dd/yyyy</b><br />
<b>This article was last edited on mm/dd/yyyy</b> <b>This article was last edited on mm/dd/yyyy</b>
<!--Dont change--> <!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p> <p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p> If you want to edit this article, or contribute your own article(s),
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change--> <!--Dont change-->
</div> </div>
</div> </div>
</body> </body>
</html> </html>

View File

@ -1,59 +1,64 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css"> <head>
<meta charset="UTF-8"> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Internet Explorer - Spyware Watchdog</title> <title>Internet Explorer - Spyware Watchdog</title>
</head> <link rel="stylesheet" href="../style.css"/>
<body> </head>
<img src="../images/ie_logo.png" alt="Internet Explorer Logo">
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
<h1>Internet Explorer</h1> <h1>Internet Explorer</h1>
<p> <p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system. Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users. Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
</p> </p>
<h3>Internet Explorer does not have available source code</h3> <h3>Internet Explorer does not have available source code</h3>
<p> <p>
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it. Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
</p> </p>
<h3>Internet Explorer is self-updating software</h3> <h3>Internet Explorer is self-updating software</h3>
<p> <p>
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off. Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
</p> </p>
<h3>Internet Explorer sends your search history to Microsoft</h3> <h3>Internet Explorer sends your search history to Microsoft</h3>
<p> <p>
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft. Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
</p> </p>
<h3>Internet Explorer can track your location</h3> <h3>Internet Explorer can track your location</h3>
<p> <p>
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out. Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
</p> </p>
<h3>Internet Explorer has an anti-privacy search engine by default</h3> <h3>Internet Explorer has an anti-privacy search engine by default</h3>
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p> <p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
</div>
<hr> <hr>
<center> <div class="footer">
<h2>Sources</h2> <div class="sources">
<p> <h4>Sources:</h4>
<a name="1">1.</a> <ol>
<a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a> <li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a> <a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a> <a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
<a href="https://archive.is/EnsRH">[archive.is]</a><br> <a href="https://archive.is/EnsRH">[archive.is]</a><br></li>
</p> </ol>
</div>
<hr> <hr>
<p><b> <b>This article was last edited on 2/18/2019</b>
This article was last updated on 2/18/2019 <!--Dont change-->
</b></p> <p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</p> <!--Dont change-->
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> </div>
<p><a href="../articles/index.html">Back to catalog</a></p> </div>
</center> </body>
</body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Firefox - Spyware Watchdog</title> <title>Firefox - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/firefox_logo.png" alt="Firefox logo"> <img src="../images/firefox_logo3.svg" alt="Firefox logo">
<h1>Mozilla Firefox</h1> <h1>Mozilla Firefox</h1>
<center> <center>
<a href="../articles/firefox_es.html">Spanish Translation</a> <a href="../articles/firefox_es.html">Spanish Translation</a>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -12,7 +12,7 @@
<a href="../articles/index.html">Back to catalog</a><br> <a href="../articles/index.html">Back to catalog</a><br>
<a href="../guides/firefox_es.html">Guía de mitigación</a> <a href="../guides/firefox_es.html">Guía de mitigación</a>
</p> </p>
<img src="../images/firefox_logo.png" alt="Firefox logo"> <img src="../images/firefox_logo3.svg" alt="Firefox logo">
<p> <p>
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy. Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
</p> </p>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Iridium Browser - Spyware Watchdog</title> <title>Iridium Browser - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/iridium_logo.jpg" alt="Iridium Logo"> <img src="../images/iridium_logo.png" alt="Iridium Logo">
<h1>Iridium Browser</h1> <h1>Iridium Browser</h1>
<p> <p>
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage. Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.

