fixed file paths, added notice

This commit is contained in:
anonymous 2020-02-08 03:09:18 -05:00
parent 2cbcfc7786
commit ad047b0f99
80 changed files with 1303 additions and 1288 deletions

3
README.md Normal file
View File

@ -0,0 +1,3 @@
# Online Spyware Watchdog
This is the git repo for the [Online Spyware Watchdog](https://spyware.neocities.org/).
You can contribute here, or message us in spyware@conference.nuegia.net.

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>1Password</h1> <h1>1Password</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/1pw_logo.png" alt="1password Logo"> <img src../images/1pw_logo.png" alt="1password Logo">
<p> <p>
1password is a password management service 1password is a password management service
</p> </p>
@ -35,8 +35,8 @@ https://paul.reviews/privacy-password-managers-a-reality-check/
This article was last edited on 6/16/2018 This article was last edited on 6/16/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>AMD CPU Family</h1> <h1>AMD CPU Family</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/amd_logo.png" alt="One of the logos AMD uses for its CPU's"> <img src../images/amd_logo.png" alt="One of the logos AMD uses for its CPU's">
<h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1> <h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1>
<p> <p>
Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the
article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this
article. article.
</p> </p>
<p> <p>
Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O. Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O.
@ -24,7 +24,7 @@ article.
This article isn't complete. This is a work-in-progress and so this article is not formatted properly.. This article isn't complete. This is a work-in-progress and so this article is not formatted properly..
</p> </p>
<p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p> <p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p>
<p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.org/images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p> <p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p>
<p>Possible uses … DRM</p> <p>Possible uses … DRM</p>
<p> <p>
Researchers have already been able to identify exploits in AMDs Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSPs TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire) Researchers have already been able to identify exploits in AMDs Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSPs TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
@ -35,7 +35,7 @@ This article isn't complete. This is a work-in-progress and so this article is n
Family 15h-Models60h and later contain a PSP</p> Family 15h-Models60h and later contain a PSP</p>
<h2><font color=red>NOT TRUSTED:</font></h2> <h2><font color=red>NOT TRUSTED:</font></h2>
<ul> <ul>
<li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6) <li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li> https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li>
<li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li> <li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li>
<li>All Zen based CPUs (17h family)</li> <li>All Zen based CPUs (17h family)</li>
@ -59,10 +59,10 @@ Family 15h-Models60h and later contain a PSP</p>
This article was last edited on 1/10/2019 This article was last edited on 1/10/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Bing</h1> <h1>Bing</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/bing_logo.png" alt="Bing logo"> <img src../images/bing_logo.png" alt="Bing logo">
<p> <p>
Bing is a search engine created and owned by Microsoft. Bing is a search engine created and owned by Microsoft.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p> <p>
@ -23,30 +23,30 @@ Bing is a search engine created and owned by Microsoft.
Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand
in great detail what kind of information one single program could be collecting. (although this policy is more specific) in great detail what kind of information one single program could be collecting. (although this policy is more specific)
</p> </p>
<h3>Bing collects your search history</h3> <h3>Bing collects your search history</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i> <p><i>
"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described "Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described
below...You provide some of this data directly, such as when you...submit a search query to Bing" below...You provide some of this data directly, such as when you...submit a search query to Bing"
</i></p> </i></p>
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your: <p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your:
<i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as <i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as
picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p> picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p>
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information <p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information
in a process that takes 18 months to complete.<p> in a process that takes 18 months to complete.<p>
<p><i> <p><i>
"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify "Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify
stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. " stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. "
</i></p> </i></p>
<h3>Bing uses your search history to profile you for advertising</h3> <h3>Bing uses your search history to profile you for advertising</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i> <p><i>
"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing." "Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."
@ -55,18 +55,18 @@ Bing is a search engine created and owned by Microsoft.
So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for
advertising. And of course, this is confirmed in this section: advertising. And of course, this is confirmed in this section:
</p> </p>
<p><i> <p><i>
"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how "The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how
you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements
about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle." about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle."
</i></p> </i></p>
<h3>Bing sells your search history to other spyware platforms</h3> <h3>Bing sells your search history to other spyware platforms</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i> <p><i>
"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products, "We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products,
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. " their products, or other sites and apps serviced by these partners are more relevant and valuable to you. "
</i></p> </i></p>
<hr> <hr>
@ -82,8 +82,8 @@ Bing is a search engine created and owned by Microsoft.
This article was last edited on 5/30/2018 This article was last edited on 5/30/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,25 +1,25 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Brave Browser</h1> <h1>Brave Browser</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/brave_logo.png" alt="Brave logo"> <img src../images/brave_logo.png" alt="Brave logo">
<p> <p>
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as</P><p><i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup></p><p>, and the built-in privacy protections would seem to agree with that, but let's see how it stacks up when we take everything into account. Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as</P><p><i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup></p><p>, and the built-in privacy protections would seem to agree with that, but let's see how it stacks up when we take everything into account.
</p> </p>
<h2>Spyware Level: <font color=orange>High</font></h2> <h2>Spyware Level: <font color=orange>High</font></h2>
<p> <p>
Auto-updates that can be turned off only by hacky workarounds. <a href="/articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="/articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are. Auto-updates that can be turned off only by hacky workarounds. <a href="../articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="../articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are.
</p> </p>
<h3>Whitelisting spyware from Facebook and Twitter</h3> <h3>Whitelisting spyware from Facebook and Twitter</h3>
<p> <p>
On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. Its our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. Its our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware
scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of
it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about
supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation: supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation:
</p> </p>
@ -30,7 +30,7 @@
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit, right now, to see just how much information a JavaScript program designed to track you can get. Here are a few: This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit, right now, to see just how much information a JavaScript program designed to track you can get. Here are a few:
<br> <br>
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br> <a href="https://browserleaks.com/">https://browserleaks.com/</a><br>
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a> <a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a>
</p> </p>
<h3>Auto-updates</h3> <h3>Auto-updates</h3>
<p> <p>
@ -42,22 +42,22 @@
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p> <p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p>
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. <img src="/images/brave_partners.png">Extensions are also updated often. <P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. <img src../images/brave_partners.png">Extensions are also updated often.
</p> </p>
<h3>Anti-privacy search engine by default</h3> <h3>Anti-privacy search engine by default</h3>
<p> <p>
<a href="/articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all. <a href="../articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all.
</p> </p>
<h3>Brave's start page contains analytics</h3> <h3>Brave's start page contains analytics</h3>
<p> <p>
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img src="/images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page. Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img src../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page.
</p> </p>
<h3>Crash reports</h3> <h3>Crash reports</h3>
<p>Enabled by default, but can be disabled from the preferences menu.</p> <p>Enabled by default, but can be disabled from the preferences menu.</p>
<h3>Other requests</h3> <h3>Other requests</h3>
<p>Brave will make a connection to <img src="/images/brave_bat.png"> every time it is started up. It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request: <img src="/images/brave_httpse.png">, which downloads the rulesets for HTTPS Everywhere.</p> <p>Brave will make a connection to <img src../images/brave_bat.png"> every time it is started up. It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request: <img src../images/brave_httpse.png">, which downloads the rulesets for HTTPS Everywhere.</p>
<h3>Brave's privacy protections</h3> <h3>Brave's privacy protections</h3>
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works). <p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works).
</p> </p>
@ -90,11 +90,11 @@
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a> <a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a>
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a> <a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a>
<a href="https://archive.fo/X98Xz">[archive.fo]</a><br> <a href="https://archive.fo/X98Xz">[archive.fo]</a><br>
<a name="6">6.</a> <a name="6">6.</a>
<a href="https://brave.com/features/">Brave Browser Features</a> <a href="https://brave.com/features/">Brave Browser Features</a>
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br>
<a name="7">7.</a> <a name="7">7.</a>
<a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a> <a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a>
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a> <a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a>
@ -109,9 +109,9 @@
This article was created on 5/7/2018 This article was created on 5/7/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,19 +1,19 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Comparison between web browsers</h1> <h1>Comparison between web browsers</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<p> <p>
It's important to notice that because web browsers and the services they access are built on top of using the spyware protocol HTTP, they CANNOT respect your privacy. It's important to notice that because web browsers and the services they access are built on top of using the spyware protocol HTTP, they CANNOT respect your privacy.
But beyond that, because we have to use web browsers, it's useful to list them by how much spyware they have in them. This purpose of this article is But beyond that, because we have to use web browsers, it's useful to list them by how much spyware they have in them. This purpose of this article is
not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how
much privacy can be gained by configuring it. much privacy can be gained by configuring it.
</p> </p>
<h2><font color=lime>Top Tier - Best Privacy</font></h2> <h2><font color=lime>Top Tier - Best Privacy</font></h2>
<p> <p>
@ -23,81 +23,81 @@ much privacy can be gained by configuring it.
</p> </p>
<table> <table>
<tr> <tr>
<td><center><img src="/images/tor_logo.png" alt="TOR Logo"></center></td> <td><center><img src../images/tor_logo.png" alt="TOR Logo"></center></td>
<td><center><img src="/images/icecat_logo.png" alt="GNU IceCat Logo"></center></td> <td><center><img src../images/icecat_logo.png" alt="GNU IceCat Logo"></center></td>
<td><center><img src="/images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td> <td><center><img src../images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td>
<td><center><img src="/images/iridium_logo.jpg" alt="Iridium Logo"></center></td> <td><center><img src../images/iridium_logo.jpg" alt="Iridium Logo"></center></td>
<td><center><img src="/images/palemoon_logo.png" alt="Pale Moon Logo"></center></td> <td><center><img src../images/palemoon_logo.png" alt="Pale Moon Logo"></center></td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="/articles/tor.html">TOR Browser</a></b></center></td> <td><center><b><a href="../articles/tor.html">TOR Browser</a></b></center></td>
<td><center><b><a href="/articles/icecat.html">GNU IceCat</a></b></center></td> <td><center><b><a href="../articles/icecat.html">GNU IceCat</a></b></center></td>
<td><center><b><a href="/articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td> <td><center><b><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td>
<td><center><b><a href="/articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td> <td><center><b><a href="../articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td>
<td><center><b><a href="/articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td> <td><center><b><a href="../articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td>
</tr> </tr>
</table> </table>
<h2><font color=lime>High Tier - Good Privacy</font></h2> <h2><font color=lime>High Tier - Good Privacy</font></h2>
<p> <p>
These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and
do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer. do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer.
</p> </p>
<table> <table>
<tr> <tr>
<td><center><img src="/images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td> <td><center><img src../images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td>
<td><center><img src="/images/falkon_logo.png" alt="Falkon Logo"></center></td> <td><center><img src../images/falkon_logo.png" alt="Falkon Logo"></center></td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="/articles/otter.html">Otter Browser</a></b></center></td> <td><center><b><a href="../articles/otter.html">Otter Browser</a></b></center></td>
<td><center><b><a href="/articles/falkon.html">Falkon</a></b></center></td> <td><center><b><a href="../articles/falkon.html">Falkon</a></b></center></td>
</tr> </tr>
</table> </table>
<h2><font color=yellow>Mid Tier - Ok Privacy</font></h2> <h2><font color=yellow>Mid Tier - Ok Privacy</font></h2>
<p> <p>
These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't
have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers. have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers.
</p> </p>
<table> <table>
<tr> <tr>
<td><center><img src="/images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td> <td><center><img src../images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td>
<td><center><img src="/images/sphere_logo.png" alt="SphereLogo"></center></td> <td><center><img src../images/sphere_logo.png" alt="SphereLogo"></center></td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="/articles/qutebrowser.html">Qutebrowser</a></b></center></td> <td><center><b><a href="../articles/qutebrowser.html">Qutebrowser</a></b></center></td>
<td><center><b><a href="/articles/sphere.html">Sphere Browser</a></b></center></td> <td><center><b><a href="../articles/sphere.html">Sphere Browser</a></b></center></td>
</tr> </tr>
</table> </table>
<h2><font color=orange>Low Tier - Poor Privacy</font></h2> <h2><font color=orange>Low Tier - Poor Privacy</font></h2>
<p> <p>
These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general. These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general.
Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point
where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys <b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys
going to be better to pick a browser higher on this list. going to be better to pick a browser higher on this list.
<table> <table>
<tr> <tr>
<td><center><img src="/images/waterfox logo.png" alt="Waterfox Logo"></center></td> <td><center><img src../images/waterfox logo.png" alt="Waterfox Logo"></center></td>
<td><img src="/images/brave_logo.png" alt="Brave logo"></td> <td><img src../images/brave_logo.png" alt="Brave logo"></td>
<td><img src="/images/firefox_logo.png" alt="firefox Logo"></td> <td><img src../images/firefox_logo.png" alt="firefox Logo"></td>
<td><img src="/images/vivaldi_logo.png" alt="vivaldi Logo"></td> <td><img src../images/vivaldi_logo.png" alt="vivaldi Logo"></td>
<td><img src="/images/dissenter_logo.png" alt="Dissenter Logo"></td> <td><img src../images/dissenter_logo.png" alt="Dissenter Logo"></td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="/articles/waterfox.html">Waterfox</a></b></center></td> <td><center><b><a href="../articles/waterfox.html">Waterfox</a></b></center></td>
<td><center><b><a href="/articles/brave.html">Brave</a></b></center></td> <td><center><b><a href="../articles/brave.html">Brave</a></b></center></td>
<td><center><b><a href="/articles/firefox.html">Firefox</a></b></center></td> <td><center><b><a href="../articles/firefox.html">Firefox</a></b></center></td>
<td><center><b><a href="/articles/vivaldi.html">Vivaldi</a></b></center></td> <td><center><b><a href="../articles/vivaldi.html">Vivaldi</a></b></center></td>
<td><center><b><a href="/articles/dissenter.html">Dissenter</a></b></center></td> <td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td>
</tr> </tr>
</table> </table>
<h2><font color=red>Shit tier - No Privacy</font></h2> <h2><font color=red>Shit tier - No Privacy</font></h2>
@ -106,25 +106,25 @@ going to be better to pick a browser higher on this list.
</p> </p>
<table> <table>
<tr> <tr>
<td> <img src="/images/chrome_logo.png" alt="chrome logo"></td> <td> <img src../images/chrome_logo.png" alt="chrome logo"></td>
<td> <img src="/images/opera_logo.png" alt="opera logo"></td> <td> <img src../images/opera_logo.png" alt="opera logo"></td>
<td> <img src="/images/slimjet_logo.png" alt="SlimJet logo"></td> <td> <img src../images/slimjet_logo.png" alt="SlimJet logo"></td>
<td> <img src="/images/webdiscover_logo.png" alt="WebDiscover logo"></td> <td> <img src../images/webdiscover_logo.png" alt="WebDiscover logo"></td>
<td> <img src="/images/srware_logo.png" alt="Iron logo"></td> <td> <img src../images/srware_logo.png" alt="Iron logo"></td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="/articles/chrome.html">Google Chrome</a></b></center></td> <td><center><b><a href="../articles/chrome.html">Google Chrome</a></b></center></td>
<td><center><b><a href="/articles/opera.html">Opera</a></b></center></td> <td><center><b><a href="../articles/opera.html">Opera</a></b></center></td>
<td><center><b><a href="/articles/slimjet.html">SlimJet</a></b></center></td> <td><center><b><a href="../articles/slimjet.html">SlimJet</a></b></center></td>
<td><center><b><a href="/articles/webdiscover.html">WebDiscover</a></b></center></td> <td><center><b><a href="../articles/webdiscover.html">WebDiscover</a></b></center></td>
<td><center><b><a href="/articles/iron.html">SRWare Iron</a></b></center></td> <td><center><b><a href="../articles/iron.html">SRWare Iron</a></b></center></td>
</tr> </tr>
</table> </table>
<hr> <hr>
<h2>Further Reading</h2> <h2>Further Reading</h2>
<p> <p>
This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people, This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people,
with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide
to make your decision, so, you should probably read a few more, these are some good ones. to make your decision, so, you should probably read a few more, these are some good ones.
</p> </p>
@ -135,8 +135,8 @@ going to be better to pick a browser higher on this list.
This article was last edited on 2/20/2019 This article was last edited on 2/20/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>CCleaner</h1> <h1>CCleaner</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/ccleaner_logo.png" alt="ccleaner logo"> <img src../images/ccleaner_logo.png" alt="ccleaner logo">
<p> <p>
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer. CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
@ -20,10 +20,10 @@ where it provides one privacy policy for every single product its company offers
</p> </p>
<h3>CCleaner collects and sells user information to advertisers</h3> <h3>CCleaner collects and sells user information to advertisers</h3>
<p> <p>
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to
advertisers: advertisers:
</p> </p>
<img src="/images/ccleaner_privacy.png" alt ="Ccleaner privacy settings"> <img src../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
<p>Image Source: <sup><a href="#2">[2]</a></sup></p> <p>Image Source: <sup><a href="#2">[2]</a></sup></p>
<h3>CCleaner tracks a huge amount of personal information</h3> <h3>CCleaner tracks a huge amount of personal information</h3>
@ -45,7 +45,7 @@ where it provides one privacy policy for every single product its company offers
<li>Logentries <li>Logentries
</ul> </ul>
<p> <p>
It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be
enough to understand that CCleaner is full of third party spyware, as well as first party spyware. enough to understand that CCleaner is full of third party spyware, as well as first party spyware.
</p> </p>
<h3>CCleaner sends you spam email</h3> <h3>CCleaner sends you spam email</h3>
@ -90,9 +90,9 @@ In the past, CCleaner has been compromised and backdoors have been added to it.<
This article was last edited on 8/21/2018 This article was last edited on 8/21/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>CDex</h1> <h1>CDex</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/cdex_logo.png" alt="cdex logo"> <img src../images/cdex_logo.png" alt="cdex logo">
<p> <p>
CDex is an Open Source Digital Audio CD Extractor. CDex is an Open Source Digital Audio CD Extractor.
</p> </p>
@ -16,16 +16,16 @@
<p> <p>
CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out. CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out.
Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but
I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2. I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2.
The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my
tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open. tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open.
</p> </p>
<h3>Bundling with spyware</h3> <h3>Bundling with spyware</h3>
<p> <p>
CDex attempts to bundle it self with the <a href="/articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be. CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be.
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users. This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users.
</p> </p>
<img src="/images/cdex_bundling.png" alt="CDex installer spyware opt-out screen"> <img src../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen">
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -39,8 +39,8 @@
This article was last edited on 7/29/2018 This article was last edited on 7/29/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Google Chrome</h1> <h1>Google Chrome</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/chrome_es.html">Spanish Translation</a> <a href="../articles/chrome_es.html">Spanish Translation</a>
<a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a> <a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[4knomcor76uif5na.onion]</a> <a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[4knomcor76uif5na.onion]</a>
<a href="http://archive.is/JB6Pm">[archive.is]</a> <a href="http://archive.is/JB6Pm">[archive.is]</a>
</p> </p>
<img src="/images/chrome_logo.png" alt="chrome logo"> <img src../images/chrome_logo.png" alt="chrome logo">
<p> <p>
Google Chrome is a web browser developed and distributed by <a href="/articles/google.html">Google</a>. Google Chrome is a web browser developed and distributed by <a href="../articles/google.html">Google</a>.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p> <p>
@ -29,7 +29,7 @@ Large parts of Google Chrome are open source, however not all of them are, and t
<p> <p>
Google Chrome contains several spyware features that reply on the user's search history being uploaded to Google servers. This is confirmed by the language in the privacy policy<sup><a href="#1">[1]</a></sup>, clarifying the spyware features that rely on this. Google Chrome contains several spyware features that reply on the user's search history being uploaded to Google servers. This is confirmed by the language in the privacy policy<sup><a href="#1">[1]</a></sup>, clarifying the spyware features that rely on this.
</p><p> </p><p>
The first spyware feature is Google Chrome's integration with the "Google Account" spyware platform. <i>" If you are signed in to a Google site or signed in to Chrome and Google is your default search engine, searches you perform using the address bar in Chrome are stored in your Google account. "</i> The first spyware feature is Google Chrome's integration with the "Google Account" spyware platform. <i>" If you are signed in to a Google site or signed in to Chrome and Google is your default search engine, searches you perform using the address bar in Chrome are stored in your Google account. "</i>
</p><p> </p><p>
Google Chrome also contains a spyware feature called "Search prediction service". It is explained that: <i>"When you search using the address bar in Chrome, the characters you type (even if you havent hit "enter" yet) are sent to your default search engine. If Google is your default search engine, predictions are based on your own search history, topics related to what youre typing and what other people are searching for."</i> Google Chrome also contains a spyware feature called "Search prediction service". It is explained that: <i>"When you search using the address bar in Chrome, the characters you type (even if you havent hit "enter" yet) are sent to your default search engine. If Google is your default search engine, predictions are based on your own search history, topics related to what youre typing and what other people are searching for."</i>
</p><p> </p><p>
@ -55,11 +55,11 @@ This was confirmed in multiple places<sup><a href="#3">[3]</a></sup><sup><a href
</p> </p>
<h3>Google Chrome records your voice</h3> <h3>Google Chrome records your voice</h3>
<p> <p>
Google Chrome is confirmed to be constantly listening to any open microphones on your computer. This can be found in this statement<sup><a href="#5">[5]</a></sup> in a privacy publication. <i>"Voice & audio information may be collected. For example, if your child uses audio activation commands (e.g., "OK, Google" or touching the microphone icon), a recording of the following speech/audio, <b> plus a few seconds before, </b> will be stored to their account…"</i> This feature is opt-in if you are using the "Google Accounts" spyware platform and specifically tell Google to build a profile of your child. It's unverified wether or not Google uploads information it listens too to its servers outside of this feature. Google Chrome is confirmed to be constantly listening to any open microphones on your computer. This can be found in this statement<sup><a href="#5">[5]</a></sup> in a privacy publication. <i>"Voice & audio information may be collected. For example, if your child uses audio activation commands (e.g., "OK, Google" or touching the microphone icon), a recording of the following speech/audio, <b> plus a few seconds before, </b> will be stored to their account…"</i> This feature is opt-in if you are using the "Google Accounts" spyware platform and specifically tell Google to build a profile of your child. It's unverified wether or not Google uploads information it listens too to its servers outside of this feature.
</p> </p>
<h3>Google Chrome saves user passwords on Google Servers</h3> <h3>Google Chrome saves user passwords on Google Servers</h3>
<p> <p>
Any password stored in Google Chrome's "password management" feature is uploaded to Google if you sign into the "Google Accounts" spyware platform. Any password stored in Google Chrome's "password management" feature is uploaded to Google if you sign into the "Google Accounts" spyware platform.
</p> </p>
<h3>Google Chrome profiles users in other various ways</h3> <h3>Google Chrome profiles users in other various ways</h3>
<p> <p>
@ -68,23 +68,23 @@ According to the privacy policy<sup><a href="#1">[1]</a></sup>, Google Chrome pr
<h3>Google Chrome is self-updating software</h3> <h3>Google Chrome is self-updating software</h3>
<p> <p>
Google Chrome has an updater which is constantly running in the background and syncing with Google servers to check for updates. The updater will download and run unverified binaries from Google when it updates Google Chrome. It is impossible for an automatic updater service such as this to verify that the updates are not spyware and/or do not contain additional spyware features. Google Chrome has an updater which is constantly running in the background and syncing with Google servers to check for updates. The updater will download and run unverified binaries from Google when it updates Google Chrome. It is impossible for an automatic updater service such as this to verify that the updates are not spyware and/or do not contain additional spyware features.
