Replaced <hr></hr> with one <hr/>

This commit is contained in:
codddfeea 2022-04-21 12:34:05 +03:00
parent a9bc92a432
commit 728d5c4817
16 changed files with 44 additions and 44 deletions

View File

@ -19,13 +19,13 @@
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>BadWolf <span class="green">makes no unsolicited requests at all.</span></p>
<p>BadWolf is a pretty decent browser worth looking into. A couple of neat features worth noting is that BadWolf has a JavaScript switch and an image viewer switch, which is useful for daily tasks.</p>
<hr></hr>
<hr/>
<h4>Further Reading</h4>
<p><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></p>
<hr></hr>
<hr/>
<p>This article was created on 6/19/2021</p>
<p>This article was lasted edited on 6/19/2021</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -19,13 +19,13 @@
<h2>Spyware-Level: <span class="green">Keine Spyware</span></h2>
<p>BadWolf <span class="green">stellt nicht ungefragt Verbindungen her.</span></p>
<p>BadWolf ist ein guter Browser und definitiv einen Blick wert. Die nützlichsten Funktionen sind der integrierte JavaScript-Schalter und die Option, Bilder standardmässig nicht anzuzeigen.</p>
<hr></hr>
<hr/>
<h4>Weitere Informationen</h4>
<p><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></p>
<hr></hr>
<hr/>
<p>Dieser Artikel wurde am 19.6.2022 erstellt</p>
<p>Dieser Artikel wurde zuletzt am 12.2.2022 bearbeitet</p>
<hr></hr>
<hr/>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us

View File

@ -18,12 +18,12 @@
<p>Bleachbit is Tool to Clean Your System and Free Disk Space. Also, BleachBit can Shred Files.</p>
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>BleachBit <span class="green">makes no unsolicited requests at all.</span></p>
<hr></hr>
<hr/>
<h4>Further Reading</h4>
<p><a href="https://www.bleachbit.org/">BleachBit Home Page</a></p>
<hr></hr>
<hr/>
<p>This article was created on 5/1/2022</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -53,7 +53,7 @@
<h3>Not spyware related, but worth noting</h3>
<h3>Anti-privacy search engine by default</h3>
<p><a href="../articles/google.html">Google</a> is the default search engine of Brave. For a browser that claims to be privacy oriented, this is a red flag. They at least make it easy for you to change the default search engine on the first run.</p>
<hr></hr>
<hr/>
<div class="center">
<h4>Sources</h4>
@ -147,10 +147,10 @@
<a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a>
</p>
<hr></hr>
<hr/>
<b>This article was created on 5/7/2018</b><br/>
<b>This article was last edited on 8/17/2021</b>
<hr></hr>
<hr/>
<!-- Don't edit below -->
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>