View File

@ -1,145 +1,148 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>SRWare Iron - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <head>
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>SRWare Iron - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
<h1>SRWare Iron</h1> <h1>SRWare Iron</h1>
<p> <p>
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany. SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
the Chrome experience without Google's spyware. However when examining this program, these claims the Chrome experience without Google's spyware. However when examining this program, these claims
instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens
connections to an enormous amount of servers on it's first run. It racks up a rough estimate of connections to an enormous amount of servers on it's first run. It racks up a rough estimate of
<b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new <b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new
requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search
engine, however it goes beyond that and routes your requests to Bing through it's own servers engine, however it goes beyond that and routes your requests to Bing through it's own servers
so that it can spy on your internet searches as well. The bottom line is that this browser is just so that it can spy on your internet searches as well. The bottom line is that this browser is just
another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b> another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b>
</p> </p>
<p> <p>
Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4, Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4,
and Sysinternals ProcMon were used to monitor the behavior of this program. and Sysinternals ProcMon were used to monitor the behavior of this program.
</p> </p>
<h3>False Privacy Initiative</h3> <h3>False Privacy Initiative</h3>
<p> <p>
SRWare Iron claims on it's website that it is: SRWare Iron claims on it's website that it is:
</p> </p>
<p><i> <p><i>
"Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern." "Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#s1">[1]</a></sup></p>
<p> <p>
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed, The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
claimed on SRWare's website and beleive it without doing any tests for themselves. Like claimed on SRWare's website and beleive it without doing any tests for themselves. Like
<a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a> <a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a>
<a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a> <a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a>
that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome. that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome.
The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser: The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser:
</p> </p>
<p><i> <p><i>
"Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself." "Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself."
</i><sup><a href="#2">[2]</a></sup></p> </i><sup><a href="#s2">[2]</a></sup></p>
<p> <p>
Which is just an amazing gem in the context of what is actually found when running tests on the software. Which is just an amazing gem in the context of what is actually found when running tests on the software.
</p> </p>
<h3>Massive amount of connections on first startup</h3> <h3>Massive amount of connections on first startup</h3>
<p> <p>
When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and
<code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain <code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain
which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests
but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it
as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!) as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!)
should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the
amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads. amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads.
There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own
analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you
begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you
everywhere you go! everywhere you go!
</p> </p>
<p> <p>
When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount
of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre
all of the IP addresses that it connected, but should give you an idea. all of the IP addresses that it connected, but should give you an idea.
</p> </p>
<p> <p>
And just so that there is no ambiguity, this notice is shown when you load this homepage: And just so that there is no ambiguity, this notice is shown when you load this homepage:
</p> </p>
<p><i> <p><i>
"We use cookies to personalise content and ads, to provide social media features "We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it with our social media, advertising and analytics partners who may combine it
with other information youve provided to them or theyve collected from your with other information youve provided to them or theyve collected from your
use of their services." use of their services."
</i></p> </i></p>
<p> <p>
Just so that there is no doubt- you are being served tracking cookies by advertising companies. Just so that there is no doubt- you are being served tracking cookies by advertising companies.
</p> </p>
<h3>Redirecting of internet searches through developer's domain</h3> <h3>Redirecting of internet searches through developer's domain</h3>
<p> <p>
After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>. making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens: However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
</p> </p>
<img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers"> <img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
<p> <p>
Basically, every time you make a search with this browser, your searches are sent through the developer's servers. Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