<p> <p>
<hr> <hr>
<h2>Further Reading</h2> <h2>Further Reading</h2>
<p> <p>
<a href="https://stallman.org/google.html">Reasons not to use Google</a> <a href="https://stallman.org/google.html">Reasons not to use Google</a>
<a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a>
<a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a><br> <a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a><br>
<a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a> <a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a>
<a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a>
<a href="http://archive.is/OR4dz">[archive.is]</a><br> <a href="http://archive.is/OR4dz">[archive.is]</a><br>
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a> <a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a>
<a href="https://archive.is/GJIKw">[archive.is]</a> <a href="https://archive.is/GJIKw">[archive.is]</a>
<a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a><br>
@ -109,8 +109,8 @@ Google Chrome has an updater which is constantly running in the background and s
This article was last edited on 12/12/2018 This article was last edited on 12/12/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Google Chrome</h1> <h1>Google Chrome</h1>
<p><a href="/articles">Back to catalog (English)</a><br> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/chrome.html">English Translation</a><br> <a href="../articles/chrome.html">English Translation</a><br>
Mirrors: Mirrors:
<a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a> <a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[qorglaofrwqdj4is.onion]</a> <a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[qorglaofrwqdj4is.onion]</a>
<a href="http://archive.is/JB6Pm">[archive.is]</a></p> <a href="http://archive.is/JB6Pm">[archive.is]</a></p>
<img src="/images/chrome_logo.png" alt="chrome logo"> <img src../images/chrome_logo.png" alt="chrome logo">
<p>Google Chrome es un navegador web desarollado y distribuido por Google</p> <p>Google Chrome es un navegador web desarollado y distribuido por Google</p>
<h2>Nivel de spyware: <font color=red>EXTREMADAMENTE ALTO</font></h2> <h2>Nivel de spyware: <font color=red>EXTREMADAMENTE ALTO</font></h2>
@ -37,7 +37,7 @@ Google Chrome contiene mucho spyware que responden en el historial de la busqued
<ul> <ul>
<li>Un rastreador que graba el cursor</li> <li>Un rastreador que graba el cursor</li>
<li>Un rastrador que graba el uso de memoría (RAM)</li> <li>Un rastrador que graba el uso de memoría (RAM)</li>
</ul> </ul>
</p> </p>
<h3>Google Chrome está integrado con Google Payments</h3> <h3>Google Chrome está integrado con Google Payments</h3>
@ -64,16 +64,16 @@ Google Chrome contiene mucho spyware que responden en el historial de la busqued
<a href="https://stallman.org/google.html">Reasons not to use Google</a> <a href="https://stallman.org/google.html">Reasons not to use Google</a>
<a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a>
<a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a><br> <a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a><br>
<a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a> <a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a>
<a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a>
<a href="http://archive.is/OR4dz">[archive.is]</a><br> <a href="http://archive.is/OR4dz">[archive.is]</a><br>
</p> </p>
<hr> <hr>
<h2>Referencias</h2> <h2>Referencias</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a> <a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a>
<a href="https://archive.is/GJIKw">[archive.is]</a> <a href="https://archive.is/GJIKw">[archive.is]</a>
<a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a><br>
@ -100,8 +100,8 @@ Google Chrome contiene mucho spyware que responden en el historial de la busqued
This is a translation of the english article. It may become outdated- compare the dates on both articles. This is a translation of the english article. It may become outdated- compare the dates on both articles.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,48 +1,48 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Discord</h1> <h1>Discord</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/discord_es.html">Spanish Translation</a> <a href="../articles/discord_es.html">Spanish Translation</a>
<a href="https://qorg.xyz/spyware/discord.cgi">[qorg.xyz]</a> <a href="https://qorg.xyz/spyware/discord.cgi">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/discord.cgi">[qorglaofrwqdj4is.onion]</a> <a href="https://qorglaofrwqdj4is.onion/spyware/discord.cgi">[qorglaofrwqdj4is.onion]</a>
<a href="http://web.archive.org/web/20181118194244/https://qorg.xyz/spyware/discord.cgi">[web.archive.org]</a> <a href="http://web.archive.org/web/20181118194244/https://qorg.xyz/spyware/discord.cgi">[web.archive.org]</a>
<a href="http://archive.is/7T29F">[archive.is]</a></p> <a href="http://archive.is/7T29F">[archive.is]</a></p>
<img src="/images/discord_logo.png" alt="Discord-Logo"> <img src../images/discord_logo.png" alt="Discord-Logo">
<p> <p>
Discord is an instant messaging application for MacOS, Windows, Linux, Discord is an instant messaging application for MacOS, Windows, Linux,
Android, and iOS. Discord is used to communicate via voice chat and Android, and iOS. Discord is used to communicate via voice chat and
text chat, and has image-sharing and file-sharing capabilities. text chat, and has image-sharing and file-sharing capabilities.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
<font color="lightgreen"> <font color="lightgreen">
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated. Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated.
</font><br> </font><br>
</p> </p>
<a href="https://spyware.neocities.org/articles/discord.html"><img src="/images/discord-no-way-2.gif" alt="Discord? No Way!"></a> <a href="https://spyware.neocities.o../articles/discord.html"><img src../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
<p> <p>
Discord is spyware because it collects all information that passes Discord is spyware because it collects all information that passes
through its communication platform. As Discord is a centralized through its communication platform. As Discord is a centralized
communication platform, all communications have to go through Discord's communication platform, all communications have to go through Discord's
official servers, where all of that information can potentially be official servers, where all of that information can potentially be
recorded. The vast majority of said information has been confirmed recorded. The vast majority of said information has been confirmed
to be recorded, such as all communications between users. Discord has to be recorded, such as all communications between users. Discord has
also been confirmed to use other spyware features such as various forms also been confirmed to use other spyware features such as various forms
of telemetry. Discord's main source of income is from investment, from which of telemetry. Discord's main source of income is from investment, from which
it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from
source and the source code for Discord is unavailable. source and the source code for Discord is unavailable.
</p> </p>
<h3>Discord does not make its source code available</h3> <h3>Discord does not make its source code available</h3>
<p> <p>
It is impossible to download and examine Discord's source code, It is impossible to download and examine Discord's source code,
which means that it is impossible to prove that Discord is not which means that it is impossible to prove that Discord is not
spyware. Any program which does not make its source code available is spyware. Any program which does not make its source code available is
potential spyware. potential spyware.
</p> </p>
@ -57,7 +57,7 @@ Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup>
<li>All text messages</li> <li>All text messages</li>
<li>All images</li> <li>All images</li>
<li>All VOIP data (voice chat)</li> <li>All VOIP data (voice chat)</li>
<li>Open rates for e-mail sent by Discord</li> <li>Open rates for e-mail sent by Discord</li>
</ul> </ul>
<p> <p>
Discord does not explictly confirm that it collects this information, but still collects it by default: Discord does not explictly confirm that it collects this information, but still collects it by default:
@ -66,100 +66,100 @@ Discord does not explictly confirm that it collects this information, but still
<li>Logs of all of the other programs that are open on your computer</li> <li>Logs of all of the other programs that are open on your computer</li>
</ul> </ul>
<p> <p>
The implications of this information can be broken down like this: By The implications of this information can be broken down like this: By
recording your IP address, Discord can track your general location recording your IP address, Discord can track your general location
(about as precise as which county you are in). Discord can also tell (about as precise as which county you are in). Discord can also tell
which devices you use, as it uniquely identifies each device, and how which devices you use, as it uniquely identifies each device, and how
much you use those devices, as it can record your device usage habits much you use those devices, as it can record your device usage habits
(since Discord is usually open in the background so that it can receive (since Discord is usually open in the background so that it can receive
messages). Discord also records every single interaction you have with messages). Discord also records every single interaction you have with
other users through its service. This means that Discord is confirmed other users through its service. This means that Discord is confirmed
to log every conversation that you have through Discord, and record to log every conversation that you have through Discord, and record
everything that you say on Discord, and view all images that you send everything that you say on Discord, and view all images that you send
through Discord. Therefore, none of your interactions on Discord are through Discord. Therefore, none of your interactions on Discord are
private. Discord's privacy policy also contains several occurrences of private. Discord's privacy policy also contains several occurrences of
phrases such as "including but not limited to," which is an explicit phrases such as "including but not limited to," which is an explicit
confirmation that Discord contains more spyware features that are not confirmation that Discord contains more spyware features that are not
disclosed to the user. disclosed to the user.
</p> </p>
<h3>Discord contains features which allow integration with other spyware platforms</h3> <h3>Discord contains features which allow integration with other spyware platforms</h3>
<p> <p>
Discord contains the opt-in spyware feature known as "social media Discord contains the opt-in spyware feature known as "social media
integration." This allows you to sync your persistent user identity integration." This allows you to sync your persistent user identity
on Discord with your persistent user identity on other spyware on Discord with your persistent user identity on other spyware
platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>, platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>,
Discord has confirmed that if you opt in to this spyware feature, Discord has confirmed that if you opt in to this spyware feature,
Discord will obtain an undisclosed amount of access to information Discord will obtain an undisclosed amount of access to information
obtained about you by the spyware platforms that you choose to sync obtained about you by the spyware platforms that you choose to sync
with. with.
</p> </p>
<h3>Discord contains a process logger</h3> <h3>Discord contains a process logger</h3>
<p> <p>
Discord has been confirmed to monitor the open processes on your Discord has been confirmed to monitor the open processes on your
operating system. This is a spyware feature known as a "process logger" operating system. This is a spyware feature known as a "process logger"
that is generally used to record your program usage habits. This was that is generally used to record your program usage habits. This was
confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup> confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup>
In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is
mandatory for several features of the platform. The CTO and a Discord engineer go on mandatory for several features of the platform. The CTO and a Discord engineer go on
to claim that Discord does not use the process logger to send records to claim that Discord does not use the process logger to send records
of the open processes on the user's computer. of the open processes on the user's computer.
</p> </p>
<p> <p>
The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with
the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message" the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message"
turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way. turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way.
However when setting the "Display currently running game as a status message" turned on, the behavior However when setting the "Display currently running game as a status message" turned on, the behavior
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here: described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here:
</p> </p>
<img src="/images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon"> <img src../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon">
<p> <p>
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to software it isn't possible for either this article or the Discord developers to prove how much information is being sent to
Discord's servers when the process logger is turned on. But it's at least possible to turn it off. Discord's servers when the process logger is turned on. But it's at least possible to turn it off.
</p> </p>
<h3>Discord uses it's process logging for advertising</h3> <h3>Discord uses it's process logging for advertising</h3>
<p> <p>
Discord shows this in it's privacy option here: Discord shows this in it's privacy option here:
</p> </p>
<img src="/images/discord_data.png" alt="Discord process logging usefulness"> <img src../images/discord_data.png" alt="Discord process logging usefulness">
<p> <p>
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware), That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware),
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build
a statistical model of what programs you might buy/lisence in the future.</b></font> a statistical model of what programs you might buy/lisence in the future.</b></font>
</p> </p>
<img src="/images/discord_2.png" alt="Discord confirms process logging is used for advertising"> <img src../images/discord_2.png" alt="Discord confirms process logging is used for advertising">
<h3>Discord tries to force some users to give their Telephone numbers</h3> <h3>Discord tries to force some users to give their Telephone numbers</h3>
<p> <p>
Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out
users isn't known. users isn't known.
</p> </p>
<img src="/images/discord_verify.png" alt="discord phone verification"> <img src../images/discord_verify.png" alt="discord phone verification">
<h3>Discord receives government requests for your information</h3> <h3>Discord receives government requests for your information</h3>
<p> <p>
Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup> Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup>
that it does receive government requests for information. So, we know that it does receive government requests for information. So, we know
that the government potentially has access to all of the information that the government potentially has access to all of the information
that Discord collects about you. You can read a copy of the email image that Discord collects about you. You can read a copy of the email image
posted in the source <a href="https://spyware.neocities.org/images/discord%20government%20requests.png">here</a> in case the link there dies. posted in the source <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">here</a> in case the link there dies.
</p> </p>
<hr> <hr>
<h2>Speculation on Discord's future</h2> <h2>Speculation on Discord's future</h2>
<p> <p>
It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able
to consistently raise new invesment capital, which is at a level where it could reasonably be covering to consistently raise new invesment capital, which is at a level where it could reasonably be covering
all of its operating costs. However, Discord, like any other company, is not going to exist in a all of its operating costs. However, Discord, like any other company, is not going to exist in a
constant state of investment. Discord is going to have to transition away from an investment-financed constant state of investment. Discord is going to have to transition away from an investment-financed
business model to a revenue model that exclusively relies on generating revenue from the users of the business model to a revenue model that exclusively relies on generating revenue from the users of the
platform. platform.
</p> </p>
<p> <p>
Discord has several ways of making money. It can lisence emoji's and other features of the program with Discord has several ways of making money. It can lisence emoji's and other features of the program with
Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's
new online store, as a competitor to <a href="/articles/steam.html">Steam</a>. However both of these revenue new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However both of these revenue
sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup> sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back) and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back)
</p> </p>
@ -168,20 +168,20 @@ If Discord is not able to satisfy it's obligation to it's investors, it has a th
to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it
is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>, is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>,
and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy. and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy.
This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current
revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble, revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble,
it probably will be forced to liquiate this asset. it probably will be forced to liquiate this asset.
</p> </p>
<hr> <hr>
<h2>Further Reading</h2> <h2>Further Reading</h2>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a> <a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
<a href="https://archive.is/Q4N9J">[archive.is]</a><br> <a href="https://archive.is/Q4N9J">[archive.is]</a><br>
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a> <a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br> <a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br> <a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br> <a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a> <a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
@ -196,40 +196,40 @@ it probably will be forced to liquiate this asset.
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a> <a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a>
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a>
<a href="https://archive.li/qFcQA">[archive.is]</a><br> <a href="https://archive.li/qFcQA">[archive.is]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="https://discordapp.com/company">Discord</a> <a href="https://discordapp.com/company">Discord</a>
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> <a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="4">4.</a> <a name="4">4.</a>
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <a href="https://www.crunchbase.com/organization/discord">Crunchbase</a>
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> <a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="5">5.</a> <a name="5">5.</a>
<a href="https://discordapp.com/nitro">Discord Nitro</a> <a href="https://discordapp.com/nitro">Discord Nitro</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="6">6.</a> <a name="6">6.</a>
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> <a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a>
<a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://archive.is/JrdJ9">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br>
<a name="7">7.</a> <a name="7">7.</a>
<a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a> <a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a>
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br>
<a name="8">8.</a> <a name="8">8.</a>
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a> <a href="https://support.discordapp.com/hc/en-../articles/360004109911">Data Privacy Controls</a>
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-../articles/360004109911">[web.archive.org]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 4/11/2019 This article was last edited on 4/11/2019
@ -238,7 +238,7 @@ it probably will be forced to liquiate this asset.
This article was created on 11/23/17 This article was created on 11/23/17
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body></html> </body></html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Discord</h1> <h1>Discord</h1>
<p><a href="/articles">Back to catalog (English)</a><br> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/discord.html">English Translation</a><br> <a href="../articles/discord.html">English Translation</a><br>
Mirrors: Mirrors:
<a href=" https://qorg.xyz/spyware/discord.cgi">[qorg.xyz]</a> <a href=" https://qorg.xyz/spyware/discord.cgi">[qorg.xyz]</a>
<a href="http://qorglaofrwqdj4is.onion/spyware/discord.cgi">[qorglaofrwqdj4is.onion]</a> <a href="http://qorglaofrwqdj4is.onion/spyware/discord.cgi">[qorglaofrwqdj4is.onion]</a>
<a href="http://web.archive.org/web/20181118194244/https://qorg.xyz/spyware/discord.cgi">[web.archive.org]</a> <a href="http://web.archive.org/web/20181118194244/https://qorg.xyz/spyware/discord.cgi">[web.archive.org]</a>
<a href="http://archive.is/7T29F">[archive.is]</a></p> <a href="http://archive.is/7T29F">[archive.is]</a></p>
<img src="/images/discord_logo.png" alt="Discord-Logo"> <img src../images/discord_logo.png" alt="Discord-Logo">
<p> <p>
Discord es un programa de mensajería instantanea disponible para MacOS, GNU/Linux, Android, Windows, Android e iOS. Discord es un programa de mensajería instantanea disponible para MacOS, GNU/Linux, Android, Windows, Android e iOS.
Discord puede usarse para comunicarse vía voz y chat de texto, también se puede usar para compartir archivos e imágenes. Discord puede usarse para comunicarse vía voz y chat de texto, también se puede usar para compartir archivos e imágenes.
@ -32,8 +32,8 @@ Discord confirma que recolecta varia información de los usuarios.
</p> </p>
<h3>Discord does not make its source code available</h3> <h3>Discord does not make its source code available</h3>
<p> <p>
It is impossible to download and examine Discord's source code, It is impossible to download and examine Discord's source code,
which means that it is impossible to prove that Discord is not which means that it is impossible to prove that Discord is not
spyware. Any program which does not make its source code available is spyware. Any program which does not make its source code available is
potential spyware. potential spyware.
</p> </p>
@ -82,18 +82,18 @@ En el mismo hilo, el CTO admite que es obligatorio este spyware y no puede ser r
<h3>Discord recibe peticiones de gobierno para tu informacion</h3> <h3>Discord recibe peticiones de gobierno para tu informacion</h3>
<p> <p>
Discord ha confirmado de una de sus correspondencia de E-mail <sup><a href="#6">[6]</a></sup> donde confirma que recibe peticiones del gobierno de informacion, asi que podemos saber que el gobierno tiene toda la informacion que Discord ha recolectado de ti <a href="https://spyware.neocities.org/images/discord%20government%20requests.png">aqui</a> Discord ha confirmado de una de sus correspondencia de E-mail <sup><a href="#6">[6]</a></sup> donde confirma que recibe peticiones del gobierno de informacion, asi que podemos saber que el gobierno tiene toda la informacion que Discord ha recolectado de ti <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">aqui</a>
por si el link muere. por si el link muere.
</p> </p>
<hr> <hr>
<h2>Mas cosas</h2> <h2>Mas cosas</h2>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a> <a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
<a href="https://archive.is/Q4N9J">[archive.is]</a><br> <a href="https://archive.is/Q4N9J">[archive.is]</a><br>
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a> <a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br> <a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br> <a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br> <a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a> <a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
@ -108,36 +108,36 @@ por si el link muere.
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a> <a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a>
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a>
<a href="https://archive.li/qFcQA">[archive.is]</a><br> <a href="https://archive.li/qFcQA">[archive.is]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="https://discordapp.com/company">Discord</a> <a href="https://discordapp.com/company">Discord</a>
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> <a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="4">4.</a> <a name="4">4.</a>
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <a href="https://www.crunchbase.com/organization/discord">Crunchbase</a>
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> <a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="5">5.</a> <a name="5">5.</a>
<a href="https://discordapp.com/nitro">Discord Nitro</a> <a href="https://discordapp.com/nitro">Discord Nitro</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="6">6.</a> <a name="6">6.</a>
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> <a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a>
<a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://archive.is/JrdJ9">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was created on 11/18/2018<br> This article was created on 11/18/2018<br>
This is a translation of the english article. It may become outdated- compare the dates on both articles. This is a translation of the english article. It may become outdated- compare the dates on both articles.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body></html> </body></html>

View File

@ -1,41 +1,41 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Dissenter</h1> <h1>Dissenter</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/dissenter_logo.png" alt="Dissenter Logo"> <img src../images/dissenter_logo.png" alt="Dissenter Logo">
<p> <p>
Dissenter is a web browser and plugin released by the social network company Gab. Dissenter is a web browser and plugin released by the social network company Gab.
</p> </p>
<h2>Spyware Level: <font color="orange">High</font></h2> <h2>Spyware Level: <font color="orange">High</font></h2>
<p> <p>
The Dissenter browser is a fork of the <a href="/articles/brave.html">Brave</a> web browser. It phones home to The Dissenter browser is a fork of the <a href="../articles/brave.html">Brave</a> web browser. It phones home to
Brave for autoupdates and safebrowsing, which is hosted by Brave. The default search engine is <a href="/articles/duckduckgo.html">DuckDuckGo</a>. Brave for autoupdates and safebrowsing, which is hosted by Brave. The default search engine is <a href="../articles/duckduckgo.html">DuckDuckGo</a>.
The browser has two extensions preinstalled. One extension, "Shields", blocks certain advertisment scripts. The other, The browser has two extensions preinstalled. One extension, "Shields", blocks certain advertisment scripts. The other,
"Dissenter" allows you to access the Dissenter social network. This extension phones home to several places whenever you open it, "Dissenter" allows you to access the Dissenter social network. This extension phones home to several places whenever you open it,
including Google and Twitter. The Dissenter social network also inherently must collect more information about the user's browsing including Google and Twitter. The Dissenter social network also inherently must collect more information about the user's browsing
habits than the current alternatives that already exist. habits than the current alternatives that already exist.
</p> </p>
<h3>Phoning home</h3> <h3>Phoning home</h3>
<p> <p>
When the Dissenter Browser is started, it will make several connections to Brave's autoupdate services: When the Dissenter Browser is started, it will make several connections to Brave's autoupdate services:
</p> </p>
<img src="/images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave"> <img src../images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave">
<p> <p>
Every once in a while, the Browser will send a request to Brave's instance of the Google safebrowsing service: Every once in a while, the Browser will send a request to Brave's instance of the Google safebrowsing service:
</p> </p>
<img src="/images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave"> <img src../images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave">
<p> <p>
<p> <p>
Whenever the Dissenter extension is opened, it will phone home to several companies: Whenever the Dissenter extension is opened, it will phone home to several companies:
</p> </p>
<img src="/images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home"> <img src../images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home">
<p> <p>
This includes: This includes:
</p> </p>
@ -47,7 +47,7 @@ Every once in a while, the Browser will send a request to Brave's instance of th
<li>Cloudflare</li> <li>Cloudflare</li>
</ul> </ul>
<p> <p>
This happens every time the extension is opened. This happens every time the extension is opened.
</p> </p>
<h3>Opt-out telemetry</h3> <h3>Opt-out telemetry</h3>
<p> <p>
@ -58,23 +58,23 @@ Every once in a while, the Browser will send a request to Brave's instance of th
</i> <sup><a href="#1">[1]</a></sup>.</p> </i> <sup><a href="#1">[1]</a></sup>.</p>
<h3>Dissenter bypasses it's own tracker filter</h3> <h3>Dissenter bypasses it's own tracker filter</h3>
<p> <p>
Dissenter comes with it's own content blocker called Shields that is meant to block trackers as you browse the web. Dissenter comes with it's own content blocker called Shields that is meant to block trackers as you browse the web.
This content blocker can block requests made by regular websites, but it does not block content that This content blocker can block requests made by regular websites, but it does not block content that
is loaded by the Dissenter extension. The Dissenter extension makes requests to trackers that would have been is loaded by the Dissenter extension. The Dissenter extension makes requests to trackers that would have been
blocked by it's own filter- by it's <b><font color=yellow>own standards</font></b> Dissenter makes connections to blocked by it's own filter- by it's <b><font color=yellow>own standards</font></b> Dissenter makes connections to
tracking websites that are not necessary and not private. The spyware site <code>googleads.g.doubleclick.net</code> tracking websites that are not necessary and not private. The spyware site <code>googleads.g.doubleclick.net</code>
is correctly blocked by Shields when a normal website tries to access it, but this connection is not blocked when Dissenter accesses it... is correctly blocked by Shields when a normal website tries to access it, but this connection is not blocked when Dissenter accesses it...
This is an interesting double standard when it comes to privacy. This is an interesting double standard when it comes to privacy.
</p> </p>
<img src="/images/sheilds_blocking.png"> <img src../images/sheilds_blocking.png">
<hr> <hr>
<h2>Inherent issues with Dissenter</h2> <h2>Inherent issues with Dissenter</h2>
<p> <p>
Dissenter has the inherent problem that it associates the web pages you have visited with the discussions you are having or trying to have. Dissenter has the inherent problem that it associates the web pages you have visited with the discussions you are having or trying to have.
If you want to check an article's comments on Dissenter, you have to tell Gab that you visited that article. This gives Gab a very good profile If you want to check an article's comments on Dissenter, you have to tell Gab that you visited that article. This gives Gab a very good profile
of what sites you visit and what articles you read. Currently alternatives exist to this model that are already in place. For example, you can of what sites you visit and what articles you read. Currently alternatives exist to this model that are already in place. For example, you can
create a thread on an Imageboard, Reddit-like website, or other web forum format, which sets an archived link to the article as the topic of discussion. create a thread on an Imageboard, Reddit-like website, or other web forum format, which sets an archived link to the article as the topic of discussion.
This format is much more private because the parties involved have much less information about what their users did. The news website has no This format is much more private because the parties involved have much less information about what their users did. The news website has no
idea who read it's article, because the traffic went to the archival service. The forum that you can freely comment on also doesn't know what idea who read it's article, because the traffic went to the archival service. The forum that you can freely comment on also doesn't know what
articles you looked at or what discussions you tried to have. If we only consider privacy, this method is a somewhat better way of acheiving this goal. articles you looked at or what discussions you tried to have. If we only consider privacy, this method is a somewhat better way of acheiving this goal.