View File

@ -53,7 +53,7 @@
<h3>Не связано со слежением, но стоит отметить</h3>
<h3>Неконфиденциальный поисковик по умолчанию</h3>
<p><a href="../articles/google.html">Google</a> - стандартная поисковая система в Brave. Это очень странно для браузера, позиционирующего себя приватным. По крайней мере, при первом запуске Brave даёт выбор поисковой системы по умолчанию.</p>
<hr></hr>
<hr/>
<div class="center">
<h4>Источники</h4>
<p>
@ -145,10 +145,10 @@
<a href="https://web.archive.org/web/20210621011812/https://github.com/brave/brave-browser/issues/14277">[web.archive.org]</a>
<a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a>
</p>
<hr></hr>
<hr/>
<b>Этот перевод был создан 13/07/2021</b><br/>
<b>Этот перевод в последний раз изменялся 13/07/2021</b>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -25,7 +25,7 @@
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#two">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
</div>
<hr></hr>
<hr/>
<div class="center">
<h2>Sources</h2>
<p>
@ -40,10 +40,10 @@
<a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a>
<a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a>
</p>
<hr></hr>
<hr/>
<p>This article was created on 5/14/2018</p>
<p>This article was lasted edited on 10/11/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -23,13 +23,13 @@
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>Lynx <span class="green">makes no unsolicited requests at all.</span></p>
<p>It is also fully libre software under the GPLv2 license.</p>
<hr></hr>
<hr/>
<h4>Further Reading</h4>
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
<hr></hr>
<hr/>
<p>This article was created on 4/6/2020</p>
<p>This article was lasted edited on 10/7/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -23,13 +23,13 @@
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="green">Brak oprogramowania szpiegowskiego</span></h2>
<p>Lynx <span class="green">nie wysyła żadnych niepożądanych żądań.</span></p>
<p>Jest także w pełni otwartym oprogramowaniem licencjonowanym na licencji GPLv2.</p>
<hr></hr>
<hr/>
<h4>Further Reading</h4>
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
<hr></hr>
<hr/>
<p>This article was created on 4/6/2020</p>
<p>This article was lasted edited on 10/7/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -23,13 +23,13 @@
<h2>Уровень слежки: <span class="green">Нет</span></h2>
<p>Lynx <span class="green">никогда не делает нежелательных запросов</span>.</p>
<p>Это полностью свободное программное обеспечение, лиценизрованное по GPLv2.</p>
<hr></hr>
<hr/>
<h4>Дополнительная информация</h4>
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
<hr></hr>
<hr/>
<p>Этот перевод был создан 9/7/2021</p>
<p>Этот перевод в последний раз был изменён 9/7/2021</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -18,10 +18,10 @@
<p>From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.</p>
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
<p>Otter Browser <b><span class="lime">makes no unsolicited requests at all.</span></b> It is fully open source. The developers, also, don't plan to include any spyware "features" in the future. This seems like a true privacy-based web browser (at least for now).</p>
<hr></hr>
<hr/>
<p>This article was created on 11/25/2017</p>
<p>This article was lasted edited on 10/5/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -21,10 +21,10 @@
<p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p>
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
<p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p>
<hr></hr>
<hr/>
<p>This article was created on 5/10/2018</p>
<p>This article was lasted edited on 10/7/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -21,10 +21,10 @@
<p>Qutebrowser - веб-браузер, ориентированный на управление с клавиатуры, с минимальным графическим интерфейсом. Он основан на Python, PyQt5 и свободном ПО, лицензированном под GPL. Программа протестирована: v1.6.1 для Debian Buster. Mitmproxy было использовано для проверки соединений.</p>
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
<p>Qutebrowser <span class="lime">никогда не делает нежелательных запросов</span>. Это свободное программное обеспечение. Этот браузер - отличный выбор, и с точки зрения приватности жаловаться здесь не на что (хотя я не знаю как управляться с этим пользовательским интерфейсом...). Пока этот браузер выглядит достойным, чтобы стоять в одном ряду с другими браузерами, уважающими конфиденциальность пользователя.</p>
<hr></hr>
<hr/>
<p>Этот перевод был создан 9/7/2021</p>
<p>Этот перевод в последний раз изменялся 9/7/2021</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -27,10 +27,10 @@
<a href="https://commons.wikimedia.org/wiki/File:SeaMonkey.svg">SeaMonkey Logo (WikiMedia)</a></p>
<p><a id="two">2.</a>
<a href="https://www.seamonkey-project.org/about">https://www.seamonkey-project.org/about</a><a href="http://web.archive.org/web/20201130073628/https://www.seamonkey-project.org/about">[web.archive.org]</a></p>
<hr></hr>
<hr/>
<b>This article was created on 1/17/2021</b><br/>
<b>This article was last edited on 5/3/2021</b>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -26,7 +26,7 @@
<h3>Telegram does not follow its GPLv2 Obligations</h3>
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#two">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
</div>
<hr></hr>
<hr/>
<div class="center">
<h2>Sources</h2>
<p><a id="one">1.</a>
@ -42,10 +42,10 @@
<a href="https://archive.is/SrX5J">[archive.is]</a>
<a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a>
</p>
<hr></hr>
<hr/>
<p>This article was created on 2/18/2019</p>
<p>This article was lasted edited on 10/11/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -19,14 +19,14 @@
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>Web Browser <span class="green">makes no unsolicited requests at all.</span> It is also fully open source.<sup><a href="#one">[1]</a></sup> Due to it being based on Pale Moon, it has access to all of the XUL plugins available.</p>
</div>
<hr></hr>
<hr/>
<div class="center">
<h2>Sources</h2>
<p><a id="one">1.</a><a href="https://git.nuegia.net/webbrowser.git/">Project's homepage</a></p>
<hr></hr>
<hr/>
<p>This article was created on 4/3/20</p>
<p>This article was lasted edited on 10/11/2020</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -44,7 +44,7 @@
<h3>Phoning Home</h3>
<p>When WebDiscover is started, it will begin making requests to <code>ec2-54-191-159-75.us-west-2.compute.amazonaws.com</code></p>
<p>This is presumably how it collects a lot of the personal information about its users. This was discovered using Microsoft Network Monitor 3.4.</p>
<hr></hr>
<hr/>
<div class="center">
<h4>Sources</h4>
<p><a name="1">1.</a>
@ -57,9 +57,9 @@
<a href="http://archive.is/bE7Qe">[archive.is]</a>
<a href="https://ghostarchive.org/archive/5FLVA">[ghostarchive.org]</a>
</p>
<hr></hr>
<hr/>
<p>This article was last edited on 8/4/2018</p>
<hr></hr>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>