<code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one <code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one
spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar
tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to
Bing through it's own domains. Bing through it's own domains.
</p> </p>
<h3>Motivations of the SRWare Iron developer?</h3> <h3>Motivations of the SRWare Iron developer?</h3>
<p> <p>
If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#3">[3]</a></sup> Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#s3">[3]</a></sup>
</p> </p>
<xmp> <xmp>
<Kmos> Iron: why not contribute to it, instead of forking ? <Kmos> Iron: why not contribute to it, instead of forking ?
<Iron> because i removed all privacy-related code <Iron> because i removed all privacy-related code
<Iron> e.g. RLZ <Iron> e.g. RLZ
<Iron> and URL tracking every 5 seconds after start <Iron> and URL tracking every 5 seconds after start
<Iron> the original chrome is heavily communitating to google...i hate that <Iron> the original chrome is heavily communitating to google...i hate that
<jamessan> all of those are supposed to have options to disable them, iirc <jamessan> all of those are supposed to have options to disable them, iirc
<Iron> yes but they haven't options yet <Iron> yes but they haven't options yet
<Iron> and nobody knows when the next beta is released <Iron> and nobody knows when the next beta is released
<jamessan> so work on getting the options added so they'll be there for the next release <jamessan> so work on getting the options added so they'll be there for the next release
<mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code? <mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code?
<mgreenblatt> (assuming such a thing doesn't already exist) <mgreenblatt> (assuming such a thing doesn't already exist)
<Iron> because a fork will bring a lot of publicity to my person and my homepage <Iron> because a fork will bring a lot of publicity to my person and my homepage
<Iron> that means: a lot of money too ;) <Iron> that means: a lot of money too ;)
<Kmos> rotflol <Kmos> rotflol
<Iron> what means rotful? <Iron> what means rotful?
<mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium? <mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium?
<Kmos> Iron: google about it <Kmos> Iron: google about it
<Iron> yes there is enough time to support it <Iron> yes there is enough time to support it
<jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing <jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing
<Iron> i dont take money for my fork <Iron> i dont take money for my fork
<Iron> but i have adsense on my page ;) <Iron> but i have adsense on my page ;)
<Iron> a lot of visitor -> a lot of clicka > a lot of money ;) <Iron> a lot of visitor -> a lot of clicka > a lot of money ;)
<Kmos> and do you think google should support your fork <Kmos> and do you think google should support your fork
<Kmos> lol <Kmos> lol
<mgreenblatt> Iron.. it's always good to have dreams ;-) <mgreenblatt> Iron.. it's always good to have dreams ;-)
<Iron> we are here in germany <Iron> we are here in germany
<Iron> the press will love my fork <Iron> the press will love my fork
<Iron> i talked to much journalists already <Iron> i talked to much journalists already
<DrPizza> Why are you forking? <DrPizza> Why are you forking?
<DrPizza> to do what? <DrPizza> to do what?
<Iron> to remove all things in source talking to google ;) <Iron> to remove all things in source talking to google ;)
<jamessan> to get fame and fortune <jamessan> to get fame and fortune
<Iron> nobody here trusts google <Iron> nobody here trusts google
<Iron> the german people say: google is very evil <Iron> the german people say: google is very evil
<jamessan> yet you use google's adsense <jamessan> yet you use google's adsense
</xmp> </xmp>
<p> <p>
So, this could explain a lot... the motivation for this web browser to exist was to monetize So, this could explain a lot... the motivation for this web browser to exist was to monetize
@ -149,32 +152,37 @@ Bing through it's own domains.
(why else would he take the time to integrate these things into his browser? we can only speculate.) (why else would he take the time to integrate these things into his browser? we can only speculate.)
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it. At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
</p> </p>
</div>
<hr> <hr>
<center> <div class="footer">
<h2>Sources</h2> <div class="sources">
<p> <h4>Sources:</h4>
<a name="1">1.</a> <ol>
<li id="s1">
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a> <a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a>
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a> <a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
<a href="https://archive.is/qMNlG">[archive.is]</a><br> <a href="https://archive.is/qMNlG">[archive.is]</a><br>
<a name="2">2.</a> </li>
<li id="s2">
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a> <a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a>
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a> <a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
<a href="https://archive.fo/TXJbh">[archive.is]</a><br> <a href="https://archive.fo/TXJbh">[archive.is]</a><br>
<a name="3">3.</a> </li>
<li id="s3">
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a> <a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
</p> </li>
</ol>
</div>
<hr> <hr>
<p><b> <b>This article was last edited on 11/20/2018</b>
This article was last edited on 11/20/2018 <!--Dont change-->
</b></p> <p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be licensed under the CC0 liscence to be accepted. <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</p> <!--Dont change-->
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> </div>
<p><a href="../articles/index.html">Back to catalog</a></p> </div>
<center> </body>
</body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,35 +1,41 @@