</p> </p>
@ -91,10 +91,10 @@ Every once in a while, the Browser will send a request to Brave's instance of th
This article was last edited on 5/24/2019 This article was last edited on 5/24/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 license to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 license to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>DuckDuckGo</h1> <h1>DuckDuckGo</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/duckduckgo_es.html">Spanish Translation</a></p> <a href="../articles/duckduckgo_es.html">Spanish Translation</a></p>
<img src="/images/ddg_logo.png" alt="DuckDuckGo logo"> <img src../images/ddg_logo.png" alt="DuckDuckGo logo">
<p> <p>
DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck Go, Inc. DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck Go, Inc.
</p> </p>
<h2>Spyware Level: <font color=greenyellow>Possible Spyware</font></h2> <h2>Spyware Level: <font color=greenyellow>Possible Spyware</font></h2>
<p> <p>
DuckDuckGo is a search engine that claims to protect the privacy of its users.<sup><a href="#1">[1]</a></sup> Since this a centeralized service, there is no way to prove that it isnt spyware just by DuckDuckGo is a search engine that claims to protect the privacy of its users.<sup><a href="#1">[1]</a></sup> Since this a centeralized service, there is no way to prove that it isnt spyware just by
looking at the technology that it uses. There are some red flags that could cause you to doubt that this service is truly private, and so this article will just list them looking at the technology that it uses. There are some red flags that could cause you to doubt that this service is truly private, and so this article will just list them
here to help you decide on whether or not to use this service. Ultimately there isn't proof that DuckDuckGo is spyware- but a few reasons to suspect it of being spyware. Even though, it's worth noting that here to help you decide on whether or not to use this service. Ultimately there isn't proof that DuckDuckGo is spyware- but a few reasons to suspect it of being spyware. Even though, it's worth noting that
DuckDuckGo <b><font color="lime">offers an onion domain</font></b>... so you don't need to trust it to use it as long as you acess it through TOR. DuckDuckGo <b><font color="lime">offers an onion domain</font></b>... so you don't need to trust it to use it as long as you acess it through TOR.
@ -32,7 +32,7 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
</p> </p>
<h3>Tracking pixels and other spyware</h3> <h3>Tracking pixels and other spyware</h3>
<p> <p>
DuckDuckGo uses clear gifs from the domain <code>improving.duckduckgo.com</code>. This is a tracking technique and can be used to collect analytics about your web browser. DuckDuckGo uses clear gifs from the domain <code>improving.duckduckgo.com</code>. This is a tracking technique and can be used to collect analytics about your web browser.
Whenever you use DuckDuckGo, several requests will be sent to this domain.<sup><a href="#4">[4]</a></sup> This is of course not the kind of behavior that you would expect from a privacy concerned website, but there it is. Do you trust DuckDuckGo to collect "anonymous" analytics about you? Whenever you use DuckDuckGo, several requests will be sent to this domain.<sup><a href="#4">[4]</a></sup> This is of course not the kind of behavior that you would expect from a privacy concerned website, but there it is. Do you trust DuckDuckGo to collect "anonymous" analytics about you?
</p> </p>
<hr> <hr>
@ -43,7 +43,7 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
<a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a> <a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a>
<a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a><br> <a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a><br>
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -52,15 +52,15 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
<a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a> <a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a>
<a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a> <a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a>
<a href="https://archive.is/Pw6og">[archive.is]</a><br> <a href="https://archive.is/Pw6og">[archive.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a> <a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a>
<a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a> <a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a>
<a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="/translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*<br> <a href="/translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*<br>
<a name="4">4.</a> <a name="4">4.</a>
<a href="https://duck.co/help/privacy/atb">Site Improvements</a> <a href="https://duck.co/help/privacy/atb">Site Improvements</a>
<a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a><br>
@ -68,14 +68,14 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
<p> <p>
*This is a machine-translated mirror of an article written in German hosted here. Links to the original article can be found on that page. *This is a machine-translated mirror of an article written in German hosted here. Links to the original article can be found on that page.
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 9/16/2018 This article was last edited on 9/16/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>DuckDuckGo</h1> <h1>DuckDuckGo</h1>
<p><a href="/articles">Back to catalog (English)</a><br> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/duckduckgo.html">English Translation</a></p> <a href="../articles/duckduckgo.html">English Translation</a></p>
<img src="/images/ddg_logo.png" alt=""> <img src../images/ddg_logo.png" alt="">
<p>DuckDuckGo es un motor de busqueda creado por Gabriel Weinberg y mantenido or Duck Duck Go, inc</p> <p>DuckDuckGo es un motor de busqueda creado por Gabriel Weinberg y mantenido or Duck Duck Go, inc</p>
<h3>Nivel de spyware: <font color=greenyellow>Posiblemente spyware</font></h3> <h3>Nivel de spyware: <font color=greenyellow>Posiblemente spyware</font></h3>
<p>DuckDuckGo es un motor de busqueda que jura proteger la privacidad de sus usuarios <sup><a href="#1">[1]</a></sup>debido a que es un servicio sentralizado, no es posible saber si es spyware viendo la tecnologia que usa. hay algunos avisos para dudar si es realmente privado. Este artículo es solo para hacerte decidir si usar o no este servicio. Ultimamente no hay prueba de que DuckDuckGo es spyware. Pero hay algunas razones para sospechar de ser spyware, de todas formas, esta bien saber de que DuckDuckGo <b><font color=lime>Ofrece un dominio onion</font></b> asi que no debes dudar en usarlo si estás en TOR</p> <p>DuckDuckGo es un motor de busqueda que jura proteger la privacidad de sus usuarios <sup><a href="#1">[1]</a></sup>debido a que es un servicio sentralizado, no es posible saber si es spyware viendo la tecnologia que usa. hay algunos avisos para dudar si es realmente privado. Este artículo es solo para hacerte decidir si usar o no este servicio. Ultimamente no hay prueba de que DuckDuckGo es spyware. Pero hay algunas razones para sospechar de ser spyware, de todas formas, esta bien saber de que DuckDuckGo <b><font color=lime>Ofrece un dominio onion</font></b> asi que no debes dudar en usarlo si estás en TOR</p>
@ -55,9 +55,9 @@
This translation may become out of date. Compare dates with the english article. This translation may become out of date. Compare dates with the english article.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,15 +1,15 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Example Article</h1> <h1>Example Article</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/example_logo.png" alt="Images are in the /images folder"> <img src../images/example_logo.png" alt="Images are in the /images folder">
<p> <p>
This part of the article should have the name of the program and what it does, and who develops it. This part of the article should have the name of the program and what it does, and who develops it.
</p> </p>
@ -36,10 +36,10 @@ should be cited like this: <sup><a href="#1">[1]</a></sup>.
This article was last edited on 7/30/2018 This article was last edited on 7/30/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 license to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 license to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Internet Explorer</h1> <h1>Internet Explorer</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/ie_logo.png" alt="Internet Explorer Logo"> <img src../images/ie_logo.png" alt="Internet Explorer Logo">
<p> <p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system. Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p> </p>
@ -23,18 +23,18 @@ Internet Explorer cannot be built from available source code. This means that it
<h3>Internet Explorer is self-updating software</h3> <h3>Internet Explorer is self-updating software</h3>
<p> <p>
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off. Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
</p> </p>
<h3>Internet Explorer sends your search history to Microsoft</h3> <h3>Internet Explorer sends your search history to Microsoft</h3>
<p> <p>
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft. Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
</p> </p>
<h3>Internet Explorer can track your location</h3> <h3>Internet Explorer can track your location</h3>
<p> <p>
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out. Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
</p> </p>
<h3>Internet Explorer has an anti-privacy search engine by default</h3> <h3>Internet Explorer has an anti-privacy search engine by default</h3>
<p>The default search engine is <a href="/articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p> <p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -44,14 +44,14 @@ Internet Explorer has the spyware feature commonly referred to as "location serv
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a> <a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
<a href="https://archive.is/EnsRH">[archive.is]</a><br> <a href="https://archive.is/EnsRH">[archive.is]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last updated on 2/18/2019 This article was last updated on 2/18/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,37 +1,37 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Falkon</h1> <h1>Falkon</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/falkon_logo.png" alt="falkon Logo"> <img src../images/falkon_logo.png" alt="falkon Logo">
<p> <p>
Falkon is a KDE web browser using QtWebEngine rendering engine, previously known as QupZilla. Falkon is a KDE web browser using QtWebEngine rendering engine, previously known as QupZilla.
</p> </p>
<h2>Spyware Level: <font color=lightgreen>Probably Not Spyware</font></h2> <h2>Spyware Level: <font color=lightgreen>Probably Not Spyware</font></h2>
<p> <p>
When another contributor tested this browser on linux, it made <font color=lime><b>no unsolicied connections.</b></font> When I ran it on windows, it connected to When another contributor tested this browser on linux, it made <font color=lime><b>no unsolicied connections.</b></font> When I ran it on windows, it connected to
a domain unrelated to the homepage (duckduckgo). But, i'm not sure what it was for, and it wasn't reproduced on linux. This browser is probably fine, but a domain unrelated to the homepage (duckduckgo). But, i'm not sure what it was for, and it wasn't reproduced on linux. This browser is probably fine, but
you should run your own tests and email me about what you found or didn't find. you should run your own tests and email me about what you found or didn't find.
</p> </p>
<h3>Phoning Home?</h3> <h3>Phoning Home?</h3>
<p> <p>
On the first run of Falkon, using the 32-bit windows version, it connected to these addresses, even though I was on it's homepage, which seems to be On the first run of Falkon, using the 32-bit windows version, it connected to these addresses, even though I was on it's homepage, which seems to be
locally stored because it does not create any requests when I go to it normally. I don't know what these are for. locally stored because it does not create any requests when I go to it normally. I don't know what these are for.
Maybe it's a form of phoning home? The first IP is for the domain: github.map.fastly.net which seems to be part of a CDN. Maybe it's a form of phoning home? The first IP is for the domain: github.map.fastly.net which seems to be part of a CDN.
</p> </p>
<img src="/images/falkon_firstrun.png" alt="Is falkon phoning home?"> <img src../images/falkon_firstrun.png" alt="Is falkon phoning home?">
<hr> <hr>
<p><b> <p><b>
This article was last edited on 8/24/2018 This article was last edited on 8/24/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,34 +1,34 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Mozilla Firefox</h1> <h1>Mozilla Firefox</h1>
<p> <p>
<a href="/articles">Back to catalog</a><br> <a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/firefox.html">Mitigation Guide</a> <a href="/guides/firefox.html">Mitigation Guide</a>
</p> </p>
<img src="/images/firefox_logo.png" alt="Firefox logo"> <img src../images/firefox_logo.png" alt="Firefox logo">
<p> <p>
Mozilla Firefox is one of the most popular and longest existing Mozilla Firefox is one of the most popular and longest existing
browsers. Its developers have earned it a reputation for being a "privacy and security-based browser, respecting the user" - but is it justified, or just marketing? In fact, over the years they have made several anti-privacy (and generally anti-user) decisions, but this article will focus exclusively on spying. Version tested: 52.5.0, with the default settings. Program used for testing requests: Mitmproxy. browsers. Its developers have earned it a reputation for being a "privacy and security-based browser, respecting the user" - but is it justified, or just marketing? In fact, over the years they have made several anti-privacy (and generally anti-user) decisions, but this article will focus exclusively on spying. Version tested: 52.5.0, with the default settings. Program used for testing requests: Mitmproxy.
</p> </p>
<p> <p>
<h2>Spyware Level: <font color=orange>High</font></h2> <h2>Spyware Level: <font color=orange>High</font></h2>
After following the <a href="/guides/firefox.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>. After following the <a href="/guides/firefox.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p> </p>
<p>It sends a lot of different data very often (some of which could <p>It sends a lot of different data very often (some of which could
uniquely identify you). All the "services" that it provides, such as uniquely identify you). All the "services" that it provides, such as
its default search engines and Pocket, are anti-privacy. The rating isn't higher its default search engines and Pocket, are anti-privacy. The rating isn't higher
because at least you can turn off or modify most of it, though because at least you can turn off or modify most of it, though
it often requires diving deep into about:config.</p> it often requires diving deep into about:config.</p>
<h3>Phoning home</h3> <h3>Phoning home</h3>
<p> <p>
Whenever you start Firefox, it makes this request: <br><img src = "/images/request.png"><br> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><font color=orange>Can be disabled ONLY in about:config</font></b>. But, since you've already started Firefox, it will make this request at least once. Whenever you start Firefox, it makes this request: <br><img src =../images/request.png"><br> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><font color=orange>Can be disabled ONLY in about:config</font></b>. But, since you've already started Firefox, it will make this request at least once.
</p> </p>
<h3>Automatic connections to some websites you've visited, including their trackers</h3> <h3>Automatic connections to some websites you've visited, including their trackers</h3>
@ -36,7 +36,7 @@
Websites you visit most often are added to the New Tab panel. When you then open a new tab, Firefox will sometimes make requests to the sites in there, including some of their trackers. I haven't determined how it works yet. Sometimes it doesn't make the requests at all; other times you end up with hundreds of images, scripts, trackers, etc. loaded simply because you opened a new tab (without visiting any website explicitly). Websites you visit most often are added to the New Tab panel. When you then open a new tab, Firefox will sometimes make requests to the sites in there, including some of their trackers. I haven't determined how it works yet. Sometimes it doesn't make the requests at all; other times you end up with hundreds of images, scripts, trackers, etc. loaded simply because you opened a new tab (without visiting any website explicitly).
<b><font color=red>Was NOT able to find a way to disable this</font></b>, even in about:config. <b><font color=red>Was NOT able to find a way to disable this</font></b>, even in about:config.
</p> </p>
<h3>Firefox tracks users with Google Analytics</h3> <h3>Firefox tracks users with Google Analytics</h3>
<p> <p>
Firefox has been integrated with the spyware platform called "Google Analytics"<sup><a href="#1">[1]</a></sup>. Firefox has been confirmed to now send analytics to Google. According to a Firefox developer the spyware in Firefox is "extremely useful to us and we have already weighed the cost/benefit of using tracking." and that Firefox will not remove Google Analytics support entirely. Firefox's position on privacy is made very clear with this quote: Firefox has been integrated with the spyware platform called "Google Analytics"<sup><a href="#1">[1]</a></sup>. Firefox has been confirmed to now send analytics to Google. According to a Firefox developer the spyware in Firefox is "extremely useful to us and we have already weighed the cost/benefit of using tracking." and that Firefox will not remove Google Analytics support entirely. Firefox's position on privacy is made very clear with this quote:
@ -49,92 +49,92 @@ tl;dr: We now have an option to opt-out of Google doing anything with the data t
We are collecting aggregate and non-identifiable data in numbers to ensure our development/UX changes are met well. We can respect privacy and still have analytics; in fact Mozilla's aim is for an experience that values user privacy and usability (I'd say Apple also wants UX that fits that mold, as an example). We need some data, anonymised and aggregated, to do this. We are collecting aggregate and non-identifiable data in numbers to ensure our development/UX changes are met well. We can respect privacy and still have analytics; in fact Mozilla's aim is for an experience that values user privacy and usability (I'd say Apple also wants UX that fits that mold, as an example). We need some data, anonymised and aggregated, to do this.
"</i></p> "</i></p>
<p> <p>
The best takeaway to this is that Mozilla wants to pretend that including spyware in their program is somehow not a breach of privacy, and that Firefox could possibly be respecting user privacy while simultaneously collecting data on users and sending it to Google. It's strongly suggested to read the github thread and the further anti-privacy statements the Mozzilla employee makes while defending the spyware features in Firefox. It's very dangerous to assert that there is somehow a middle ground between respecting user privacy and datamining the user. The best takeaway to this is that Mozilla wants to pretend that including spyware in their program is somehow not a breach of privacy, and that Firefox could possibly be respecting user privacy while simultaneously collecting data on users and sending it to Google. It's strongly suggested to read the github thread and the further anti-privacy statements the Mozzilla employee makes while defending the spyware features in Firefox. It's very dangerous to assert that there is somehow a middle ground between respecting user privacy and datamining the user.
</p> </p>
<h3>"Safe" Browsing?</h3> <h3>"Safe" Browsing?</h3>
<p> <p>
Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <br><img src="/images/safe_browsing.png"><b><font color=orange>Can be disabled ONLY in about:config.</font></b> Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <br><img src../images/safe_browsing.png"><b><font color=orange>Can be disabled ONLY in about:config.</font></b>
</p> </p>
<h3>Firefox Health Report</h3> <h3>Firefox Health Report</h3>
<p> <p>
From the horse's mouth: "For example, FHR sends data to Mozilla on things like: operating system, PC/Mac, number of processors, Firefox version, the number and type of add-ons. The data collected by FHR is tied to a Document ID that corresponds to a browser installation (explained above in question #4) so that the data can be correlated across a limited window of time."<sup><a href="#2">[2]</a></sup> Also, according to Mozilla, new versions of Firefox will also collect telemetry data by default. <b><font color=lime>Can be disabled through the GUI.</font></b> From the horse's mouth: "For example, FHR sends data to Mozilla on things like: operating system, PC/Mac, number of processors, Firefox version, the number and type of add-ons. The data collected by FHR is tied to a Document ID that corresponds to a browser installation (explained above in question #4) so that the data can be correlated across a limited window of time."<sup><a href="#2">[2]</a></sup> Also, according to Mozilla, new versions of Firefox will also collect telemetry data by default. <b><font color=lime>Can be disabled through the GUI.</font></b>
</p> </p>
<h3>Anti-privacy search engines by default</h3> <h3>Anti-privacy search engines by default</h3>
<p>Old versions of Firefox had Google as the default search engine, <p>Old versions of Firefox had Google as the default search engine,
which is obviously anti-privacy. For example, from their privacy which is obviously anti-privacy. For example, from their privacy
policy: "When you use our policy: "When you use our
services or view content provided by Google, we automatically collect services or view content provided by Google, we automatically collect
and store certain information in server logs. This includes: details and store certain information in server logs. This includes: details
of how you used our service, such as your search queries.". Then, it of how you used our service, such as your search queries.". Then, it
was Yahoo, which isn't better: "The Yahoo Search History tool allows was Yahoo, which isn't better: "The Yahoo Search History tool allows
you to see what you've searched for in the past. ". So it saves all you to see what you've searched for in the past. ". So it saves all
your searches. And deleting does nothing: "Even if you clear your your searches. And deleting does nothing: "Even if you clear your
past searches or turn the Search History tool off, Yahoo still past searches or turn the Search History tool off, Yahoo still
collects and stores search user log data when you use Yahoo Search collects and stores search user log data when you use Yahoo Search
technology." Firefox 57 is going back to Google again. If they really technology." Firefox 57 is going back to Google again. If they really
cared about your privacy, the default search engine would be cared about your privacy, the default search engine would be
StartPage (which gives the same results as Google, but anonymized) or StartPage (which gives the same results as Google, but anonymized) or
DuckDuckGo. <b><font color=lime>Can be changed through the GUI.</font></b> DuckDuckGo. <b><font color=lime>Can be changed through the GUI.</font></b>
</p> </p>
<h3>Pocket - a privacy nightmare</h3> <h3>Pocket - a privacy nightmare</h3>
<p> <p>
Firefox has a Pocket button in its navigation bar, which allows you Firefox has a Pocket button in its navigation bar, which allows you
to "save any article, video or page from Firefox" and "View in Pocket to "save any article, video or page from Firefox" and "View in Pocket
on any device, any time." Let's see how it looks in terms of privacy on any device, any time." Let's see how it looks in terms of privacy
- quoting from Pocket's privacy policy<sup><a href="#3">[3]</a></sup>: - quoting from Pocket's privacy policy<sup><a href="#3">[3]</a></sup>:
"In addition to the information that you provide to us when you "In addition to the information that you provide to us when you
register for a user account, we collect information about the URLs, register for a user account, we collect information about the URLs,
titles and content of the web pages and other information you save to titles and content of the web pages and other information you save to
Pocket." So everything you conveniently put in "your" Pocket is Pocket." So everything you conveniently put in "your" Pocket is
being stored (of course, otherwise Pocket wouldn't work). "The types being stored (of course, otherwise Pocket wouldn't work). "The types
of information we collect includes your browser type, device type, of information we collect includes your browser type, device type,
device id, time zone, language, and other information related to the device id, time zone, language, and other information related to the
manner in which you access the Pocket Technologies. " So anytime you manner in which you access the Pocket Technologies. " So anytime you
view a file in "your" Pocket, they know everything about the device view a file in "your" Pocket, they know everything about the device
you used to do it. "We may also use "pixel tags," "web beacons," you used to do it. "We may also use "pixel tags," "web beacons,"
"clear GIFs" or similar means (individually or collectively "Pixel "clear GIFs" or similar means (individually or collectively "Pixel
Tags") in connection with emails that we send to our users in order Tags") in connection with emails that we send to our users in order
to collect usage data." So, they are acting like any old tracking to collect usage data." So, they are acting like any old tracking
website, even in ways that have nothing to do with their website, even in ways that have nothing to do with their
functionality. "We may also share your device ID with third parties functionality. "We may also share your device ID with third parties
in connection with advertising campaigns. " And they work with in connection with advertising campaigns. " And they work with
advertisers too! Describing all of Pocket's advertisers too! Describing all of Pocket's
violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default. violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default.
</p> </p>
<font color=yellow> <b>Can be disabled in about:config</b></font><sup><a href="#8">[8]</a></sup> <font color=yellow> <b>Can be disabled in about:config</b></font><sup><a href="#8">[8]</a></sup>
<h3>Automatic updates</h3> <h3>Automatic updates</h3>
<p> <p>
Not that bad compared to all of the above, I guess - but still Not that bad compared to all of the above, I guess - but still
installs something without your consent, with possible new privacy installs something without your consent, with possible new privacy
nightmares in there. There is no excuse to at least not make "Check for updates, but nightmares in there. There is no excuse to at least not make "Check for updates, but
let me choose whether to install them" the default - it would still let me choose whether to install them" the default - it would still
give the security benefit, but not take control away from the user. give the security benefit, but not take control away from the user.
<b><font color=lime>Can be disabled through the GUI.</font></b> <b><font color=lime>Can be disabled through the GUI.</font></b>
</p> </p>
<h3>Other issues</h3> <h3>Other issues</h3>
<p> <p>
Firefox also sometimes makes a request to "self-repair.mozilla.org" which looks like this: Firefox also sometimes makes a request to "self-repair.mozilla.org" which looks like this:
<br><img src="/images/self_repair.png"> <br><img src../images/self_repair.png">
It includes "optimizelyEndUserID" which probably means it It includes "optimizelyEndUserID" which probably means it
<b>uniquely identifies you. </b><b><font color=orange>Can be disabled ONLY in about:config.</font></b><sup><a href="#7">[7]</a></sup><br> <b>uniquely identifies you. </b><b><font color=orange>Can be disabled ONLY in about:config.</font></b><sup><a href="#7">[7]</a></sup><br>
It also makes this request every time you open the default home page: It also makes this request every time you open the default home page:
<img src = "/images/request2.png"><br> <img src =../images/request2.png"><br>
The number after the Firefox version is, again, <b>uniquely The number after the Firefox version is, again, <b>uniquely
identifying</b><sup><a href="#4">[4]</a></sup><b><font color=orange> Can be disabled ONLY in about:config.</font></b> identifying</b><sup><a href="#4">[4]</a></sup><b><font color=orange> Can be disabled ONLY in about:config.</font></b>
<br> <br>
Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed). <img src = "/images/blocklist.png"> The request includes a <b>uniquely identifying</b> browser installation ID. <b><font color=orange>Can be disabled ONLY in about:config.</font></b> Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed). <img src =../images/blocklist.png"> The request includes a <b>uniquely identifying</b> browser installation ID. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
</p> </p>
<h3>Firefox phones home about almost every single interaction you have with its UI</h3> <h3>Firefox phones home about almost every single interaction you have with its UI</h3>
<p> <p>
Firefox will send information about almost every basic operation that you do back to Mozilla. This is tagged with a unique client ID and an ID for your current session, and any relevant information related to this action. Firefox will send information about almost every basic operation that you do back to Mozilla. This is tagged with a unique client ID and an ID for your current session, and any relevant information related to this action.
<b><font color=red>By default, the following uses of the UI are reported to Mozilla<sup><a href="#5">[5]</a></sup>:</font></b> <b><font color=red>By default, the following uses of the UI are reported to Mozilla<sup><a href="#5">[5]</a></sup>:</font></b>
<ul> <ul>
<li>Performing a search</li> <li>Performing a search</li>
@ -157,7 +157,7 @@ The best takeaway to this is that Mozilla wants to pretend that including spywar
<li>Domain affinity calculation</li> <li>Domain affinity calculation</li>
</ul> </ul>
<p> <p>
Essentially, while this feature doesn't broadcast your search history to Mozilla, it proives an incedibly detailed walktrhough of exactly how you use Firefox's user interface. This can be disabled and is an opt-out spyware feature. You can disable it through the GUI as described here: Essentially, while this feature doesn't broadcast your search history to Mozilla, it proives an incedibly detailed walktrhough of exactly how you use Firefox's user interface. This can be disabled and is an opt-out spyware feature. You can disable it through the GUI as described here:
<a href="https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">Share data with Mozilla to help improve Firefox</a> <a href="https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">Share data with Mozilla to help improve Firefox</a>
<a href="http://web.archive.org/web/20181002204159/https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">[web.archive.org]</a> <a href="http://web.archive.org/web/20181002204159/https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">[web.archive.org]</a>
<a href="http://archive.fo/gkVeb">[archive.fo]</a> <a href="http://archive.fo/gkVeb">[archive.fo]</a>
@ -165,10 +165,10 @@ The best takeaway to this is that Mozilla wants to pretend that including spywar
<h3>Mitigating Firefox Spyware</h3> <h3>Mitigating Firefox Spyware</h3>
<p> <p>
This reveiew is also accompanied by a page about how to configure Firefox to be more privacy respecting, and links to other projects that have been created to solve this This reveiew is also accompanied by a page about how to configure Firefox to be more privacy respecting, and links to other projects that have been created to solve this
problem. You can read about that <a href="/guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that problem. You can read about that <a href="/guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that
they should be set too: they should be set too:
</p> </p>
<table border background="/images/bg.jpg" style="width:800px"> <table border background../images/bg.jpg" style="width:800px">
<tr> <tr>
<th>Spyware Feature</th> <th>Spyware Feature</th>
<th>about:config flag</th> <th>about:config flag</th>
@ -223,36 +223,36 @@ they should be set too:
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://blog.mozilla.org/metrics/fhr-faq">FAQ for FHR</a> <a href="https://blog.mozilla.org/metrics/fhr-faq">FAQ for FHR</a>
<a href="https://web.archive.org/web/20180513014211/https://blog.mozilla.org/metrics/fhr-faq/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180513014211/https://blog.mozilla.org/metrics/fhr-faq/">[web.archive.org]</a>
<a href="https://archive.li/No9Xo">[archive.li]</a><br> <a href="https://archive.li/No9Xo">[archive.li]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="https://getpocket.com/privacy?t=privacypolicy">Pocket Privacy Policy</a> <a href="https://getpocket.com/privacy?t=privacypolicy">Pocket Privacy Policy</a>
<a href="http://web.archive.org/web/20180410043925/https://getpocket.com/privacy?t=privacypolicy">[web.archive.org]</a> <a href="http://web.archive.org/web/20180410043925/https://getpocket.com/privacy?t=privacypolicy">[web.archive.org]</a>
<a href="https://archive.is/dCa2m">[archive.is]</a><br> <a href="https://archive.is/dCa2m">[archive.is]</a><br>
<a name="4">4.</a> <a name="4">4.</a>
<a href="https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">Snippets Service Data Collection</a> <a href="https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">Snippets Service Data Collection</a>
<a href="https://web.archive.org/web/20180410043926/https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20180410043926/https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">[web.archive.org]</a>
<a href="https://archive.li/JDXjv">[archive.li]</a><br> <a href="https://archive.li/JDXjv">[archive.li]</a><br>
<a name="5">5.</a> <a name="5">5.</a>
<a href="https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">Metrics we collect</a> <a href="https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">Metrics we collect</a>
<a href="https://web.archive.org/web/20180530091900/https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">[web.archive.org]</a> <a href="https://web.archive.org/web/20180530091900/https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">[web.archive.org]</a>
<a href="https://archive.li/aK9Bx">[archive.li]</a><br> <a href="https://archive.li/aK9Bx">[archive.li]</a><br>
<a name="6">6.</a> <a name="6">6.</a>
<a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a> <a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a>
<a href="https://archive.li/57xdG">[archive.is]</a><br> <a href="https://archive.li/57xdG">[archive.is]</a><br>
<a name="7">7.</a> <a name="7">7.</a>
<a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a> <a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a>
<a href="https://archive.li/a17cN">[archive.is]</a><br> <a href="https://archive.li/a17cN">[archive.is]</a><br>
<a name="8">8.</a> <a name="8">8.</a>
<a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a> <a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a>
<a href="https://archive.li/mWBcp">[archive.is]</a><br> <a href="https://archive.li/mWBcp">[archive.is]</a><br>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 1/13/2019 This article was last edited on 1/13/2019
@ -261,8 +261,8 @@ they should be set too:
This article was created on 11/23/2017 This article was created on 11/23/2017
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,24 +1,24 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Foobar 2000</h1> <h1>Foobar 2000</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/foobar_logo.png" alt="foobar Logo"> <img src../images/foobar_logo.png" alt="foobar Logo">
<p> <p>
Foobar2000 is an advanced freeware audio player for the Windows platform. Foobar2000 is an advanced freeware audio player for the Windows platform.
</p> </p>
<h2>Spyware Level: <font color=yellow>Not Rated</font></h2> <h2>Spyware Level: <font color=yellow>Not Rated</font></h2>
<p> <p>
Foobar2000 does not make it's source code availible, which could be hiding spyware features. Foobar2000 does not make it's source code availible, which could be hiding spyware features.
</p> </p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,27 +1,27 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>File Transfer Protocol</h1> <h1>File Transfer Protocol</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<p> <p>
FTP is a protocol used for transferring files over a computer network. FTP is a protocol used for transferring files over a computer network.
</p> </p>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
<p> <p>
FTP does not collect any information than the absolute minimum needed to provide its service. As such you could say that FTP's information is only incidental to the service it provides. So, FTP is not a spyware protocol. You are only giving up your IP address, which of course is required can be hidden through proxies. FTP requires you to uniquely identify yourself as a user of a system to use its access control features, but beyond that it does not ask you for unncessary information about your computer, unlike the <a href="/articles/http.html">HTTP</a> protocol. FTP does not collect any information than the absolute minimum needed to provide its service. As such you could say that FTP's information is only incidental to the service it provides. So, FTP is not a spyware protocol. You are only giving up your IP address, which of course is required can be hidden through proxies. FTP requires you to uniquely identify yourself as a user of a system to use its access control features, but beyond that it does not ask you for unncessary information about your computer, unlike the <a href="../articles/http.html">HTTP</a> protocol.
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 5/26/2018 This article was last edited on 5/26/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Google</h1> <h1>Google</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/google_logo.png" alt="Google logo"> <img src="../images/google_logo.png" alt="Google logo">
<p> <p>
Google is an advertising company that produces and researches a huge amount of spyware products and services that permeate Google is an advertising company that produces and researches a huge amount of spyware products and services that permeate
the internet almost entirely. It is almost impossible for the naieve user to use the internet without running into Google the internet almost entirely. It is almost impossible for the naieve user to use the internet without running into Google
@ -16,16 +16,16 @@ spyware, as they have deployed products on almost every level of the user's inte
</p> </p>
<h2>Technology</h2> <h2>Technology</h2>
<p> <p>
The following articles on this website have been written about technology created by Google: The following articles on this website have been written about technology created by Google:
</p> </p>
<p> <p>
<a href="/articles/chrome.html">Google Chrome</a><br> <a href="../articles/chrome.html">Google Chrome</a><br>
<a href="/articles/google_search.html">Google Search</a><br> <a href="../articles/google_search.html">Google Search</a><br>
<a href="/articles/youtube.html">YouTube</a><br> <a href="../articles/youtube.html">YouTube</a><br>
</p> </p>
<h2>Privacy Statements and Policies</h2> <h2>Privacy Statements and Policies</h2>
<p> <p>
The following documents are an incomplete list of policies Google uses for it's various products and The following documents are an incomplete list of policies Google uses for it's various products and
services when concerning user privacy. services when concerning user privacy.
</p> </p>
<p> <p>
@ -44,8 +44,8 @@ services when concerning user privacy.
This article was last edited on 11/9/2018 This article was last edited on 11/9/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,36 +1,36 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Google Search</h1> <h1>Google Search</h1>
<p> <p>
<a href="/articles">Back to catalog</a><br> <a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/google_search_es.html">Spanish Translation</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br> <a href="../articles/google_search_es.html">Spanish Translation</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br>
<a href="/articles/google_search_tr.html">Turkish Translation</a><br> <a href="../articles/google_search_tr.html">Turkish Translation</a><br>
</p> </p>
<img src="/images/google_logo.png" alt="Google logo"> <img src../images/google_logo.png" alt="Google logo">
<p> <p>
Google Search is a search engine created and owned by <a href="/articles/google.html">Google</a>. Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p> <p>
Google Search collects your personal information and is heavily integrated with other services that collect your personal information. Google Search collects your personal information and is heavily integrated with other services that collect your personal information.
Google's privacy policy<sup><a href="#1">[1]</a></sup> is written in a way that does not tell you which Google services are Google's privacy policy<sup><a href="#1">[1]</a></sup> is written in a way that does not tell you which Google services are
collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is
to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed. to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed.
</p> </p>
<p> <p>
It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It
does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects
your information, so it is really not trying to be very detailed because it would not say anything new. your information, so it is really not trying to be very detailed because it would not say anything new.
</p> </p>
<h3>Google Search records your searches</h3> <h3>Google Search records your searches</h3>
<p> <p>
Searches made using Google Search are associated with your identity and recorded in Google's servers. From the Searches made using Google Search are associated with your identity and recorded in Google's servers. From the
privacy policy<sup><a href="#1">[1]</a></sup>, Google makes it clear that: privacy policy<sup><a href="#1">[1]</a></sup>, Google makes it clear that:
</p> </p>
<p><i> <p><i>
@ -43,10 +43,10 @@ your information, so it is really not trying to be very detailed because it woul
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><font color=red>browsing history</font></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored. "This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><font color=red>browsing history</font></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
</i></p> </i></p>
<p> <p>
Google also confirms again that it stores your searches in its servers, in this quote: Google also confirms again that it stores your searches in its servers, in this quote:
</p> </p>
<p> <p>
<i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs. <i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs.
This includes: details of how you used our service, such as your search queries."</i> This includes: details of how you used our service, such as your search queries."</i>
</p> </p>
<h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3> <h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3>
@ -66,10 +66,10 @@ your information, so it is really not trying to be very detailed because it woul
</i></p> </i></p>
<h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3> <h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3>
<p> <p>
Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform
exists to collect personal information, and connects its users to other spyware services in the Google ecosystem. exists to collect personal information, and connects its users to other spyware services in the Google ecosystem.
It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services
to one user, increasing the accuracy of their internal profile of you. to one user, increasing the accuracy of their internal profile of you.
</p> </p>
<hr> <hr>
<h2>Further Reading</h2> <h2>Further Reading</h2>
@ -94,8 +94,8 @@ your information, so it is really not trying to be very detailed because it woul
This article was last edited on 12/12/2018 This article was last edited on 12/12/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,19 +1,19 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Buscador de Google</h1> <h1>Buscador de Google</h1>
<p> <p>
<a href="/articles">Back to catalog (English)</a><br> <a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/google_search.html">English Version</a><br> <a href="../articles/google_search.html">English Version</a><br>
<a href="/articles/google_search.html">Turkish Version</a><br> <a href="../articles/google_search.html">Turkish Version</a><br>
</p> </p>
<img src="/images/google_logo.png"> <img src../images/google_logo.png">
<p>El buscador de Google es un motor de busqueda creado y mantenido por Google</p> <p>El buscador de Google es un motor de busqueda creado y mantenido por Google</p>
<h2>Nivel de spyware<font color="red"> EXTREMADAMENTE ALTO</font></h2> <h2>Nivel de spyware<font color="red"> EXTREMADAMENTE ALTO</font></h2>
<p> El buscador de Google recolecta tu información personal y está altamente integrado con otros servicios que también recolectan tu información personal. En la política de privacidad de Google<sup><a href="#1">[1]</a></sup> está escrita de mandera que no dice que tipos de información recolectam por lo que miente. Así que lo mejor que puedes hacer, es afirmar que cada vez que usas un servicio de Google es saber que está haciendo lo posible para obtener toda tu información.</p> <p> El buscador de Google recolecta tu información personal y está altamente integrado con otros servicios que también recolectan tu información personal. En la política de privacidad de Google<sup><a href="#1">[1]</a></sup> está escrita de mandera que no dice que tipos de información recolectam por lo que miente. Así que lo mejor que puedes hacer, es afirmar que cada vez que usas un servicio de Google es saber que está haciendo lo posible para obtener toda tu información.</p>
@ -57,8 +57,8 @@
Please keep this in mind when reading! It may become outdated in the future. Please keep this in mind when reading! It may become outdated in the future.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,19 +1,19 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Google Arama</h1> <h1>Google Arama</h1>
<p> <p>
<a href="/articles">Kataloga dön</a><br/> <a href="../articles/index.html">Kataloga dön</a><br/>
<a href="/articles/google_search_es.html">İspanyolca Çeviri</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br> <a href="../articles/google_search_es.html">İspanyolca Çeviri</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br>
<a href="/articles/google_search.html">English Version</a><br> <a href="../articles/google_search.html">English Version</a><br>
</p> </p>
<img src="/images/google_logo.png" alt="Google logo"> <img src../images/google_logo.png" alt="Google logo">
<p><a href="/articles/google.html">Google</a> Arama tarafından oluşturulan ve yönetilen bir arama motorudur. <p><a href="../articles/google.html">Google</a> Arama tarafından oluşturulan ve yönetilen bir arama motorudur.
</p> </p>
<h2 class="western">Casus Yazılım Seviyesi: <font color="red">AŞIRI FAZLA</font></h2> <h2 class="western">Casus Yazılım Seviyesi: <font color="red">AŞIRI FAZLA</font></h2>
<p>Google Arama kişisel bilgilerinizi toplar ve sizin kişisel <p>Google Arama kişisel bilgilerinizi toplar ve sizin kişisel
@ -37,13 +37,13 @@ yoktur.</p>
<p>Google Arama kullanılarak yapılan aramalar kimliğinizle <p>Google Arama kullanılarak yapılan aramalar kimliğinizle
ilişkilendirilip Googleın sunucularına kaydedilmektedir.. ilişkilendirilip Googleın sunucularına kaydedilmektedir..
Gizlilik politikasından görüldüğü gibi<sup><a href="#1">[1]</a></sup>, Gizlilik politikasından görüldüğü gibi<sup><a href="#1">[1]</a></sup>,
Google bu durumu netleştirmiştir: Google bu durumu netleştirmiştir:
</p> </p>
<p><i>&quot;Kullandığınız hizmetler ve bu hizmetlerin nasıl <p><i>&quot;Kullandığınız hizmetler ve bu hizmetlerin nasıl
kullandığınıza dair bilgi toplamaktayız&quot; </i> kullandığınıza dair bilgi toplamaktayız&quot; </i>
</p> </p>
<p>“Bilgi toplama” da şu şekilde açıklığa kavuşturulmuştur<sup> <p>“Bilgi toplama” da şu şekilde açıklığa kavuşturulmuştur<sup>
<a href="#2">[2]</a></sup>: <a href="#2">[2]</a></sup>:
</p> </p>
<p><i>&quot;Bilgiler kullandığınız veri ve tercihleriniz, Gmail <p><i>&quot;Bilgiler kullandığınız veri ve tercihleriniz, Gmail
mesajlarınız, G+ profiliniz, fotoğraflarınız, videolarınız, mesajlarınız, G+ profiliniz, fotoğraflarınız, videolarınız,
@ -54,21 +54,21 @@ bilgiyi gönderilip alındığı gibi ve saklandığı zamanı da
içerecek şekilde analiz etmektedir. </i> içerecek şekilde analiz etmektedir. </i>
</p> </p>
<p>Google şu cümlesinde de sunucularında aramalarınızı <p>Google şu cümlesinde de sunucularında aramalarınızı
sakladığını onaylamaktadır : sakladığını onaylamaktadır :
</p> </p>
<p><i>&quot;</i><i>Hizmetlerimizi kullandığınız veya Google <p><i>&quot;</i><i>Hizmetlerimizi kullandığınız veya Google
tarafından sağlanan içeriği görüntülediğiniz zaman</i><i>, tarafından sağlanan içeriği görüntülediğiniz zaman</i><i>,
</i><i>otomatik olarak kesin bilgiyi toplayıp sunucu kayıtlarımızda </i><i>otomatik olarak kesin bilgiyi toplayıp sunucu kayıtlarımızda
saklıyoruz</i><i>. </i><i>Bu neyi içerir</i><i>: </i><i>arama saklıyoruz</i><i>. </i><i>Bu neyi içerir</i><i>: </i><i>arama
kayıtlarınız gibi</i><i> </i><i>bizim hizmetlerinizi ne kadar kayıtlarınız gibi</i><i> </i><i>bizim hizmetlerinizi ne kadar
kullandığınıza ilişkin detaylar</i><i>.&quot;</i> kullandığınıza ilişkin detaylar</i><i>.&quot;</i>
</p> </p>
<h3 class="western">Google, reklamcılara satılmak üzere <h3 class="western">Google, reklamcılara satılmak üzere
aramalarınızı ilgilerinize dair bir profil çizmek için aramalarınızı ilgilerinize dair bir profil çizmek için
kullanıyor</h3> kullanıyor</h3>
<p>Googleın gizlilik politikası ile ilgili bu sayfasında <sup><a href="#2">[2]</a></sup>, <p>Googleın gizlilik politikası ile ilgili bu sayfasında <sup><a href="#2">[2]</a></sup>,
Google kullanıcıların ilgisine göre onların profilini Google kullanıcıların ilgisine göre onların profilini
oluşturduğunu kabul etmektedir: oluşturduğunu kabul etmektedir:
</p> </p>
<p><i>&quot;Örnek olarak, web geçmişi çerezlerinizdeki… <p><i>&quot;Örnek olarak, web geçmişi çerezlerinizdeki…
bilgilerinizi size daha alakalı sonuçlar sunmak amacıyla bilgilerinizi size daha alakalı sonuçlar sunmak amacıyla
@ -78,7 +78,7 @@ kullanabiliriz.&quot; </i>
ilişkilendirilmediği sürece <span style="font-weight: normal">arama ilişkilendirilmediği sürece <span style="font-weight: normal">arama
geçmişinizin kişisel bilgi olduğunu </span><b>düşünmez.</b> Bu geçmişinizin kişisel bilgi olduğunu </span><b>düşünmez.</b> Bu
bilgiyi reklamcılarla olabildiği ölçüde “tanımlanmamış” bilgiyi reklamcılarla olabildiği ölçüde “tanımlanmamış”
olarak paylaşır: olarak paylaşır:
</p> </p>
<p><i>&quot;Tanımlanmamış kimlikli bilgiyi açık şekilde veya <p><i>&quot;Tanımlanmamış kimlikli bilgiyi açık şekilde veya
yayıncı, reklmcı veya bağlı siteler gibi ortaklarımızla yayıncı, reklmcı veya bağlı siteler gibi ortaklarımızla
@ -95,7 +95,7 @@ ekosistemindeki diğer casus yazılım hizmetlerine bağlar. Bu
sistem telefon numaralarını toplama girişiminde bulunur ve sistem telefon numaralarını toplama girişiminde bulunur ve
Googlea bu bilgiyi bütün hizmetlerinde tek bir kullancı üstünde Googlea bu bilgiyi bütün hizmetlerinde tek bir kullancı üstünde
bilgi toplayabilmesi için verir, böylelikle onların size dair bilgi toplayabilmesi için verir, böylelikle onların size dair
oluşturduğu iç profilin kesinliği artar. oluşturduğu iç profilin kesinliği artar.
</p> </p>
<hr/> <hr/>
<h2 class="western">Daha Fazla Okuma</h2> <h2 class="western">Daha Fazla Okuma</h2>
@ -103,7 +103,7 @@ oluşturduğu iç profilin kesinliği artar.
Googleın Kullanıcı Verisi Üstündeki İzlemesi NSAinkinden Googleın Kullanıcı Verisi Üstündeki İzlemesi NSAinkinden
Daha Beter?</a> <br/> Daha Beter?</a> <br/>
<a href="https://stallman.org/google.html">Googleı <a href="https://stallman.org/google.html">Googleı
kullanmamak için nedenler</a> kullanmamak için nedenler</a>
</p> </p>
<hr/> <hr/>
<h2 class="western">Kaynaklar</h2> <h2 class="western">Kaynaklar</h2>
@ -119,10 +119,10 @@ bilgi toplama</a> <a href="https://archive.li/Hthpb">[archive.li]</a></p>
<p>Eğer bu makaleyi düzenlemek veya kendi makalenizle katkıda <p>Eğer bu makaleyi düzenlemek veya kendi makalenizle katkıda
bulunmak istiyorsanız, <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a> bulunmak istiyorsanız, <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>
adresime e-posta atabilirsiniz. Bütün katkılar kabul için CC0 adresime e-posta atabilirsiniz. Bütün katkılar kabul için CC0
lisansı altında lisanslanmak zorundadır. lisansı altında lisanslanmak zorundadır.
</p> </p>
<p><b>This article was translated from english on 4/8/2019. Check the dates of the english article with this one in case any changes have been made. <p><b>This article was translated from english on 4/8/2019. Check the dates of the english article with this one in case any changes have been made.
This translation might become outdated in the future.</b></p> This translation might become outdated in the future.</b></p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,22 +1,22 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>GZDoom</h1> <h1>GZDoom</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/gzdoom_logo.png" alt="GZDoom Logo"> <img src../images/gzdoom_logo.png" alt="GZDoom Logo">
<p> <p>
GZDoom is a source port of Doom based on an older source port, ZDoom. GZDoom is a source port of Doom based on an older source port, ZDoom.
</p> </p>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2> <h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
<p> <p>
GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatiblity.<sup><a href="#1">[1]</a></sup>. GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatiblity.<sup><a href="#1">[1]</a></sup>.
GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you
should make sure to compile it with the telemtery disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future. should make sure to compile it with the telemtery disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
@ -31,8 +31,8 @@ should make sure to compile it with the telemtery disabled, and you should make
This article was last edited on 5/30/2018 This article was last edited on 5/30/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Hexchat</h1> <h1>Hexchat</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/hexchat_logo.png" alt="Hexchat Logo"> <img src../images/hexchat_logo.png" alt="Hexchat Logo">
<p> <p>
HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems. HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.
</p> </p>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
<p> <p>
@ -18,8 +18,8 @@ Hexchat is not spyware in and of itself, however you can use it to connect to se
</p> </p>
<hr> <hr>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,31 +1,31 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>HyperText Transmission Protocol</h1> <h1>HyperText Transmission Protocol</h1>
<img src="/images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"> <img src../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard">
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<p> <p>
HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet. HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.
</p> </p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>
<p> <p>
HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that
the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the
protocol, but allow the protocol compromise user privacy. protocol, but allow the protocol compromise user privacy.
</p> </p>
<h3>"User-Agent" Datamining feature</h3> <h3>"User-Agent" Datamining feature</h3>
<p> <p>
Section 14.43<sup><a href="#1">[1]</a></sup> of the HTTP specification details the "User-Agent" Section 14.43<sup><a href="#1">[1]</a></sup> of the HTTP specification details the "User-Agent"
spyware feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. spyware feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you.
The biggest danger of the User-Agent spyware is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, The biggest danger of the User-Agent spyware is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent,
because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies
to mitigate this spyware, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used- to mitigate this spyware, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used-
and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly
stated in the protocol specifications to aid in datamining. stated in the protocol specifications to aid in datamining.
</p> </p>
<p><i> <p><i>
@ -33,20 +33,20 @@ protocol, but allow the protocol compromise user privacy.
</i></p> </i></p>
<h3>Acknowledgement of HTTP's privacy problem</h3> <h3>Acknowledgement of HTTP's privacy problem</h3>
<p> <p>
In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting.