<!DOCTYPE HTML> <!--Old Style-->
<html lang=”en-us”> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<head> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Slimjet - Spyware Watchdog</title> <title>Slimjet - Spyware Watchdog</title>
</head> <link rel="stylesheet" href="../style.css"/>
<body> </head>
<img src="../images/slimjet_logo.png" alt="slimjet Logo">
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
<h1>Slimjet</h1> <h1>Slimjet</h1>
<p> <p>
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base. Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#s1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies... services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
</p> </p>
<h3>Phoning Home</h3> <h3>Phoning Home</h3>
<p> <p>
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup> Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#s1">[1]</a></sup>
the moment I turn it on with MITMproxy running, I am greeted with this: the moment I turn it on with MITMproxy running, I am greeted with this:
</p> </p>
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services"> <img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<p> <p>
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service? So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#s2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
</p> </p>
<h3>Default Search Engine is Spyware</h3> <h3>Default Search Engine is Spyware</h3>
<p> <p>
The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which <i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek. has it's own privacy policy<sup><a href="#s3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
</p> </p>
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection"> <img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
<p> <p>
@ -39,7 +45,7 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
</p> </p>
<p><i> <p><i>
"...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company." "...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company."
</i><sup><a href="#3">[3]</a></sup></p> </i><sup><a href="#s3">[3]</a></sup></p>
<p> <p>
So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to
an alternative like DuckDuckGo the requests to fpseek stop. an alternative like DuckDuckGo the requests to fpseek stop.
@ -65,31 +71,37 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
<p> <p>
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history... Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
</p> </p>
</div>
<hr> <hr>
<center> <div class="footer">
<h2>Sources</h2> <div class="sources">
<p> <h4>Sources:</h4>
<a name="1">1.</a> <ol>
<li id="s1">
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a> <a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a> <a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
<a href="http://archive.is/67qZa">[archive.is]</a><br> <a href="http://archive.is/67qZa">[archive.is]</a>
<a name="2">2.</a> </li>
<li id="s2">
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a> <a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
<a name="3">3.</a> </li>
<li id="s3">
<a href="http://info.fpseek.com/privacy-policy/">Privacy Policy Fpseek</a> <a href="http://info.fpseek.com/privacy-policy/">Privacy Policy Fpseek</a>
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a> <a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
<a href="http://archive.is/fHly1">[archive.is]</a><br> <a href="http://archive.is/fHly1">[archive.is]</a><br>
</p> </li>
</ol>
</div>
<hr> <hr>
<p><b> <b>This article was last edited on 8/4/2018</b>
This article was last edited on 8/4/2018 <!--Dont change-->
</b></p> <p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</p> <!--Dont change-->
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> </div>
<p><a href="../articles/index.html">Back to catalog</a></p> </div>
</center> </body>
</body>
</html> </html>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -7,7 +8,7 @@
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/tor_logo.png" alt="TOR browser logo"> <img src="../images/tor_browser_logo.png" alt="TOR browser logo">
<h1>Tor Browser</h1> <h1>Tor Browser</h1>
<p> <p>
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup> Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -8,7 +9,7 @@
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo"> <img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
<h1>Ungoogled-Chromium</h1> <h1>Ungoogled-Chromium</h1>
<p> <p>
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Waterfox - Spyware Watchdog</title> <title>Waterfox - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/waterfox logo.png" alt="Waterfox Logo"> <img src="../images/waterfox_logo.png" alt="Waterfox Logo">
<h1>Waterfox</h1> <h1>Waterfox</h1>
<p> <p>
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>. Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
@ -22,7 +23,7 @@ information about you with Mozilla, and has other spyware features.
If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably
Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
well as Waterfox's own update service. You can look at a list of these requests well as Waterfox's own update service. You can look at a list of these requests
<a href="https://digdeeper.neocities.o../images/wfox.png">here</a> or a on mirror <a href="../images/wfox.png">here</a>. <a href="../images/wfox.png">here</a> or a on mirror <a href="https://digdeeper.neocities.org/images/wfox.png">here</a>.
</p> </p>
<h3>Waterfox has a communication problem</h3> <h3>Waterfox has a communication problem</h3>
<p> <p>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -6,7 +6,7 @@
<title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title> <title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/iridium_logo.jpg"> <img src="../images/iridium_logo.png">
<h1>Iridium Browser Spyware Mitigation Guide</h1> <h1>Iridium Browser Spyware Mitigation Guide</h1>
<p> <p>
After configuring Iridium according to this guide it's rating changes like so: After configuring Iridium according to this guide it's rating changes like so:

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.8 KiB

After

Width:  |  Height:  |  Size: 3.8 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.9 KiB

After

Width:  |  Height:  |  Size: 3.5 KiB

View File

Before

Width:  |  Height:  |  Size: 11 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.7 KiB

After

Width:  |  Height:  |  Size: 3.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 31 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 11 KiB

BIN
images/iridium_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 257 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 16 KiB

After

Width:  |  Height:  |  Size: 18 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 9.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.4 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.9 KiB

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 8.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 7.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 29 KiB

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.1 KiB

After

Width:  |  Height:  |  Size: 9.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.7 KiB

After

Width:  |  Height:  |  Size: 451 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.5 KiB

After

Width:  |  Height:  |  Size: 9.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

After

Width:  |  Height:  |  Size: 19 KiB

BIN
images/tor_browser_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.1 KiB

After

Width:  |  Height:  |  Size: 5.0 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

BIN
images/waterfox_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.0 KiB

After

Width:  |  Height:  |  Size: 6.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.3 KiB

After

Width:  |  Height:  |  Size: 3.9 KiB

View File

@ -9,7 +9,11 @@ p {
max-width: 780px; max-width: 780px;
margin: auto; margin: auto;
} }
h1, h2, h3, h4, h5 { h1,
h2,
h3,
h4,
h5 {
text-align: center; text-align: center;
margin-right: auto; margin-right: auto;
margin-left: auto; margin-left: auto;
@ -22,15 +26,15 @@ h4 {
margin-right: auto; margin-right: auto;
margin-left: 1vw; margin-left: 1vw;
} }
:target a {
color: #959800;
}
a { a {
color: #006B9F; color: #006b9f;
} }
a:hover { a:hover {
color: #094561; color: #094561;
} }
:target a {
color: #959800;
}
.img-link a:hover { .img-link a:hover {
border: none; border: none;
} }
@ -49,14 +53,16 @@ img {
width: 780px; width: 780px;
} }
hr { hr {
border: 1px solid #1A1A1A; border: 1px solid #1a1a1a;
} }
ul { ul {
max-width: 780px; max-width: 780px;
margin-left: auto; margin-left: auto;
margin-right: auto; margin-right: auto;
} }
table, th, td { table,
th,
td {
text-align: center; text-align: center;
border: 1px solid white; border: 1px solid white;
margin-left: auto; margin-left: auto;
@ -115,23 +121,26 @@ xmp {
.nav a { .nav a {
text-decoration: none; text-decoration: none;
} }
.lime {
color: #00ff00;
}
.green { .green {
color: #00981B; color: #00981b;
} }
.yellowgreen { .yellowgreen {
color: #C8E63C; color: #c8e63c;
} }
.yellow { .yellow {
color: #FFFF00; color: #ffff00;
} }
.orange { .orange {
color: #FF6100; color: #ff6100;
} }
.red { .red {
color: #FF0000; color: #ff0000;
} }
.case { .case {
border: 2px solid #1A1A1A; border: 2px solid #1a1a1a;
border-radius: 15px; border-radius: 15px;
margin-left: 3vw; margin-left: 3vw;
margin-right: 3vw; margin-right: 3vw;
@ -144,10 +153,12 @@ xmp {
.main { .main {
min-height: 60vh; min-height: 60vh;
} }
.sources, .futher { .sources,
.futher {
text-align: left; text-align: left;
} }
.footer, .center { .footer,
.center {
margin-top: 1vh; margin-top: 1vh;
text-align: center; text-align: center;
} }