Section 15.1<sup><a href="#2">[2]</a></sup> of the HTTP specification has a very detailed analysis of Section 15.1<sup><a href="#2">[2]</a></sup> of the HTTP specification has a very detailed analysis of
the implications of the comprimization of privacy that the User-Agent spyware allows to happen and suggests how to use the User-Agent feature: as an opt-in the implications of the comprimization of privacy that the User-Agent spyware allows to happen and suggests how to use the User-Agent feature: as an opt-in
feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naieve feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naieve
viewpoint from the W3C- the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the viewpoint from the W3C- the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the
privacy of their users and would not use these features of the protocol to datamine users. privacy of their users and would not use these features of the protocol to datamine users.
</p> </p>
<p> <p>
At best, you could call this mindset naieve. Or, you could call it negligent. If you want to hold the W3C in contempt, you could call it malicious. At best, you could call this mindset naieve. Or, you could call it negligent. If you want to hold the W3C in contempt, you could call it malicious.
It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission.
But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's
fault is that? fault is that?
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -60,7 +60,7 @@ protocol, but allow the protocol compromise user privacy.
<a href="http://arquivo.pt/wayback/20160108175646/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[arquivo.pt]</a> <a href="http://arquivo.pt/wayback/20160108175646/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[arquivo.pt]</a>
<a href="http://veebiarhiiv.digar.ee/a/20150704125123/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[veebiarhiiv.digar.ee]</a> <a href="http://veebiarhiiv.digar.ee/a/20150704125123/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[veebiarhiiv.digar.ee]</a>
<a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br> <a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a> <a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a>
<a href="http://webarchive.loc.gov/all/20140118222005/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[webarchive.loc.gov]</a> <a href="http://webarchive.loc.gov/all/20140118222005/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[webarchive.loc.gov]</a>
@ -68,17 +68,17 @@ protocol, but allow the protocol compromise user privacy.
<a href="http://archive.is/20131016034135/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[archive.is]</a> <a href="http://archive.is/20131016034135/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[archive.is]</a>
<a href="https://webarchive.nrscotland.gov.uk/20170612090136/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[webarchive.nrscotland.gov.uk]</a> <a href="https://webarchive.nrscotland.gov.uk/20170612090136/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[webarchive.nrscotland.gov.uk]</a>
<a href="http://arquivo.pt/wayback/20110609222436/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[arquivo.pt]</a><br> <a href="http://arquivo.pt/wayback/20110609222436/http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[arquivo.pt]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 5/14/2018 This article was last edited on 5/14/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,22 +1,22 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>GNU IceCat</h1> <h1>GNU IceCat</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/icecat_es.html">Spanish Translation</a></p> <a href="../articles/icecat_es.html">Spanish Translation</a></p>
<img src="/images/icecat_logo.png" alt="icecat Logo"> <img src../images/icecat_logo.png" alt="icecat Logo">
<p> <p>
GNU IceCat is a web browser that is a fork of <a href="/articles/firefox.html">Firefox</a>. GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p> </p>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
<p> <p>
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="/articles/icecat59.html">IceCat 59 Review</a> GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a>
</p> </p>
<h3>IceCat's privacy features</h3> <h3>IceCat's privacy features</h3>
<p> <p>
@ -37,8 +37,8 @@ GNU IceCat is a fork of Firefox that is more private and secure than Firefox and
This article was last edited on 9/18/2018 This article was last edited on 9/18/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>GNU IceCat (v59)</h1> <h1>GNU IceCat (v59)</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/icecat_logo.png" alt="icecat Logo"> <img src../images/icecat_logo.png" alt="icecat Logo">
<p> <p>
GNU IceCat is a web browser that is a fork of <a href="/articles/firefox.html">Firefox</a>. GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p> </p>
<h2>Spyware Level: <font color=greenyellow>Low</font></h2> <h2>Spyware Level: <font color=greenyellow>Low</font></h2>
<p> <p>
@ -19,10 +19,10 @@ GNU IceCat is a fork of Firefox that is more private and secure than Firefox and
<h3><font color=red>This article is about an older version of Icecat (v59), and not the current verison. (anything v60 and higher)</font></h3> <h3><font color=red>This article is about an older version of Icecat (v59), and not the current verison. (anything v60 and higher)</font></h3>
<h3>Phoning Home</h3> <h3>Phoning Home</h3>
<p> <p>
Even though IceCat has better privacy features out of the box than Firefox, it still phones home by default to GNU, Mozilla, and Google. Even though IceCat has better privacy features out of the box than Firefox, it still phones home by default to GNU, Mozilla, and Google.
So, while it claims to respect your privacy, it doesn't take steps to stop spyware features like this. So, while it claims to respect your privacy, it doesn't take steps to stop spyware features like this.
</p> </p>
<img src="/images/icecat_phones_home.png" alt="Icecat phoning home"> <img src../images/icecat_phones_home.png" alt="Icecat phoning home">
<h3>IceCat's privacy features</h3> <h3>IceCat's privacy features</h3>
<p> <p>
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>: From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:
@ -39,16 +39,16 @@ GNU IceCat is a fork of Firefox that is more private and secure than Firefox and
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://digdeeper.neocities.org/">Dig Deeper</a> <a href="https://digdeeper.neocities.org/">Dig Deeper</a>
<a href="https://digdeeper.neocities.org/images/icecat.png">[original image link]</a><br> <a href="https://digdeeper.neocities.o../images/icecat.png">[original image link]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 6/21/2018 This article was last edited on 6/21/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,19 +1,19 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>GNU IceCat</h1> <h1>GNU IceCat</h1>
<p><a href="/articles">Back to catalog (English)</a><br> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/icecat.html">English Translation</a></p> <a href="../articles/icecat.html">English Translation</a></p>
<img src="/images/icecat_logo.png" alt="icecat Logo"> <img src../images/icecat_logo.png" alt="icecat Logo">
<p> <p>
GNU IceCat es un navegador web, derivado de <a href="/articles/firefox.html">Firefox</a>. GNU IceCat es un navegador web, derivado de <a href="../articles/firefox.html">Firefox</a>.
</p> </p>
<h2>Nivel de Spyware: <font color=lime>No es spyware</font></h2> <h2>Nivel de Spyware: <font color=lime>No es spyware</font></h2>
@ -36,8 +36,8 @@ GNU IceCat es un navegador web, derivado de <a href="/articles/firefox.html">Fir
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,95 +1,93 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Online Spyware Classification Project Article Catalog</h1> <h1>Online Spyware Classification Project Article Catalog</h1>
<p> <p>
<a href="/">Back to Home</a><br> <a href="../index.html>Back to Home</a><br>
<a href="/articles/index_es.html">Spanish Catalog</a><br> <a href="../articles/index_es.html">Spanish Catalog</a><br>
<a href="/articles/index2.html">Unfinished Articles</a><br> <a href="../articles/index2.html">Unfinished Articles</a><br>
</p>
<p>
All of the articles on this website are available here! If you want to edit any of these articles, or contribute your own articles, email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>
</p> </p>
<p>All of the articles on this website are available here! If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>./p>
<hr> <hr>
<h2>Web Browsers</h2> <h2>Web Browsers</h2>
<a href="/articles/browsers.html">Comparison between web browsers</a><br><br> <a href="../articles/browsers.html">Comparison between web browsers</a><br><br>
<a href="/articles/iron.html">SRWare Iron</a><br> <a href="../articles/iron.html">SRWare Iron</a><br>
<a href="/articles/slimjet.html">Slimjet</a><br> <a href="../articles/slimjet.html">Slimjet</a><br>
<a href="/articles/chrome.html">Google Chrome</a> <a href="../articles/chrome.html">Google Chrome</a>
<a href="/articles/chrome_es.html">[Spanish]</a><br> <a href="../articles/chrome_es.html">[Spanish]</a><br>
<a href="/articles/opera.html">Opera</a><br> <a href="../articles/opera.html">Opera</a><br>
<a href="/articles/webdiscover.html">WebDiscover</a><br> <a href="../articles/webdiscover.html">WebDiscover</a><br>
<a href="/articles/firefox.html">Mozilla Firefox</a> <a href="../articles/firefox.html">Mozilla Firefox</a>
<a href="/guides/firefox.html">[Mitigation Guide]</a><br> <a href="../guides/firefox.html">[Mitigation Guide]</a><br>
<a href="/articles/vivaldi.html">Vivaldi</a><br> <a href="../articles/vivaldi.html">Vivaldi</a><br>
<a href="/articles/explorer.html">Internet Explorer</a><br> <a href="../articles/explorer.html">Internet Explorer</a><br>
<a href="/articles/dissenter.html">Dissenter</a><br> <a href="../articles/dissenter.html">Dissenter</a><br>
<a href="/articles/waterfox.html">Waterfox</a><br> <a href="../articles/waterfox.html">Waterfox</a><br>
<a href="/articles/brave.html">Brave</a><br> <a href="../articles/brave.html">Brave</a><br>
<a href="/articles/palemoon.html">Pale Moon</a> <a href="../articles/palemoon.html">Pale Moon</a>
<a href="/guides/palemoon.html">[Mitigation Guide]</a><br> <a href="../guides/palemoon.html">[Mitigation Guide]</a><br>
<a href="/articles/sphere.html">Sphere Browser</a><br> <a href="../articles/sphere.html">Sphere Browser</a><br>
<a href="/articles/iridium.html">Iridium Browser</a> <a href="../articles/iridium.html">Iridium Browser</a>
<a href="/guides/iridium.html">[Mitigation Guide]</a><br> <a href="../guides/iridium.html">[Mitigation Guide]</a><br>
<a href="/articles/icecat.html">GNU IceCat</a> <a href="../articles/icecat.html">GNU IceCat</a>
<a href="/articles/icecat_es.html">[Spanish]</a><br> <a href="../articles/icecat_es.html">[Spanish]</a><br>
<a href="/articles/falkon.html">Falkon</a><br> <a href="../articles/falkon.html">Falkon</a><br>
<a href="/articles/otter.html">Otter Browser</a><br> <a href="../articles/otter.html">Otter Browser</a><br>
<a href="/articles/qutebrowser.html">Qutebrowser</a><br> <a href="../articles/qutebrowser.html">Qutebrowser</a><br>
<a href="/articles/ungoogled_chromium.html">Ungoogled Chromium</a><br> <a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a><br>
<a href="/articles/tor.html">Tor Browser</a><br> <a href="../articles/tor.html">Tor Browser</a><br>
<h2>Online Content Platforms</h2> <h2>Online Content Platforms</h2>
<a href="/articles/snapchat.html">Snapchat</a><br> <a href="../articles/snapchat.html">Snapchat</a><br>
<a href="/articles/instagram.html">Instagram</a><br> <a href="../articles/instagram.html">Instagram</a><br>
<a href="/articles/youtube.html">YouTube</a><br> <a href="../articles/youtube.html">YouTube</a><br>
<h2>Messaging Clients/Services</h2> <h2>Messaging Clients/Services</h2>
<a href="/articles/discord.html">Discord</a> <a href="../articles/discord.html">Discord</a>
<a href="/articles/discord_es.html">[Spanish]</a><br> <a href="../articles/discord_es.html">[Spanish]</a><br>
<a href="/articles/thunderbird.html">Mozilla Thunderbird</a><br> <a href="../articles/thunderbird.html">Mozilla Thunderbird</a><br>
<a href="/articles/telegram.html">Telegram</a><br> <a href="../articles/telegram.html">Telegram</a><br>
<a href="/articles/hexchat.html">Hexchat</a><br> <a href="../articles/hexchat.html">Hexchat</a><br>
<h2>Search Engines</h2> <h2>Search Engines</h2>
<a href="/articles/google_search.html">Google Search</a> <a href="../articles/google_search.html">Google Search</a>
<a href="/articles/google_search_es.html">[Spanish]</a> <a href="../articles/google_search_es.html">[Spanish]</a>
<a href="/articles/google_search_tr.html">[Turkish]</a><br> <a href="../articles/google_search_tr.html">[Turkish]</a><br>
<a href="/articles/bing.html">Bing</a><br> <a href="../articles/bing.html">Bing</a><br>
<a href="/articles/yahoo.html">Yahoo</a><br> <a href="../articles/yahoo.html">Yahoo</a><br>
<a href="/articles/duckduckgo.html">DuckDuckGo</a> <a href="../articles/duckduckgo.html">DuckDuckGo</a>
<a href="/articles/duckduckgo_es.html">[Spanish]</a><br> <a href="../articles/duckduckgo_es.html">[Spanish]</a><br>
<h2>Video Games</h2> <h2>Video Games</h2>
<a href="/articles/steam.html">Steam</a><br> <a href="../articles/steam.html">Steam</a><br>
<a href="/articles/redshell.html">Red Shell</a><br> <a href="../articles/redshell.html">Red Shell</a><br>
<a href="/articles/unity.html">Unity</a><br> <a href="../articles/unity.html">Unity</a><br>
<a href="/articles/razer_en.html">Razer</a> <a href="../articles/razer_en.html">Razer</a>
<a href="/articles/razer.html">[Spanish]</a><br> <a href="../articles/razer.html">[Spanish]</a><br>
<a href="/articles/ksp.html">Kerbal Space Program</a><br> <a href="../articles/ksp.html">Kerbal Space Program</a><br>
<a href="/articles/gzdoom.html">GZDoom</a><br> <a href="../articles/gzdoom.html">GZDoom</a><br>
<h2>Media Players</h2> <h2>Media Players</h2>
<a href="/articles/realplayer.html">RealPlayer</a><br> <a href="../articles/realplayer.html">RealPlayer</a><br>
<a href="/articles/itunes.html">iTunes</a><br> <a href="../articles/itunes.html">iTunes</a><br>
<a href="/articles/vlc.html">VLC Media Player</a><br> <a href="../articles/vlc.html">VLC Media Player</a><br>
<h2>Other</h2> <h2>Other</h2>
<a href="/articles/ccleaner.html">CCleaner</a><br> <a href="../articles/ccleaner.html">CCleaner</a><br>
<a href="/articles/poweriso.html">PowerISO</a><br> <a href="../articles/poweriso.html">PowerISO</a><br>
<a href="/articles/cdex.html">CDex</a><br> <a href="../articles/cdex.html">CDex</a><br>
<a href="/articles/paint.net.html">Paint.NET</a><br> <a href="../articles/paint.net.html">Paint.NET</a><br>
<a href="/articles/http.html">HyperText Transmission Protocol</a><br> <a href="../articles/http.html">HyperText Transmission Protocol</a><br>
<a href="/articles/ftp.html">File Transfer Protocol</a><br> <a href="../articles/ftp.html">File Transfer Protocol</a><br>
</body> </body>
</html> </html>

View File

@ -1,36 +1,36 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Online Spyware Classification Project Unfinished Article Catalog</h1> <h1>Online Spyware Classification Project Unfinished Article Catalog</h1>
<p> <p>
<a href="/">Back to Home</a><br> <a href="../index.html">Back to Home</a><br>
<a href="/articles/">Main Catalog</a><br> <a href="../articles/index.html/">Main Catalog</a><br>
</p> </p>
<p> <p>
This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. These articles need the most help, so feel free to contribute! This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. These articles need the most help, so feel free to contribute!
</p> </p>
<p>The <a href="/requested_articles.txt">requested articles</a> file also has a list of articles that have been requested, and the state of those <p>The <a href="../requested_articles.txt">requested articles</a> file also has a list of articles that have been requested, and the state of those
requests.</p> requests.</p>
<hr> <hr>
<p> <p>
<a href="/articles/utorrent.html">uTorrent</a><br> <a href="../articles/utorrent.html">uTorrent</a><br>
<a href="/articles/nvidia.html">Nvidia Drivers</a><br>
<a href="/articles/1password.html">1password</a><br> <a href="../articles/nvidia.html">Nvidia Drivers</a><br>
<a href="/articles/foobar2000.html">Foobar 2000</a><br>
<a href="/articles/browsers.html">Comparison between web browsers</a><br>
<a href="/articles/example.html">Example Article</a><br> <a href="../articles/1password.html">1password</a><br>
<a href="/guides/classify.html">Classification Guide</a><br> <a href="../articles/foobar2000.html">Foobar 2000</a><br>
<a href="../articles/browsers.html">Comparison between web browsers</a><br>
<a href="../articles/example.html">Example Article</a><br>
<a href="../guides/classify.html">Classification Guide</a><br>
</p> </p>
</body> </body>
</html> </html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -9,26 +9,26 @@
<h1>Online Spyware Classification Project Spanish Article Catalog</h1> <h1>Online Spyware Classification Project Spanish Article Catalog</h1>
<p> <p>
<a href="/">Back to Home</a><br> <a href="/">Back to Home</a><br>
<a href="/articles/index.html">English Catalog</a><br> <a href="../articles/index.html">English Catalog</a><br>
<a href="/articles/index2.html">Unfinished Articles</a><br> <a href="../articles/index2.html">Unfinished Articles</a><br>
</p> </p>
<p> <p>
This is a catalog of all of the Spanish articles on this site. Some of these articles are translations of other English articles on the site and some This is a catalog of all of the Spanish articles on this site. Some of these articles are translations of other English articles on the site and some
are only in Spanish. Thanks to one very helpful contributor, these articles have been translated. If you know English and Spanish, and want to make are only in Spanish. Thanks to one very helpful contributor, these articles have been translated. If you know English and Spanish, and want to make
this catalog larger, consider translating an article, or writing your own articles, in Spanish. It would be very much appreciated. this catalog larger, consider translating an article, or writing your own articles, in Spanish. It would be very much appreciated.
</p> </p>
<p> <p>
If you want to edit any of these articles, or contribute your own articles, email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a> If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p> </p>
<hr> <hr>
<h2>All Articles</h2> <h2>All Articles</h2>
<a href="/articles/razer.html">Razer</a><br> <a href="../articles/razer.html">Razer</a><br>
<a href="/articles/chrome_es.html">Google Chrome</a><br> <a href="../articles/chrome_es.html">Google Chrome</a><br>
<a href="/articles/icecat_es.html">GNU IceCat</a><br> <a href="../articles/icecat_es.html">GNU IceCat</a><br>
<a href="/articles/discord_es.html">Discord</a><br> <a href="../articles/discord_es.html">Discord</a><br>
<a href="/articles/google_search_es.html">Google Search</a><br> <a href="../articles/google_search_es.html">Google Search</a><br>
<a href="/articles/duckduckgo_es.html">DuckDuckGo</a><br> <a href="../articles/duckduckgo_es.html">DuckDuckGo</a><br>
</body> </body>
</html> </html>

View File

@ -2,15 +2,15 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Instagram</h1> <h1>Instagram</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/ig_logo.png" alt="Instagram logo"> <img src../images/ig_logo.png" alt="Instagram logo">
<p> <p>
Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles. Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.
</p> </p>
@ -47,7 +47,7 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3> <h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you don't provide a either one. This is obviously a method Instagram to uniquely identify you.</p> <p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you don't provide a either one. This is obviously a method Instagram to uniquely identify you.</p>
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see whats new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p> <p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see whats new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
<img src="/images/ig_sshot.png" alt="screenshot"> <img src../images/ig_sshot.png" alt="screenshot">
<h3>It Broadcasts What You Do In The App To Other Users</h3> <h3>It Broadcasts What You Do In The App To Other Users</h3>
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p> <p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
@ -65,22 +65,22 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
<a href="https://archive.is/pHY8J">[archive.is]</a> <a href="https://archive.is/pHY8J">[archive.is]</a>
<a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a> <a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a>
<br> <br>
<a name="2">2</a> <a name="2">2</a>
<a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagrams TOS</a> <a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagrams TOS</a>
<a href="https://archive.fo/9nxU8">[archive.is]</a> <a href="https://archive.fo/9nxU8">[archive.is]</a>
<br> <br>
<a name="3">3</a> <a name="3">3</a>
<a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a> <a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a>
<a href="https://archive.fo/bvtic">[archive.is]</a> <a href="https://archive.fo/bvtic">[archive.is]</a>
<br> <br>
<a name="4">4</a> <a name="4">4</a>
<a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a> <a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a>
<a href="https://archive.is/Utdc2">[archive.is]</a> <a href="https://archive.is/Utdc2">[archive.is]</a>
@ -94,11 +94,11 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
This article was last edited on 2/24/2019 This article was last edited on 2/24/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Iridium Browser</h1> <h1>Iridium Browser</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/iridium.html">Mitigation Guide</a></p> <a href="/guides/iridium.html">Mitigation Guide</a></p>
<img src="/images/iridium_logo.jpg" alt="Iridium Logo"> <img src../images/iridium_logo.jpg" alt="Iridium Logo">
<p> <p>
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage. Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.
</p> </p>
<p> <p>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2> <h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
After following the <a href="/guides/iridium.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>. After following the <a href="/guides/iridium.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p> </p>
<p> <p>
The only unsolicited request is for the Google SafeBrowsing feature, and can be easily turned off from the Preferences menu. Additionally, privacy enhancements unrelated to Google are added, such as blocking third party cookies by default, and deleting local storage on close. Full list of the differences between Chrome and Iridium can be found <a href="https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">here</a><sup><a href="#1">[1]</a></sup>. However this list is <b><font color=red>not accurate</font></b> and each claim it makes should be verified by the user. The only unsolicited request is for the Google SafeBrowsing feature, and can be easily turned off from the Preferences menu. Additionally, privacy enhancements unrelated to Google are added, such as blocking third party cookies by default, and deleting local storage on close. Full list of the differences between Chrome and Iridium can be found <a href="https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">here</a><sup><a href="#1">[1]</a></sup>. However this list is <b><font color=red>not accurate</font></b> and each claim it makes should be verified by the user.
@ -24,50 +24,50 @@
<p> <p>
Iridium browser will make these requests to Google to update a blocklist of websites for its SafeBrowsing feature: Iridium browser will make these requests to Google to update a blocklist of websites for its SafeBrowsing feature:
</p> </p>
<img src="/images/iridium_request.png" alt="Iridium safebrowsing requests"> <img src../images/iridium_request.png" alt="Iridium safebrowsing requests">
<p> <p>
Iridium browser will also download this blocklist from a mirror maintained by the developers. Since the web browser is Iridium browser will also download this blocklist from a mirror maintained by the developers. Since the web browser is
awalys "phoning home" to either google or the developers servers, this is a form of spyware that can be used to monitor awalys "phoning home" to either google or the developers servers, this is a form of spyware that can be used to monitor
usage of the program, as well as collection of the User-Agent's of the program's users. (See the <a href="/articles/http.html">HTTP article</a>) usage of the program, as well as collection of the User-Agent's of the program's users. (See the <a href="../articles/http.html">HTTP article</a>)
This request is made 5 miniutes after the program is started, and then updated every 30 miniutes. This request is made 5 miniutes after the program is started, and then updated every 30 miniutes.
</p> </p>
<h3>Inaccurate Privacy Claims</h3> <h3>Inaccurate Privacy Claims</h3>
<p> <p>
The Iridium developers make the claim that as one of the privacy enhancements of Iridium, it uses the Google SafeBrowsing spyware feature, but with their own mirror of Google's database, meaning that you can The Iridium developers make the claim that as one of the privacy enhancements of Iridium, it uses the Google SafeBrowsing spyware feature, but with their own mirror of Google's database, meaning that you can
use the feature without constantly phoning home to google, but instead phoning home to the developers, which, while still being a form of spyware, is an increase in privacy use the feature without constantly phoning home to google, but instead phoning home to the developers, which, while still being a form of spyware, is an increase in privacy
for the user<sup><a href="#1">[1]</a></sup>. At least it would be if this section was actually true. You can see that from the "Phoning Home" section of this article, this claim is simply for the user<sup><a href="#1">[1]</a></sup>. At least it would be if this section was actually true. You can see that from the "Phoning Home" section of this article, this claim is simply
<b><font color=red>not true</font></b>, which is very bad because it undermines the crediblity of the other privacy claims that Iridium makes. <b><font color=red>not true</font></b>, which is very bad because it undermines the crediblity of the other privacy claims that Iridium makes.
</p> </p>
<p> <p>
According to another writer, in his tests the browser would only connect to iridiumbrowser.de. So it is possible that this privacy claim is true for some versions of Iridium, According to another writer, in his tests the browser would only connect to iridiumbrowser.de. So it is possible that this privacy claim is true for some versions of Iridium,
and false for other versions of Iridium. The version of Iridium that phones home to Google is Version 2018.4 for 64-bit Windows, tested on Windows 7, if you want to see this and false for other versions of Iridium. The version of Iridium that phones home to Google is Version 2018.4 for 64-bit Windows, tested on Windows 7, if you want to see this
for yourself. for yourself.
</p> </p>
<p> <p>
Not only is this privacy claim inaccurate, but a pull request<sup><a href="#2">[2]</a></sup> has been open on the developers github for OVER A YEAR with no response from the development team. Not only is this privacy claim inaccurate, but a pull request<sup><a href="#2">[2]</a></sup> has been open on the developers github for OVER A YEAR with no response from the development team.
It's pretty dissapointing to see such a privacy concerned front to this project, but then a negligent additude with longstanding privacy issues once you pull back the curtain It's pretty dissapointing to see such a privacy concerned front to this project, but then a negligent additude with longstanding privacy issues once you pull back the curtain
and look a little deeper at the claims this browser makes. and look a little deeper at the claims this browser makes.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">Differences between Iridium and Chromium</a> <a href="https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">Differences between Iridium and Chromium</a>
<a href="http://web.archive.org/web/20180216153314/https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">[web.archive.org]</a> <a href="http://web.archive.org/web/20180216153314/https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">[web.archive.org]</a>
<a href="https://archive.is/H8MsS">[archive.is]</a> <a href="https://archive.is/H8MsS">[archive.is]</a>
<a href="https://via.hypothes.is/https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">[via.hypothes.is]</a><br> <a href="https://via.hypothes.is/https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">[via.hypothes.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://github.com/iridium-browser/tracker/issues/131">Still access to google safebrowsing servers</a> <a href="https://github.com/iridium-browser/tracker/issues/131">Still access to google safebrowsing servers</a>
<a href="http://web.archive.org/web/20180517043109/https://github.com/iridium-browser/tracker/issues/131">[web.archive.org]</a> <a href="http://web.archive.org/web/20180517043109/https://github.com/iridium-browser/tracker/issues/131">[web.archive.org]</a>
<a href="https://archive.li/eayJ1">[archive.is]</a> <a href="https://archive.li/eayJ1">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 5/16/2018 This article was last edited on 5/16/2018
@ -75,10 +75,10 @@
<p><b> <p><b>
This article was created on 5/5/2018 This article was created on 5/5/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,27 +1,27 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>SRWare Iron</h1> <h1>SRWare Iron</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/srware_logo.png" alt="SRWare Iron Logo"> <img src../images/srware_logo.png" alt="SRWare Iron Logo">
<p> <p>
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany. SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="/articles/chrome.html">Google Chrome</a>'s SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
the Chrome experience without Google's spyware. However when examining this program, these claims the Chrome experience without Google's spyware. However when examining this program, these claims
instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens
connections to an enormous amount of servers on it's first run. It racks up a rough estimate of connections to an enormous amount of servers on it's first run. It racks up a rough estimate of
<b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new <b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new
requests and connections. SRWare Iron uses the spyware search engine <a href="/articles/bing.html">Bing</a> as it's default search requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search
engine, however it goes beyond that and routes your requests to Bing through it's own servers engine, however it goes beyond that and routes your requests to Bing through it's own servers
so that it can spy on your internet searches as well. The bottom line is that this browser is just so that it can spy on your internet searches as well. The bottom line is that this browser is just
another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b> another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b>
@ -39,8 +39,8 @@ SRWare Iron claims on it's website that it is:
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed, The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
claimed on SRWare's website and beleive it without doing any tests for themselves. Like claimed on SRWare's website and beleive it without doing any tests for themselves. Like
<a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a> <a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a>
<a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a> <a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a>
that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome. that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome.
@ -54,31 +54,31 @@ Which is just an amazing gem in the context of what is actually found when runni
</p> </p>
<h3>Massive amount of connections on first startup</h3> <h3>Massive amount of connections on first startup</h3>
<p> <p>
When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and
<code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain <code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain
which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests
but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it
as well as I could). This <a href="/images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!) as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!)
should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the
amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads. amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads.
There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own
analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you
begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you
everywhere you go! everywhere you go!
</p> </p>
<p> <p>
When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount
of servers, even though only two domains were ever contacted.<a href="/images/iron_connections.png">This screenshot</a> doesn't caputre of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre
all of the IP addresses that it connected, but should give you an idea. all of the IP addresses that it connected, but should give you an idea.
</p> </p>
<p> <p>
And just so that there is no ambiguity, this notice is shown when you load this homepage: And just so that there is no ambiguity, this notice is shown when you load this homepage:
</p> </p>
<p><i> <p><i>
"We use cookies to personalise content and ads, to provide social media features "We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it with our social media, advertising and analytics partners who may combine it
with other information youve provided to them or theyve collected from your with other information youve provided to them or theyve collected from your
use of their services." use of their services."
</i></p> </i></p>
<p> <p>
@ -87,16 +87,16 @@ Just so that there is no doubt- you are being served tracking cookies by adverti
<h3>Redirecting of internet searches through developer's domain</h3> <h3>Redirecting of internet searches through developer's domain</h3>
<p> <p>
After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="/articles/bing.html">Bing</a>. making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens: However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
</p> </p>
<img src="/images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers"> <img src../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
<p> <p>
Basically, every time you make a search with this browser, your searches are sent through the developer's servers. Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
<code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one <code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one
spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar
tactic to the one that the spyware browser <a href="/articles/slimjet.html">Slimjet</a> uses, where it routes searches to tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to
Bing through it's own domains. Bing through it's own domains.
</p> </p>
<h3>Motivations of the SRWare Iron developer?</h3> <h3>Motivations of the SRWare Iron developer?</h3>
@ -142,9 +142,9 @@ Bing through it's own domains.
<jamessan> yet you use google's adsense <jamessan> yet you use google's adsense
</xmp> </xmp>
<p> <p>
So, this could explain a lot... the motivation for this web browser to exist was to monetize So, this could explain a lot... the motivation for this web browser to exist was to monetize
privacy concerns by generating traffic to his website, where he could make money by serving spyware privacy concerns by generating traffic to his website, where he could make money by serving spyware
to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of
spyware from all sorts of other companies... which he probably makes some amount of money from as well. spyware from all sorts of other companies... which he probably makes some amount of money from as well.
(why else would he take the time to integrate these things into his browser? we can only speculate.) (why else would he take the time to integrate these things into his browser? we can only speculate.)
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it. At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
@ -169,10 +169,10 @@ Bing through it's own domains.
This article was last edited on 11/20/2018 This article was last edited on 11/20/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>iTunes</h1> <h1>iTunes</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/itunes_logo.png" alt="itunes logo"> <img src../images/itunes_logo.png" alt="itunes logo">
<p> <p>
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc. iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
</p> </p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p> <p>
@ -18,7 +18,7 @@ iTunes is a spyware music player developed by Apple that collects an enormous am
</p> </p>
<h3>Itunes is integrated into the Apple ID spyware platform</h3> <h3>Itunes is integrated into the Apple ID spyware platform</h3>
<p> <p>
Itunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. Itunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app.
This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>: This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>:
</p> </p>
<ul> <ul>
@ -32,21 +32,21 @@ This spyware platform collects the following information from you<sup><a href="#
<p> <p>
Whenever you open Itunes, these two requests are immediately made: Whenever you open Itunes, these two requests are immediately made:
</p> </p>
<img src="/images/itunes_spyware1.png" alt="Itunes unsolictied network requests"> <img src../images/itunes_spyware1.png" alt="Itunes unsolictied network requests">
<p> <p>
<a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that Itunes will connect too. <a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that Itunes will connect too.
So, whenever you start up Itunes, you are immediately checked into the botnet. It's not clarified exactly what Itunes is So, whenever you start up Itunes, you are immediately checked into the botnet. It's not clarified exactly what Itunes is
connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>: connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>:
</p> </p>
<p><i> <p><i>
"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising." "We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."
</i></p> </i></p>
<p> <p>
So, we can only assume that Itunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple. So, we can only assume that Itunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.
</p> </p>
<h3>Apple sells your personal information</h3> <h3>Apple sells your personal information</h3>
<p> <p>
Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>: Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>:
</P> </P>
<p><i> <p><i>
"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys." "Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."
@ -54,7 +54,7 @@ Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a>
<p> <p>
So, there can be no illusion or mistake about what happens to the information you provide to Itunes- it will be sold to datamining companies. So, there can be no illusion or mistake about what happens to the information you provide to Itunes- it will be sold to datamining companies.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -67,23 +67,23 @@ So, there can be no illusion or mistake about what happens to the information yo
<a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a> <a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a>
<a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a> <a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a>
<a href="https://archive.is/KdMGe">[archive.is]</a><br> <a href="https://archive.is/KdMGe">[archive.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a> <a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a>
<a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a> <a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a>
<a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a> <a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a>
<a href="https://archive.is/KNtlQ">[archive.is]</a><br> <a href="https://archive.is/KNtlQ">[archive.is]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 5/12/2018 This article was last edited on 5/12/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,31 +1,31 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Kerbal Space Program</h1> <h1>Kerbal Space Program</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/ksp_logo.png" alt="Kerbal Space Program Logo"> <img src../images/ksp_logo.png" alt="Kerbal Space Program Logo">
<p> <p>
Kerbal Space Program is a space flight simulation video game developed and published by Squad, and currently owned by Take-Two Interactive. Kerbal Space Program is a space flight simulation video game developed and published by Squad, and currently owned by Take-Two Interactive.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
Kerbal Space program is a spyware program that mines large amounts of personal information of its users<sup><a href="#1">[1]</a></sup><sup><a href="#2">[2]</a></sup>, Kerbal Space program is a spyware program that mines large amounts of personal information of its users<sup><a href="#1">[1]</a></sup><sup><a href="#2">[2]</a></sup>,
to use for its own advertising, and to sell to other advertisers. On its face, it is a video game, but it is loaded with a huge amount of spyware that makes it completely unusable from a privacy standpoint. to use for its own advertising, and to sell to other advertisers. On its face, it is a video game, but it is loaded with a huge amount of spyware that makes it completely unusable from a privacy standpoint.
If you MUST use this program, run it in a VM with no internet connection. KSP collects so much information, that it has managed to catapult itself into the highest ranks of If you MUST use this program, run it in a VM with no internet connection. KSP collects so much information, that it has managed to catapult itself into the highest ranks of
this webiste and can only be described as a uniquely malicious datamining platform. KSP at one point was integrated with the <a href="/articles/redshell.html">Redshell</a> spyware platform.<sup><a href="#1">[3]</a></sup><sup> this webiste and can only be described as a uniquely malicious datamining platform. KSP at one point was integrated with the <a href="../articles/redshell.html">Redshell</a> spyware platform.<sup><a href="#1">[3]</a></sup><sup>
</p> </p>
<h3>Kerbal Space Program collects vast amounts of personal information</h3> <h3>Kerbal Space Program collects vast amounts of personal information</h3>
<p> <p>
KSP collects or attempts to collect or reserves the right to collect the following information about its users<sup><a href="#1">[1]</a></sup>: KSP collects or attempts to collect or reserves the right to collect the following information about its users<sup><a href="#1">[1]</a></sup>:
</p> </p>
<ul> <ul>
<li>First and/or last name</li> <li>First and/or last name</li>
<li>E-mail address</li> <li>E-mail address</li>
@ -47,28 +47,28 @@
<li>Other Information from integrated services</li> <li>Other Information from integrated services</li>
<li>Other Information from social media</li> <li>Other Information from social media</li>
</ul> </ul>
<p> <p>
Anyone who is framiliar with privacy violating software can notice that compared to most spyware out there, this is a MASSIVE amount of personal information that is being collected. Anyone who is framiliar with privacy violating software can notice that compared to most spyware out there, this is a MASSIVE amount of personal information that is being collected.
It's further clarified that not only does this program collect all of your information, but it uses this information to build a unique profile of you by correlating that information It's further clarified that not only does this program collect all of your information, but it uses this information to build a unique profile of you by correlating that information
together. together.
</p> </p>
<h3>Kerbal Space Program is integrated with other spyware platforms</h3> <h3>Kerbal Space Program is integrated with other spyware platforms</h3>
<p> <p>
KSP is integrated with social networking websites such as Facebook<sup><a href="#1">[1]</a></sup>, which allows it to collect a lot of personal information about you from any sort of social media profile that you KSP is integrated with social networking websites such as Facebook<sup><a href="#1">[1]</a></sup>, which allows it to collect a lot of personal information about you from any sort of social media profile that you
have on that website. If you're wondering how it could collect your date of birth, gender and photo if the program doesn't explicitly ask you, this is probably how it does it. have on that website. If you're wondering how it could collect your date of birth, gender and photo if the program doesn't explicitly ask you, this is probably how it does it.
When you give KSP access to your facebook account by logging in through spyware platforms such as Facebook, it collects as much information from your profile as it possibly can. This includes: When you give KSP access to your facebook account by logging in through spyware platforms such as Facebook, it collects as much information from your profile as it possibly can. This includes:
</p> </p>
<ul> <ul>
<li>Your profile picture</li> <li>Your profile picture</li>
<li>Your friends list</li> <li>Your friends list</li>
<li>Your name</li> <li>Your name</li>
</ul> </ul>
<p> <p>
As well as all other information that KSP claims it collects in the previous section. As you can see, this feature is a way for KSP to collect huge amounts of your personal information, As well as all other information that KSP claims it collects in the previous section. As you can see, this feature is a way for KSP to collect huge amounts of your personal information,
which it does not show and restraint in collecting. which it does not show and restraint in collecting.
@ -85,13 +85,13 @@
<p><i> <p><i>
"If you use, purchase, or register for an Online Service through a third-party service such as a gaming console's network service, an internet based gaming service, or a social network website, or request that we associate a Company account with a third-party service account, then limited user account personal information may be transferred to the Company as part of the registration process and we may be able to collect information about your use of the Online Services." "If you use, purchase, or register for an Online Service through a third-party service such as a gaming console's network service, an internet based gaming service, or a social network website, or request that we associate a Company account with a third-party service account, then limited user account personal information may be transferred to the Company as part of the registration process and we may be able to collect information about your use of the Online Services."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<h3>Kerbal Space Program allows advertisers to collect personal information seperately</h3> <h3>Kerbal Space Program allows advertisers to collect personal information seperately</h3>
<p> <p>
In addition to tracking its users, KSP allows advertisers to track its users as well<sup><a href="#1">[1]</a></sup>. These advertisers are: In addition to tracking its users, KSP allows advertisers to track its users as well<sup><a href="#1">[1]</a></sup>. These advertisers are:
</p> </p>
<ul> <ul>
<li>DoubleClick</li> <li>DoubleClick</li>
<li>Facebook</li> <li>Facebook</li>
@ -101,46 +101,46 @@
<li>Omniture</li> <li>Omniture</li>
<li>Yahoo</li> <li>Yahoo</li>
</ul> </ul>
<p> <p>
Which of course, all have their own seperate privacy polcies about how they handle your information. So, not only is KSP tracking you, but a huge amount of advertisers are Which of course, all have their own seperate privacy polcies about how they handle your information. So, not only is KSP tracking you, but a huge amount of advertisers are
also tracking you when you use their services. also tracking you when you use their services.
</p> </p>
<h3>Kerbal Space Program sells your information to advertisers</h3> <h3>Kerbal Space Program sells your information to advertisers</h3>
<p> <p>
KSP's privacy policy uses more vauge language here, but its clear that your information is being sold to advertisers. See the following quotes: KSP's privacy policy uses more vauge language here, but its clear that your information is being sold to advertisers. See the following quotes:
</p> </p>
<p><i> <p><i>
"In the event we offer services or promotions where your personal information is separately collected and used according to the privacy policy of a third party, we will inform you of that at the time of collection and you may elect not to participate in the service or promotion." "In the event we offer services or promotions where your personal information is separately collected and used according to the privacy policy of a third party, we will inform you of that at the time of collection and you may elect not to participate in the service or promotion."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p><i> <p><i>
"In addition, we may share aggregate and other information regarding Online Service usage statistics and user demographics with third parties." "In addition, we may share aggregate and other information regarding Online Service usage statistics and user demographics with third parties."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
Is "other information" personal information? There isn't any transparency here, so we cant know, but its clear that KSP uses its massive datamining platform to collaborate with other datamining platforms. Is "other information" personal information? There isn't any transparency here, so we cant know, but its clear that KSP uses its massive datamining platform to collaborate with other datamining platforms.
</p> </p>
<h3>Kerbal Space Program uses your personal information for its own advertising</h3> <h3>Kerbal Space Program uses your personal information for its own advertising</h3>
<p> <p>
It's clearly stated in the privacy policy<sup><a href="#1">[1]</a></sup> that this information is used to target users for promotions, and to analyse for marketing purposes: It's clearly stated in the privacy policy<sup><a href="#1">[1]</a></sup> that this information is used to target users for promotions, and to analyse for marketing purposes:
</p> </p>
<p><i> <p><i>
"The Company uses this information to send you promotional materials...We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs." "The Company uses this information to send you promotional materials...We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p><i> <p><i>
"The Company uses this information to send you promotional materials...We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs." "The Company uses this information to send you promotional materials...We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs."
</i></p> </i></p>
<h3>Kerbal Space Program does not make its source code availible</h3> <h3>Kerbal Space Program does not make its source code availible</h3>
<p> <p>
Its impossible to discern the level and scope of privacy violations done by this software beyond what they tell us in the privacy policy. The source code could potentially be hiding Its impossible to discern the level and scope of privacy violations done by this software beyond what they tell us in the privacy policy. The source code could potentially be hiding
more spyware, but nobody can audit it, and nobody can go into the source code and disable all of the spyware. If KSP had nothing to hide, you would be able to build the game from its more spyware, but nobody can audit it, and nobody can go into the source code and disable all of the spyware. If KSP had nothing to hide, you would be able to build the game from its
@ -149,9 +149,9 @@
<h3>Further Reading</h3> <h3>Further Reading</h3>
<a href="https://www.youtube.com/watch?v=WCLbUD_aubQ">Kerbal Space Program's New EULA Makes it Spyware </a><br> <a href="https://www.youtube.com/watch?v=WCLbUD_aubQ">Kerbal Space Program's New EULA Makes it Spyware </a><br>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -159,26 +159,26 @@
<a href="https://www.take2games.com/privacy/">TAKE-TWO INTERACTIVE SOFTWARE, Inc. PRIVACY POLICY</a> <a href="https://www.take2games.com/privacy/">TAKE-TWO INTERACTIVE SOFTWARE, Inc. PRIVACY POLICY</a>
<a href="http://web.archive.org/web/20180523084938/https://www.take2games.com/privacy/">[web.archive.org]</a> <a href="http://web.archive.org/web/20180523084938/https://www.take2games.com/privacy/">[web.archive.org]</a>
<a href="http://archive.is/WvWBD">[archive.is]</a><br> <a href="http://archive.is/WvWBD">[archive.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments#comment-3314988">Does KSP v1.4 really have spyware in it?</a> <a href="https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments#comment-3314988">Does KSP v1.4 really have spyware in it?</a>
<a href="http://web.archive.org/web/20180530204319/https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments">[web.archive.org]</a><br> <a href="http://web.archive.org/web/20180530204319/https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments">[web.archive.org]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware - "Holy Potatoes! Were in Space?!" integrated and removed it after complaints</a> <a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware - "Holy Potatoes! Were in Space?!" integrated and removed it after complaints</a>
<a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a> <a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a>
<a href="http://archive.is/jwlur">[archive.is]</a> <a href="http://archive.is/jwlur">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last updated on 5/30/2018 This article was last updated on 5/30/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,43 +1,43 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Nvidia Graphics Card Drivers</h1> <h1>Nvidia Graphics Card Drivers</h1>
<img src="/images/nvidia_logo.png" alt="Nvidia logo"> <img src../images/nvidia_logo.png" alt="Nvidia logo">
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<h2>UNFINISHED ARTICLE- UNDER CONSTRUCTION</h2> <h2>UNFINISHED ARTICLE- UNDER CONSTRUCTION</h2>
<p>This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.</p> <p>This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.</p>
<h2>Spyware Level: <font color=red>Not Rated</font></h2> <h2>Spyware Level: <font color=red>Not Rated</font></h2>
<p> <p>
Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with
spyware and the installation process is a minefeild of serious privacy pitfalls, with options selected by default that have serious privacy spyware and the installation process is a minefeild of serious privacy pitfalls, with options selected by default that have serious privacy
implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer, implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer,
which needs to be cleaned up after the install. which needs to be cleaned up after the install.
</p> </p>
<h3>Nvidia's installer is bundled with other spyware programs</h3> <h3>Nvidia's installer is bundled with other spyware programs</h3>
<p> <p>
When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer. When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer.
This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information
about the files onto your comptuer to Nvidia. (An article about GeForce Experience is planned) about the files onto your comptuer to Nvidia. (An article about GeForce Experience is planned)
</p> </p>
<img src="/images/nvidia_bundling.png" alt="Nvidia driver installation screenshot"> <img src../images/nvidia_bundling.png" alt="Nvidia driver installation screenshot">
<h3>Nvidia drivers install telemetry services onto the host machine</h3> <h3>Nvidia drivers install telemetry services onto the host machine</h3>
<p> <p>
When the installation is finished, these services will show up (This is on windows 7): When the installation is finished, these services will show up (This is on windows 7):
</p> </p>
<img src="/images/nvidia_spyware_service.png" alt="Nvidia spyware services"> <img src../images/nvidia_spyware_service.png" alt="Nvidia spyware services">
<p> <p>
These can at least be disabled like so: These can at least be disabled like so:
</p> </p>
<img src="/images/nvidia_spyware_disable.png" alt="Nvidia spyware service disable"> <img src../images/nvidia_spyware_disable.png" alt="Nvidia spyware service disable">
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -53,15 +53,15 @@
<a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br> <a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 7/22/2018 This article was last edited on 7/22/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Opera</h1> <h1>Opera</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/opera_logo.png" alt="Images are in the /images folder"> <img src../images/opera_logo.png" alt="Images are in the /images folder">
<p> <p>
A web browser made by Opera Software, using the Blink engine. Has some interesting features like mouse gestures, a built-in ad blocker and VPN. It is the sixth most popular browser. But how does it look like in terms of privacy? A web browser made by Opera Software, using the Blink engine. Has some interesting features like mouse gestures, a built-in ad blocker and VPN. It is the sixth most popular browser. But how does it look like in terms of privacy?
</p> </p>
@ -19,11 +19,11 @@
<h3>Geolocation</h3> <h3>Geolocation</h3>
<p>The first request Opera makes is the geolocation request: <img src="/images/opera_geo.png"> which includes your country and the precise timestamp.</p> <p>The first request Opera makes is the geolocation request: <img src../images/opera_geo.png"> which includes your country and the precise timestamp.</p>
<h3>Homepage request</h3> <h3>Homepage request</h3>
<p>If this is the first time you run Opera, it makes this request: <img src = "/images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p> <p>If this is the first time you run Opera, it makes this request: <img src =../images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p>
<h3>Cxense analytics</h3> <h3>Cxense analytics</h3>
@ -35,14 +35,14 @@
<h3>Search engines</h3> <h3>Search engines</h3>
<p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img src = "/images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="/articles/google.html">Google</a>.</p> <p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img src =../images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="../articles/google.html">Google</a>.</p>
<h3>OCSP querying</h3> <h3>OCSP querying</h3>
<p>Opera will query OCSP servers (ocsp.comodoca.com) to check if SSL certificates expired. <p>Opera will query OCSP servers (ocsp.comodoca.com) to check if SSL certificates expired.
<h3>Malware / Phishing protection</h3> <h3>Malware / Phishing protection</h3>
<p>Anytime you visit a website, Opera will make a request like this: <img src="/images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p> <p>Anytime you visit a website, Opera will make a request like this: <img src../images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p>
<h3>Other requests</h3> <h3>Other requests</h3>
@ -76,8 +76,8 @@
This article was created on 11/25/2017 This article was created on 11/25/2017
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Otter Browser</h1> <h1>Otter Browser</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/otter_browser_logo.png" alt="Otter Browser Logo"> <img src../images/otter_browser_logo.png" alt="Otter Browser Logo">
<p> <p>
From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy. From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.
</p> </p>
@ -22,8 +22,8 @@
This article was created on 11/25/2017 This article was created on 11/25/2017
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Paint.NET</h1> <h1>Paint.NET</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/paintnet_logo.png" alt="logo"> <img src../images/paintnet_logo.png" alt="logo">
<p> <p>
Paint.NET is a freeware image editor program for Microsoft Windows. Paint.NET is a freeware image editor program for Microsoft Windows.
</p> </p>
@ -24,19 +24,19 @@ It's impossible to build Paint.NET from source and read its source code to verif
<p> <p>
Paint.NET contains an updater that downloads new version of Paint.NET. This updater also downloads a file from paint.net's website to check for new versions, which is a form of phoning home. Paint.NET contains an updater that downloads new version of Paint.NET. This updater also downloads a file from paint.net's website to check for new versions, which is a form of phoning home.
(I didn't check what protocol or kind of request it makes, though) This can be disabled, however, and you should disable it. Paint.NET also will phone home when you install or upate the software.<sup><a href="#1">[1]</a></sup> (I didn't check what protocol or kind of request it makes, though) This can be disabled, however, and you should disable it. Paint.NET also will phone home when you install or upate the software.<sup><a href="#1">[1]</a></sup>
So the only way to avoid this is to block the program from accessing the internet, and disabling all updates. So the only way to avoid this is to block the program from accessing the internet, and disabling all updates.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://www.getpaint.net/privacy.html">Privacy Information</a> <a href="https://www.getpaint.net/privacy.html">Privacy Information</a>
<a href="https://web.archive.org/web/20180410043929/https://www.getpaint.net/privacy.html">[web.archive.org]</a> <a href="https://web.archive.org/web/20180410043929/https://www.getpaint.net/privacy.html">[web.archive.org]</a>
<a href="http://archive.is/aGtsl">[archive.is]</a> <a href="http://archive.is/aGtsl">[archive.is]</a>
<a href="http://arquivo.pt/wayback/20091015145021/http://www.getpaint.net/privacy.html">[arquivo.pt]</a> <a href="http://arquivo.pt/wayback/20091015145021/http://www.getpaint.net/privacy.html">[arquivo.pt]</a>
<br> <br>
</p> </p>
<hr> <hr>
@ -44,8 +44,8 @@ So the only way to avoid this is to block the program from accessing the interne
This article was last edited on 6/1/2018 This article was last edited on 6/1/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,38 +1,38 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Pale Moon</h1> <h1>Pale Moon</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/palemoon.html">Mitigation Guide</a></p> <a href="/guides/palemoon.html">Mitigation Guide</a></p>
<img src="/images/palemoon_logo.png" alt="Pale Moon logo"> <img src../images/palemoon_logo.png" alt="Pale Moon logo">
<p> <p>
Pale Moon is a fork of an old <a href="/articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
write this article. This article replaces an old article (<a href="/articles/palemoon_old.html">here</a>). write this article. This article replaces an old article (<a href="../articles/palemoon_old.html">here</a>).
</p> </p>
<p> <p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>
After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>. After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p> </p>
<p> <p>
Connects to analytics services, and these requests can <b>only be avoided on subsequent runs</b>. Has block lists, search suggestions, and auto-updates. Connects to analytics services, and these requests can <b>only be avoided on subsequent runs</b>. Has block lists, search suggestions, and auto-updates.
Sends SSL certificates from the sites you visit. Sends SSL certificates from the sites you visit.
</p> </p>
<h3>Google Analytics on Homepage</h3> <h3>Google Analytics on Homepage</h3>
<p> <p>
By default, Pale Moon's home page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. By default, Pale Moon's home page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run.
This page connects to Google Analytics, which can fingerprint and track you across the internet. This page connects to Google Analytics, which can fingerprint and track you across the internet.
</p> </p>
<img src="/images/pm_analytics.png" alt="Google Analyics requests sent by Pale Moon's default homepage"> <img src../images/pm_analytics.png" alt="Google Analyics requests sent by Pale Moon's default homepage">
<h3>Blocking privacy-enhancing addons</h3> <h3>Blocking privacy-enhancing addons</h3>
<p> <p>
Pale Moon by default won't allow you to install the privacy-enhancing addon noscript, citing this rationale for Pale Moon by default won't allow you to install the privacy-enhancing addon noscript, citing this rationale for
blocking such an imporant addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited, blocking such an imporant addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited,
NoScript will cause display issues and functional issues. "</i><sup><a href="#1">[1]</a></sup> NoScript will cause display issues and functional issues. "</i><sup><a href="#1">[1]</a></sup>
<b><font color=yellow>To disable this blocklist, set extensions.blocklist.enabled to false in about:config.</font></b> <b><font color=yellow>To disable this blocklist, set extensions.blocklist.enabled to false in about:config.</font></b>
</p> </p>
<h3>Auto-updates</h3> <h3>Auto-updates</h3>
@ -49,21 +49,21 @@ NoScript will cause display issues and functional issues. "</i><sup><a href="#1"
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="http://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a> <a href="http://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a>
<a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a> <a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a>
<a href="http://archive.is/EiraE">[archive.is]</a> <a href="http://archive.is/EiraE">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was created on 3/19/2019<br> This article was created on 3/19/2019<br>
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -7,11 +7,11 @@
</head> </head>
<body> <body>
<h1>Pale Moon</h1> <h1>Pale Moon</h1>
<p><a href="/articles">Back to catalog</a><br> <p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/palemoon.html">Mitigation Guide</a></p> <a href="/guides/palemoon.html">Mitigation Guide</a></p>
<img src="/images/palemoon_logo.png" alt="Pale Moon logo"> <img src../images/palemoon_logo.png" alt="Pale Moon logo">
<p> <p>
Pale Moon is a fork of an old <a href="/articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article. Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article.
</p> </p>
<p> <p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>
@ -89,8 +89,8 @@ privacy-concerned users, and would rather allow websites to execute malicious EC
This article was last updated on 10/14/2018 This article was last updated on 10/14/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -9,24 +9,24 @@
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>PowerISO</h1> <h1>PowerISO</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/poweriso_logo.png" alt="PowerISO logo"> <img src../images/poweriso_logo.png" alt="PowerISO logo">
<p> <p>
PowerISO is a CD / DVD / BD image file processing tool. PowerISO is a CD / DVD / BD image file processing tool.
</p> </p>
<h2>Spyware Level: <font color="yellow">Medium</font></h2> <h2>Spyware Level: <font color="yellow">Medium</font></h2>
<p> <p>
The PowerISO software itself, after you have installed it, does not seem to have a lot of serious privacy problems and would probably be listed The PowerISO software itself, after you have installed it, does not seem to have a lot of serious privacy problems and would probably be listed
as "Not Spyware" or "Low". However, downloading and installing this software requires careful attention because it attempts to install serveral spyware as "Not Spyware" or "Low". However, downloading and installing this software requires careful attention because it attempts to install serveral spyware
programs and otherwise violates your privacy at every step of the installation process. So it's received this higher rating because of how bad this programs and otherwise violates your privacy at every step of the installation process. So it's received this higher rating because of how bad this
process is for user privacy. Also, keep in mind that this is for the free version of the software and the paid version might be slightly better for process is for user privacy. Also, keep in mind that this is for the free version of the software and the paid version might be slightly better for
user privacy, however because there are so many problems with the free version you would have to do your own tests to make sure. user privacy, however because there are so many problems with the free version you would have to do your own tests to make sure.
</p> </p>
<p> <p>
To talk more specifically about the software itself, it will check off "automatically check for updates" by default in the installer which is bad, but you can uncheck it. To talk more specifically about the software itself, it will check off "automatically check for updates" by default in the installer which is bad, but you can uncheck it.
When I actually ran it after installing, it did not make any unsolicited requests so it didn't have any problems. When I asked it to check for updates, When I actually ran it after installing, it did not make any unsolicited requests so it didn't have any problems. When I asked it to check for updates,
it used HTTP to talk to some server. HTTP is a little excessive and not good for privacy. But at least it doesn't phone home or anything, which is really it used HTTP to talk to some server. HTTP is a little excessive and not good for privacy. But at least it doesn't phone home or anything, which is really
not something I expected after seeing the absolute disregard for user privacy when trying to install the program. not something I expected after seeing the absolute disregard for user privacy when trying to install the program.
</p> </p>
<p> <p>
Microsoft Network Monitor 3.4, ProcMon, and NoScript were used to check this program and it's installation process for spyware. Microsoft Network Monitor 3.4, ProcMon, and NoScript were used to check this program and it's installation process for spyware.
@ -37,37 +37,37 @@ When you try to download this program off of the developer's website (<a href="h
which appears to be a link to: <code>http://www.fettcedob-nero.com/vf6o1o5/PowerISO7-x64.exe</code>, is actually a redirect to a website that tries to run a third which appears to be a link to: <code>http://www.fettcedob-nero.com/vf6o1o5/PowerISO7-x64.exe</code>, is actually a redirect to a website that tries to run a third
party script (spyware) on your browser. party script (spyware) on your browser.
</p> </p>
<img src="/images/piso_scripts.png" alt="PowerISO install button running scripts- caught by noscript."> <img src../images/piso_scripts.png" alt="PowerISO install button running scripts- caught by noscript.">
<h3>Attempting to install a chrome extenison</h3> <h3>Attempting to install a chrome extenison</h3>
<p> <p>
I could not manage to download this program with a Firefox-based browser so I used a Chrome-Based browser to download it. Once I had enabled JavaScript and executed all of the I could not manage to download this program with a Firefox-based browser so I used a Chrome-Based browser to download it. Once I had enabled JavaScript and executed all of the
spyware involved, it attempted to get me to install this chrome extension: spyware involved, it attempted to get me to install this chrome extension:
</p> </p>
<img src="/images/piso_extension.png" alt="PowerISO attempt to install a chrome extension"> <img src../images/piso_extension.png" alt="PowerISO attempt to install a chrome extension">
<p> <p>
While this is not a review of search manager, it's worth noting that this extension is known adware at least, and who knows what else it does. Any searches about this While this is not a review of search manager, it's worth noting that this extension is known adware at least, and who knows what else it does. Any searches about this
extension should explain this. But at the very least, assuming that you didn't install any spyware yet, you at least have the PowerISO installer... extension should explain this. But at the very least, assuming that you didn't install any spyware yet, you at least have the PowerISO installer...
</p> </p>
<h3>Attempts to Install spyware in the PowerISO installer</h3> <h3>Attempts to Install spyware in the PowerISO installer</h3>
<p> <p>
Once you run the PowerISO installer, it will attempt to install the following progams on your computer: Once you run the PowerISO installer, it will attempt to install the following progams on your computer:
</p> </p>
<img src="/images/PowerISO7-x64_1.png" alt="PowerISO attempt to install spyware 1"> <img src../images/PowerISO7-x64_1.png" alt="PowerISO attempt to install spyware 1">
<img src="/images/PowerISO7-x64_2.png" alt="PowerISO attempt to install spyware 2"> <img src../images/PowerISO7-x64_2.png" alt="PowerISO attempt to install spyware 2">
<p> <p>
Which both look very shady. <a href="/articles/cdex.html">CDex</a> also seems to be using this same tactic and installer software.<br> Which both look very shady. <a href="../articles/cdex.html">CDex</a> also seems to be using this same tactic and installer software.<br>
Now, to top it all off, the PowerISO installer will also phone home to some Amazon Servers: Now, to top it all off, the PowerISO installer will also phone home to some Amazon Servers:
</p> </p>
<img src="/images/piso_installer_phone_home.png" alt="PowerISO installer phoning home"> <img src../images/piso_installer_phone_home.png" alt="PowerISO installer phoning home">
<hr> <hr>
<p><b> <p><b>
This article was created on 10/7/2018 This article was created on 10/7/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Qutebrowser</h1> <h1>Qutebrowser</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/qutebrowser_logo.png" alt="Qutebrowser Logo"> <img src../images/qutebrowser_logo.png" alt="Qutebrowser Logo">
<p> <p>
From their website: "qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL." Program tested: v1.3.0 for Windows 7 64-bit. Mitmproxy was used to check for connections. From their website: "qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL." Program tested: v1.3.0 for Windows 7 64-bit. Mitmproxy was used to check for connections.
</p> </p>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
<p> <p>
Qutebrowser <b><font color=lime>makes no unsolicited requests at all.</font></b> It is also fully open source. This web browser is a great choice to use, and there is Qutebrowser <b><font color=lime>makes no unsolicited requests at all.</font></b> It is also fully open source. This web browser is a great choice to use, and there is
nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well... ) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there. nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well... ) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.
</p> </p>
<hr> <hr>
@ -22,8 +22,8 @@ nothing to complain about from a privacy standpoint. (although I don't really kn
This article was created on 5/10/2018 This article was created on 5/10/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Spyware de Razer</h1> <h1>Spyware de Razer</h1>
<p> <p><a href="/articles">Back to catalog (English)</a><br> <p> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="/articles/index_es.html">Back to catalog (Spanish)</a><br> <a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="/articles/razer_en.html">English Translation</a></p> <a href="../articles/razer_en.html">English Translation</a></p>
<img src="/images/razer_logo.png"> <img src../images/razer_logo.png">
<p>Razer es una compañía que hace programas y hardware para videojugadores</p> <p>Razer es una compañía que hace programas y hardware para videojugadores</p>
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2> <h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
<h3>Información que recolecta</h3> <h3>Información que recolecta</h3>
@ -27,12 +27,12 @@
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p> <p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
<p>También dice que los empleados pueden ver esos datos.</p> <p>También dice que los empleados pueden ver esos datos.</p>
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3> <h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
<img src="/images/theevidence.png"> <img src../images/theevidence.png">
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p> <p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p> <p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p> <p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p> <p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
<hr> <hr>
<h2>Mas lecturas</h2> <h2>Mas lecturas</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
@ -45,19 +45,19 @@
<h2>Referencias</h2> <h2>Referencias</h2>
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br> <p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p> 2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
<hr> <hr>
<p><b> <p><b>
This article was created on 3/4/2019 This article was created on 3/4/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 license to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 license to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</html> </html>

View File

@ -1,17 +1,17 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Razer's spyware</h1> <h1>Razer's spyware</h1>
<p> <p>
<a href="/articles/index.html">Back to catalog</a><br> <a href="../articles/index.html">Back to catalog</a><br>
<a href="/articles/razer.html">Spanish Article</a> <a href="../articles/razer.html">Spanish Article</a>
</p> </p>
<img src="/images/razer_logo.png"> <img src../images/razer_logo.png">
<p>Razer is a company that makes software and hardware for gamers.</p> <p>Razer is a company that makes software and hardware for gamers.</p>
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2> <h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
@ -19,7 +19,7 @@
<h3>Data collection</h3> <h3>Data collection</h3>
<p>Razer confirms that they collect this data:</p> <p>Razer confirms that they collect this data:</p>
<ul> <ul>
<li>E-mail</li> <li>E-mail</li>
<li>Full name</li> <li>Full name</li>
<li>Contact info</li> <li>Contact info</li>
@ -33,10 +33,10 @@
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data. Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
Razer FORCES you to create an account to use YOUR products. Razer FORCES you to create an account to use YOUR products.
</p> </p>
<img src="/images/theevidence.png"> <img src../images/theevidence.png">
<p> <p>
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody's change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody's
elses PC, and Razer knows who has that (your) info. elses PC, and Razer knows who has that (your) info.
</p> </p>
@ -58,11 +58,11 @@
This article was translated on 3/10/2019<br> This article was translated on 3/10/2019<br>
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles. This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 license to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 license to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,27 +1,27 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>RealPlayer</h1> <h1>RealPlayer</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/realplayer_logo.png" alt="realplayer logo"> <img src../images/realplayer_logo.png" alt="realplayer logo">
<p> <p>
RealPlayer, formerly RealAudio Player, RealOne Player and RealPlayer G2, is a cross-platform media player app, developed by RealNetworks. RealPlayer, formerly RealAudio Player, RealOne Player and RealPlayer G2, is a cross-platform media player app, developed by RealNetworks.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
RealPlayer is spyware that reports all of the media you consume using it to its developers. It uses information that it obtains through this spyware RealPlayer is spyware that reports all of the media you consume using it to its developers. It uses information that it obtains through this spyware
to build detailed profiles of its users, such as what media they consume and what physical locations they visit, fingerprints of their computers, etc., as well as using information to build detailed profiles of its users, such as what media they consume and what physical locations they visit, fingerprints of their computers, etc., as well as using information
from other spyware services like Facebook and Twitter to build these profiles. <b><font color=red>Realplayer knows what media you watch, what your physical location is, what computers you use, and it uses this information for advertising.</font></b> from other spyware services like Facebook and Twitter to build these profiles. <b><font color=red>Realplayer knows what media you watch, what your physical location is, what computers you use, and it uses this information for advertising.</font></b>
</p> </p>
<p> <p>
No actual tests of the software were done to write this article since there isn't really a point... RealPlayer doesn't seem to be hiding anything, No actual tests of the software were done to write this article since there isn't really a point... RealPlayer doesn't seem to be hiding anything,
since the privacy policy is so open about what it does. There probably is more spyware hidden in it, but it's really at such a point where it can't since the privacy policy is so open about what it does. There probably is more spyware hidden in it, but it's really at such a point where it can't
receive a higher rating or a diffrent advisory: <b><font color=red>Do not use this program.</font></b> receive a higher rating or a diffrent advisory: <b><font color=red>Do not use this program.</font></b>
</p> </p>
<h3>RealPlayer records the media you own and consume with it</h3> <h3>RealPlayer records the media you own and consume with it</h3>
<p> <p>
@ -33,15 +33,15 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
"Such information can include...Information relating to your use of our products and services, for example information relating to photographs or videos you upload to RealPlayer or add to RealTimes, content you download using RealPlayer including domains associated with such content, geo-location information or patterns associated with photographs or videos to enable features in RealTimes, and activities on our websites such as pages visited;" "Such information can include...Information relating to your use of our products and services, for example information relating to photographs or videos you upload to RealPlayer or add to RealTimes, content you download using RealPlayer including domains associated with such content, geo-location information or patterns associated with photographs or videos to enable features in RealTimes, and activities on our websites such as pages visited;"
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
So, because of this vauge wording, it can only be assumed that RealPlayer has access to all of the media that you consume using it. So, because of this vauge wording, it can only be assumed that RealPlayer has access to all of the media that you consume using it.
</p> </p>
<h3>RealPlayer tracks the physical locations of its users</h3> <h3>RealPlayer tracks the physical locations of its users</h3>
<p> <p>
What is especially agregious about this policy is that is designed to create detailed profiles of the user. RealPlayer specifically mentions that when it What is especially agregious about this policy is that is designed to create detailed profiles of the user. RealPlayer specifically mentions that when it
uses it's spyware to access your photos, it will search for <i>"geo-location information"</i>, as well as <i>"patterns associated with photographs or videos"</i>. uses it's spyware to access your photos, it will search for <i>"geo-location information"</i>, as well as <i>"patterns associated with photographs or videos"</i>.
This is worded in a (somewhat) innocent way but it tells a lot about what this spyware is for. "Patterns" associated with media implies that RealPlayer is This is worded in a (somewhat) innocent way but it tells a lot about what this spyware is for. "Patterns" associated with media implies that RealPlayer is
using the information it collects on its users for facial recognition. using the information it collects on its users for facial recognition.
</p> </p>
<p> <p>
RealPlayer also fingerprints the hardware you use: RealPlayer also fingerprints the hardware you use:
@ -57,9 +57,9 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
"we sometimes receive information from third parties such as...Service providers that help us determine your devices location based on its IP address to customize certain products to your location" "we sometimes receive information from third parties such as...Service providers that help us determine your devices location based on its IP address to customize certain products to your location"
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
So, this is proof that RealPlayer is <b><font color=red>designed to track your physical location.</font></b> So, this is proof that RealPlayer is <b><font color=red>designed to track your physical location.</font></b>
</p> </p>
<h3>RealPlayer colludes information with other spyware services to profile its users</h3> <h3>RealPlayer colludes information with other spyware services to profile its users</h3>
<p> <p>
RealPlayer uses all of the information it collects in combination with information that other spyware platforms and services use RealPlayer uses all of the information it collects in combination with information that other spyware platforms and services use
@ -76,7 +76,7 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
"Advertisers about your experiences or interactions with their offerings." "Advertisers about your experiences or interactions with their offerings."
</i></li> </i></li>
</ul> </ul>
<h3>RealPlayer uses the information it collects to advertise to its users</h3> <h3>RealPlayer uses the information it collects to advertise to its users</h3>
<p> <p>
RealPlayer uses the information that it collects to sell to advertisers and to advertise to its users itself. The privacy policy<sup><a href="#1">[1]</a></sup> makes no secret of this: RealPlayer uses the information that it collects to sell to advertisers and to advertise to its users itself. The privacy policy<sup><a href="#1">[1]</a></sup> makes no secret of this:
@ -98,7 +98,7 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
The quotes that have been shown here are really only the <b>tip of the iceberg</b> and for more information the actual privacy policy itself should be read since there is so much The quotes that have been shown here are really only the <b>tip of the iceberg</b> and for more information the actual privacy policy itself should be read since there is so much
more information on it. more information on it.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
@ -112,9 +112,9 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
This article was last edited on 8/13/2018 This article was last edited on 8/13/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Redshell</h1> <h1>Redshell</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/redshell_logo.png" alt="redshell Logo"> <img src../images/redshell_logo.png" alt="redshell Logo">
<p> <p>
Redshell is a spyware platform that is integrated into many video games. Redshell is a spyware platform that is integrated into many video games.
</p> </p>
@ -17,8 +17,8 @@ Redshell is a spyware platform that is integrated into many video games.
Redshell is a spyware platform. It's purpose is to collect huge amounts of information about its user's computers Redshell is a spyware platform. It's purpose is to collect huge amounts of information about its user's computers
to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints
any computers it is attached too and phones home. It also collects information about how a player has been interacting any computers it is attached too and phones home. It also collects information about how a player has been interacting
with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are
avoided entirely. avoided entirely.
</p> </p>
<h3>Redshell collects a huge amount of information from its users machines</h3> <h3>Redshell collects a huge amount of information from its users machines</h3>
<p> <p>
@ -35,16 +35,16 @@ avoided entirely.
<li>Game-Specific UUID</li> <li>Game-Specific UUID</li>
</ul> </ul>
<p> <p>
This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well
as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by
scanning your computer for installed programs and collecting various demographic information about the user. It's very clear scanning your computer for installed programs and collecting various demographic information about the user. It's very clear
that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how
innocent this data is. innocent this data is.
<p> <p>
<h3>Phoning home</h3> <h3>Phoning home</h3>
<p> <p>
Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with
personal information in a way perculiar to that program. personal information in a way perculiar to that program.
</p> </p>
<h3>Sharing Information with third parties</h3> <h3>Sharing Information with third parties</h3>
<p> <p>
@ -56,7 +56,7 @@ avoided entirely.
<p> <p>
Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being
given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product,
Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the
the information it's spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or the information it's spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
will not sell the information that they collect through Redshell to third parties. will not sell the information that they collect through Redshell to third parties.
</p> </p>
@ -79,8 +79,8 @@ avoided entirely.
This article was last edited on 7/16/2018 This article was last edited on 7/16/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Slimjet</h1> <h1>Slimjet</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/slimjet_logo.png" alt="slimjet Logo"> <img src../images/slimjet_logo.png" alt="slimjet Logo">
<p> <p>
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base. Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
</p> </p>
@ -22,19 +22,19 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup> Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup>
the moment I turn it on with MITMproxy running, I am greeted with this: the moment I turn it on with MITMproxy running, I am greeted with this:
</p> </p>
<img src="/images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services"> <img src../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<p> <p>
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service? So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
</p> </p>
<h3>Default Search Engine is Spyware</h3> <h3>Default Search Engine is Spyware</h3>
<p> <p>
The default search engine is <a href="/articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which <i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek. has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
</p> </p>
<img src="/images/fpseek.png" alt="Fpseek connection"> <img src../images/fpseek.png" alt="Fpseek connection">
<p> <p>
So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad
default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact
with advertisments and it says that it uses information it collects about it's users to: with advertisments and it says that it uses information it collects about it's users to:
</p> </p>
@ -48,23 +48,23 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
<h3>Collecting Information about Users</h3> <h3>Collecting Information about Users</h3>
<p> <p>
Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information
to advertisters. However it is still opt-out spyware. to advertisters. However it is still opt-out spyware.
</p> </p>
<h3>Using the Microsoft BITS service to upload search history to Google servers</h3> <h3>Using the Microsoft BITS service to upload search history to Google servers</h3>
<p> <p>
When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer
updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy: updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy:
</p> </p>
<img src="/images/sj_google_BITS.png" alt="Bits1"> <img src../images/sj_google_BITS.png" alt="Bits1">
<img src="/images/sj_google_BITS_2.png" alt="Bits2"> <img src../images/sj_google_BITS_2.png" alt="Bits2">
<img src="/images/sj_google_BITS_3.png" alt="Bits3"> <img src../images/sj_google_BITS_3.png" alt="Bits3">
<p> <p>
Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the
"CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented. "CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented.
</p> </p>
<img src="/images/sj_cloud.png" alt="cloud sync feature"> <img src../images/sj_cloud.png" alt="cloud sync feature">
<p> <p>
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history... Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
@ -86,8 +86,8 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
This article was last edited on 8/4/2018 This article was last edited on 8/4/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -2,15 +2,15 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Snapchat</h1> <h1>Snapchat</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/snapchat_logo.png" alt="Snapchat Logo"> <img src../images/snapchat_logo.png" alt="Snapchat Logo">
<p> <p>
Snapchat, developed by <a href="https://en.wikipedia.org/wiki/Snap_Inc">Snap Inc</a> is designed to be a free, and fun smartphone app to send messages as "Snaps" to your friends. It is popular among teenagers and millennials, however older people have started using the app too. Snapchat, developed by <a href="https://en.wikipedia.org/wiki/Snap_Inc">Snap Inc</a> is designed to be a free, and fun smartphone app to send messages as "Snaps" to your friends. It is popular among teenagers and millennials, however older people have started using the app too.
</p> </p>
@ -47,7 +47,7 @@ For a simple social media app, Snapchat demands too many permissions. When I tes
<p>If logging IPs and GPS Locations wasn't enough, Snapchat will now lock out accounts that haven't provided an email or phone number<sup><a href="#3">[3]</a></sup>. Snapchat will let you use thier app for a grace period before it locks you out and demands an email or phone number in order to get your account back. The length of this grace period is unknown.</p> <p>If logging IPs and GPS Locations wasn't enough, Snapchat will now lock out accounts that haven't provided an email or phone number<sup><a href="#3">[3]</a></sup>. Snapchat will let you use thier app for a grace period before it locks you out and demands an email or phone number in order to get your account back. The length of this grace period is unknown.</p>
<h3>You Must Use the Official Client</h3> <h3>You Must Use the Official Client</h3>
<p>If a user is fed up with the the vast amount of information the official Snapchat client collects about you, they CANNOT change to the 3rd party client. Doing so is strictly prohibited. Snapchat has a service that is designed to catch users using 3rd party clients and permanently lock your account. This forces the user to use the official client which contains the spyware.</p> <p>If a user is fed up with the the vast amount of information the official Snapchat client collects about you, they CANNOT change to the 3rd party client. Doing so is strictly prohibited. Snapchat has a service that is designed to catch users using 3rd party clients and permanently lock your account. This forces the user to use the official client which contains the spyware.</p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
@ -84,12 +84,12 @@ For a simple social media app, Snapchat demands too many permissions. When I tes
This article was last edited on 2/23/2019 This article was last edited on 2/23/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,51 +1,51 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Sphere Browser</h1> <h1>Sphere Browser</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/sphere_logo.png" alt="sphere browser logo"> <img src../images/sphere_logo.png" alt="sphere browser logo">
<p> <p>
Sphere Browser is a privacy-focused web Browser made by Tenebris. Sphere Browser is a privacy-focused web Browser made by Tenebris.
</p> </p>
<h2>Spyware Level: <font color=greenyellow>Possible Spyware</font></h2> <h2>Spyware Level: <font color=greenyellow>Possible Spyware</font></h2>
<p> <p>
This program was tested with MITMproxy on Linux. Sphere Browser itself does not contain any telemetry and really has removed all of This program was tested with MITMproxy on Linux. Sphere Browser itself does not contain any telemetry and really has removed all of
the spyware from the chromium codebase that it is based on. However, it has two red flags- the default homepage has analytics, and you have to run the spyware from the chromium codebase that it is based on. However, it has two red flags- the default homepage has analytics, and you have to run
analytics on your browser to download it. The software is fine. Just the settings and the way you have to analytics on your browser to download it. The software is fine. Just the settings and the way you have to
download it and the lack of source code hold it back from the title of "Not Spyware". You can easily configure it to not connect to the default homepage, at least. download it and the lack of source code hold it back from the title of "Not Spyware". You can easily configure it to not connect to the default homepage, at least.
</p> </p>
<h3>Tracking pixel on the default homepage</h3> <h3>Tracking pixel on the default homepage</h3>
<p> <p>
Sphere Browser is based around an "identities" feature that lets you change how your browser appears to the rest of Sphere Browser is based around an "identities" feature that lets you change how your browser appears to the rest of
the internet in a rather easy way- and then it by default loads the site <code>f.vision</code> which can identify your new identity in a pretty the internet in a rather easy way- and then it by default loads the site <code>f.vision</code> which can identify your new identity in a pretty
centeralized way, and even includes a tracking pixel from the getclicky analytics service. If you want to use this browser, you really centeralized way, and even includes a tracking pixel from the getclicky analytics service. If you want to use this browser, you really
should not be using this default homepage. It contrasts with the privacy features of the browser rather poorly. should not be using this default homepage. It contrasts with the privacy features of the browser rather poorly.
</p> </p>
<img src="/images/sphere_tracking.png" alt="getclicky tracking pixel on the sphere browser default homepage"> <img src../images/sphere_tracking.png" alt="getclicky tracking pixel on the sphere browser default homepage">
<h3>JavaScript from an Analytics company on the download site</h3> <h3>JavaScript from an Analytics company on the download site</h3>
<p> <p>
Another problem is, you need to load JavaScript to download the browser itself at sphere.tenebris.cc/, which tries to load JS code from Tenebris Another problem is, you need to load JavaScript to download the browser itself at sphere.tenebris.cc/, which tries to load JS code from Tenebris
as well as JavaScript from the same analytics company that has the tracking pixel on <code>f.vision</code>. Why are these analytics here if the browser as well as JavaScript from the same analytics company that has the tracking pixel on <code>f.vision</code>. Why are these analytics here if the browser
is so focused on privacy? is so focused on privacy?
</p> </p>
<img src="/images/sphere_homepage.png" alt="getclicky tracking JS on the sphere browser download page"> <img src../images/sphere_homepage.png" alt="getclicky tracking JS on the sphere browser download page">
<hr> <hr>
<p><b> <p><b>
This article was last edited on 12/12/2018 This article was last edited on 12/12/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Steam</h1> <h1>Steam</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/steam_logo.png" alt="Steam logo"> <img src../images/steam_logo.png" alt="Steam logo">
<p> <p>
Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve. Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.
</p> </p>
@ -18,7 +18,7 @@ This program is spyware because it collects huge amounts of user information, in
</p> </p>
<h3>Steam's source code is unavailible</h3> <h3>Steam's source code is unavailible</h3>
<p> <p>
Steam cannot be built from an availible copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has. Steam cannot be built from an availible copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.
</p> </p>
<h3>Steam collects and shares huge amounts of sensitive user information</h3> <h3>Steam collects and shares huge amounts of sensitive user information</h3>
<p> <p>
@ -38,7 +38,7 @@ In Steam's privacy policy<sup><a href="#1">[1]</a></sup>, Steam details that it
<li>Hardware Enumeration</li> <li>Hardware Enumeration</li>
</ul> </ul>
<p> <p>
Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unqiue ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well. Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unqiue ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.
</p> </p>
<h3>Steam has been and may still be recording your internet history</h3> <h3>Steam has been and may still be recording your internet history</h3>
<p> <p>
@ -50,11 +50,11 @@ Steam records your program usage habits for all programs launched through Steam'
</p> </p>
<h3>Steam attempts to collect your telephone number</h3> <h3>Steam attempts to collect your telephone number</h3>
<p> <p>
Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privledges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information. Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privledges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.
</p> </p>
<h3>Steam "phones home" and requires and internet connection</h3> <h3>Steam "phones home" and requires and internet connection</h3>
<p> <p>
Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so. Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.
</p> </p>
<h3>Steam is self-updating software</h3> <h3>Steam is self-updating software</h3>
<p> <p>
@ -63,22 +63,22 @@ Steam contains spyware features that allow it to update itself without user veri
<hr> <hr>
<h2>Further Reading</h2> <h2>Further Reading</h2>
<p> <p>
<a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a> <a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a>
<a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a> <a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a>
<a href="http://archive.is/baCzK">[archive.is]</a> <a href="http://archive.is/baCzK">[archive.is]</a>
<br> <br>
<a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a> <a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a>
<a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a>
<a href="http://archive.is/UpQU5">[archive.is]</a> <a href="http://archive.is/UpQU5">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a> <a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a>
<a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a>
@ -92,13 +92,13 @@ Steam contains spyware features that allow it to update itself without user veri
<a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a>
<a href="https://archive.is/rc37E">[archive.is]</a> <a href="https://archive.is/rc37E">[archive.is]</a>
<br> <br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a> <a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a>
<a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a>
<a href="https://archive.li/06hx7">[archive.is]</a> <a href="https://archive.li/06hx7">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
@ -106,8 +106,8 @@ Steam contains spyware features that allow it to update itself without user veri
This article was last edited on 8/3/2018 This article was last edited on 8/3/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,32 +1,32 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>systemd</h1> <h1>systemd</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<h1><font color=red>This aritcle is not accurate and needs to be rewritten</font></h1> <h1><font color=red>This aritcle is not accurate and needs to be rewritten</font></h1>
<h2>Spyware Level: <font color="yellow">Not Rated</font></h2> <h2>Spyware Level: <font color="yellow">Not Rated</font></h2>
<p> <p>
A lot of people asked me to write this article, so here is my attempt at writing it. Lots of people have lots of reasons to dislike systemd, and a lot of them wonder if A lot of people asked me to write this article, so here is my attempt at writing it. Lots of people have lots of reasons to dislike systemd, and a lot of them wonder if
there is also a privacy reason to dislike systemd. But I have not ever heard of any kind of telemetry, phoning home, or any other kind of spyware in the systemd software there is also a privacy reason to dislike systemd. But I have not ever heard of any kind of telemetry, phoning home, or any other kind of spyware in the systemd software
suite. systemd is free software so anyone can look at the code. And a lot of people have spent a lot of time cataloging why they don't like systemd. But if you read their suite. systemd is free software so anyone can look at the code. And a lot of people have spent a lot of time cataloging why they don't like systemd. But if you read their
reasons, none of them mention any kind of spyware hiding inside of systemd's codebase that can be actually proven. So, I can't write that systemd is spyware until someone reasons, none of them mention any kind of spyware hiding inside of systemd's codebase that can be actually proven. So, I can't write that systemd is spyware until someone
can prove that it is spyware. If you have proof then feel free to email me and I will be happy to change this rating. can prove that it is spyware. If you have proof then feel free to email me and I will be happy to change this rating.
</p> </p>
<p> <p>
This line of reasoning for giving systemd a "Not Spyware" rating has some flaws, and the most obvious one is that it isn't reasonable to audit the 1 million lines of systemd This line of reasoning for giving systemd a "Not Spyware" rating has some flaws, and the most obvious one is that it isn't reasonable to audit the 1 million lines of systemd
code for spyware. But this is still too generic of a critisim to make about it, because while in theory it is true, there needs to be real proof. Maybe the take-away is code for spyware. But this is still too generic of a critisim to make about it, because while in theory it is true, there needs to be real proof. Maybe the take-away is
that while there are many reasons to not like systemd, it's really probably not violating anyones privacy, just because of how much scrutiny it has gotten. Maybe it should be that while there are many reasons to not like systemd, it's really probably not violating anyones privacy, just because of how much scrutiny it has gotten. Maybe it should be
rated "Potential Spyware" or a lower, "Probably Not Spyware"? I think that the rating should be taken with a grain of salt because of this. rated "Potential Spyware" or a lower, "Probably Not Spyware"? I think that the rating should be taken with a grain of salt because of this.
</p> </p>
<p> <p>
I have personally never used systemd and I don't have the skills to actually audit it or run tests on it myself. So this isn't a very good place to look when looking for reasons I have personally never used systemd and I don't have the skills to actually audit it or run tests on it myself. So this isn't a very good place to look when looking for reasons
to dislike systemd. At the very least, I can point to anti-systemd web pages that I am sure would be the first to report on systemd potentially violating the privacy of it's users. to dislike systemd. At the very least, I can point to anti-systemd web pages that I am sure would be the first to report on systemd potentially violating the privacy of it's users.
But I don't want to call them "sources" or anything because what they talk about is beyond the scope of this website. But I don't want to call them "sources" or anything because what they talk about is beyond the scope of this website.
</p> </p>
<hr> <hr>
<h2>Anti systemd web pages</h2> <h2>Anti systemd web pages</h2>
@ -34,22 +34,22 @@ But I don't want to call them "sources" or anything because what they talk about
<a href="https://suckless.org/sucks/systemd/">systemd is the best example of Suck.</a> <a href="https://suckless.org/sucks/systemd/">systemd is the best example of Suck.</a>
<a href="https://web.archive.org/web/20180725191931/https://suckless.org/sucks/systemd">[web.archive.org]</a> <a href="https://web.archive.org/web/20180725191931/https://suckless.org/sucks/systemd">[web.archive.org]</a>
<a href="http://archive.li/BfS7l">[archive.is]</a><br> <a href="http://archive.li/BfS7l">[archive.is]</a><br>
<a href="http://without-systemd.org/wiki/index.php/Arguments_against_systemd">Arguments against systemd</a> <a href="http://without-systemd.org/wiki/index.php/Arguments_against_systemd">Arguments against systemd</a>
<a href="http://web.archive.org/web/20180802045154/http://without-systemd.org/wiki/index.php/Arguments_against_systemd">[web.archive.org]</a> <a href="http://web.archive.org/web/20180802045154/http://without-systemd.org/wiki/index.php/Arguments_against_systemd">[web.archive.org]</a>
<a href="http://archive.li/bnmIo">[archive.is]</a><br> <a href="http://archive.li/bnmIo">[archive.is]</a><br>
<a href="https://web.archive.org/web/20170724100245/https://muchweb.me/systemd-nsa-attempt/">Is systemd an NSA attempt?</a> <a href="https://web.archive.org/web/20170724100245/https://muchweb.me/systemd-nsa-attempt/">Is systemd an NSA attempt?</a>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 8/7/2018 This article was last edited on 8/7/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,32 +1,32 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Telegram</h1> <h1>Telegram</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/telegram_logo.png" alt="Telegram Logo"> <img src="../images/telegram_logo.png" alt="Telegram Logo">
<p> <p>
Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users. Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.
</p> </p>
<h2>Spyware Level: <font color="yellow">Medium</font></h2> <h2>Spyware Level: <font color="yellow">Medium</font></h2>
<p> <p>
Telegram has some spyware features in it such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>. Telegram has some spyware features in it such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.
</p> </p>
<h3>Telephone Number Required</h3> <h3>Telephone Number Required</h3>
<p> <p>
Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information. Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.
</p> </p>
<h3>Centralized communication routing</h3> <h3>Centralized communication routing</h3>
<p> <p>
Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy<sup><a href="#1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this. Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy<sup><a href="#1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.
</p> </p>
<p> <p>
Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because
of this, meaning that the servers that the developers operate are the only choice for using this messaging platform. of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.
</p> </p>
<h3>Telegram does not follow its GPLv2 Obligations</h3> <h3>Telegram does not follow its GPLv2 Obligations</h3>
<p> <p>
@ -39,19 +39,19 @@ Telegram clients are advertised as free software, but in practice the source cod
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a> <a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
<a href="https://web.archive.org/web/20180528161128/https://telegram.org/privacy">[web.archive.org]</a> <a href="https://web.archive.org/web/20180528161128/https://telegram.org/privacy">[web.archive.org]</a>
<a href="https://archive.is/Rn64n">[archive.is]</a><br> <a href="https://archive.is/Rn64n">[archive.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a> <a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
<a href="https://archive.li/2018.05.29-092521/https://github.com/overtake/TelegramSwift/issues/163">[archive.li]</a><br> <a href="https://archive.li/2018.05.29-092521/https://github.com/overtake/TelegramSwift/issues/163">[archive.li]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 2/18/2019 This article was last edited on 2/18/2019
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Mozilla Thunderbird</h1> <h1>Mozilla Thunderbird</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/thunderbird.png" alt="Mozilla Thunderbird logo"> <img src="../images/thunderbird.png" alt="Mozilla Thunderbird logo">
<p> <p>
Mozilla Thunderbird is an email, newsgroup, news feed, and chat client that was developed by the Mozilla Foundation, who are also the developers of <a href="/articles/firefox.html">Firefox</a>. Mozilla Thunderbird is an email, newsgroup, news feed, and chat client that was developed by the Mozilla Foundation, who are also the developers of <a href="../articles/firefox.html">Firefox</a>.
</p> </p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>
<p> <p>
Thunderbird contains a lot of spyware features, however all of these can be opted-out of and most of the spyware is connected to the web-browsing capaiblities of Thunderbird. Thunderbird contains some minor spyware protection to its users and does not attempt to collect any information that is extremely sensitive, however it is spyware and does share and collect user information by default that it does not need to share. Thunderbird contains a lot of spyware features, however all of these can be opted-out of and most of the spyware is connected to the web-browsing capaiblities of Thunderbird. Thunderbird contains some minor spyware protection to its users and does not attempt to collect any information that is extremely sensitive, however it is spyware and does share and collect user information by default that it does not need to share.
</p> </p>
<h3>Thunderbird shares your E-Mail address with other parties</h3> <h3>Thunderbird shares your E-Mail address with other parties</h3>
<p> <p>
@ -25,11 +25,11 @@ Thunderbird contains a lot of spyware features, however all of these can be opte
</i></p> </i></p>
<h3>Thunderbird allows other websites to track you</h3> <h3>Thunderbird allows other websites to track you</h3>
<p> <p>
Thunderbird contains web browsing spyware features, including compatiblity with tracking cookies and javascript, which can both be used to allow other parties to spy on users. As such, all of the spyware concerns of browsing the web are relevant when using Thunderbird. However, these features can be turned off. They are not spyware in and of themselves but they are attack vectors for other spyware programs to be downloaded and executed by the user. Thunderbird however provides some basic protections by default such as blocking all remote content in HTML E-Mails. Thunderbird contains web browsing spyware features, including compatiblity with tracking cookies and javascript, which can both be used to allow other parties to spy on users. As such, all of the spyware concerns of browsing the web are relevant when using Thunderbird. However, these features can be turned off. They are not spyware in and of themselves but they are attack vectors for other spyware programs to be downloaded and executed by the user. Thunderbird however provides some basic protections by default such as blocking all remote content in HTML E-Mails.
</p> </p>
<h3>Thunderbird profiles its users and tracks the add-ons and personas they have installed</h3> <h3>Thunderbird profiles its users and tracks the add-ons and personas they have installed</h3>
<p> <p>
Thunderbird details in its privacy policy<sup><a href="#1">[1]</a></sup> that it updates Mozilla with the add-ons that users have installed, and then uses that information to recommend other add-ons to its users. Thunderbird will also track which "personas" a person installs and uses (these are like themes) when the user is using Mozilla's centeralized "personal gallery". These spyware features can be opted-out of or not used. Thunderbird details in its privacy policy<sup><a href="#1">[1]</a></sup> that it updates Mozilla with the add-ons that users have installed, and then uses that information to recommend other add-ons to its users. Thunderbird will also track which "personas" a person installs and uses (these are like themes) when the user is using Mozilla's centeralized "personal gallery". These spyware features can be opted-out of or not used.
</p> </p>
<h3>Thunderbird shares your web browsing information with other parties</h3> <h3>Thunderbird shares your web browsing information with other parties</h3>
<p> <p>
@ -43,7 +43,7 @@ Thunderbird details in its privacy policy<sup><a href="#1">[1]</a></sup> that it
</p> </p>
<h3>Thunderbird is self-updating software</h3> <h3>Thunderbird is self-updating software</h3>
<p> <p>
Thunderbird will try and download new versions of itself using its update system. Since new versions of programs means that there could be new forms of spyware hidden in the program after updating, this is a form of spyware. This feature has an opt-out. Thunderbird will try and download new versions of itself using its update system. Since new versions of programs means that there could be new forms of spyware hidden in the program after updating, this is a form of spyware. This feature has an opt-out.
</p> </p>
<h3>Thunderbird contains other opt-in spyware</h3> <h3>Thunderbird contains other opt-in spyware</h3>
<p> <p>
@ -52,22 +52,22 @@ Thunderbird contains several forms of opt-in spyware that only collects informat
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="http://www.mozilla.org/en-US/privacy/thunderbird/">Mozilla Thunderbird Privacy Policy</a> <a href="http://www.mozilla.org/en-US/privacy/thunderbird/">Mozilla Thunderbird Privacy Policy</a>
<a href="https://web.archive.org/web/20180518042233/https://www.mozilla.org/en-US/privacy/thunderbird/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180518042233/https://www.mozilla.org/en-US/privacy/thunderbird/">[web.archive.org]</a>
<a href="https://archive.is/l4Sf1">[archive.is]</a> <a href="https://archive.is/l4Sf1">[archive.is]</a>
<a href="http://arquivo.pt/wayback/20150815191914/https://www.mozilla.org/en-US/privacy/thunderbird/">[arquivo.pt]</a><br> <a href="http://arquivo.pt/wayback/20150815191914/https://www.mozilla.org/en-US/privacy/thunderbird/">[arquivo.pt]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 6/2/2018 This article was last edited on 6/2/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Tor Browser</h1> <h1>Tor Browser</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/tor_logo.png" alt="TOR browser logo"> <img src="../images/tor_logo.png" alt="TOR browser logo">
<p> <p>
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup> Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>
</p> </p>
<h2>Spyware Level: <font color="lime">Not Spyware</font></h2> <h2>Spyware Level: <font color="lime">Not Spyware</font></h2>
<p> <p>
The Tor browser is a privacy focused web browser that is used to access the internet either normally or through the Tor Network. The Tor browser is a privacy focused web browser that is used to access the internet either normally or through the Tor Network.
Connections through the Tor network are much more private than normal connections as you do not have an IP address that is Connections through the Tor network are much more private than normal connections as you do not have an IP address that is
associated with you. While spyware services can tell that you are connecting from the Tor network, their ability to identify and profile you is associated with you. While spyware services can tell that you are connecting from the Tor network, their ability to identify and profile you is
greatly reduced. Tor browser is <b><font color="lime">Not Spyware</font></b> and is the best web browser to use for privacy. greatly reduced. Tor browser is <b><font color="lime">Not Spyware</font></b> and is the best web browser to use for privacy.
@ -42,10 +42,10 @@ this over the Tor network... so while it's definitely "phoning home", it's doing
This article was last edited on 11/20/2018 This article was last edited on 11/20/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -9,18 +9,18 @@
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Ungoogled-Chromium</h1> <h1>Ungoogled-Chromium</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/ugc_logo.png" alt="Ungoogled-Chromium logo"> <img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo">
<p> <p>
Ungoogled-chromium is Google Chromium, sans integration with <a href="/articles/google.html">Google</a>. It also features some tweaks to enhance privacy, Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,
control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup> control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup>
</p> </p>
<h2>Spyware Level: <font color="lime">Not Spyware</font></h2> <h2>Spyware Level: <font color="lime">Not Spyware</font></h2>
<p> <p>
Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes
<b><font color="lime">no unsolicited requests</font></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated <b><font color="lime">no unsolicited requests</font></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated
browser based on <a href="/articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it. browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it.
Otherwise <a href="/guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are Otherwise <a href="/guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are
looking for a Chrome-based browser to switch too without taking the time to compile any software. looking for a Chrome-based browser to switch too without taking the time to compile any software.
</p> </p>
<hr> <hr>
@ -36,10 +36,10 @@ looking for a Chrome-based browser to switch too without taking the time to comp
This article was last edited on 11/1/2018 This article was last edited on 11/1/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Unity</h1> <h1>Unity</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/unity_logo.png" alt="unity Logo"> <img src="../images/unity_logo.png" alt="unity Logo">
<p> <p>
Unity is a game engine developed by Unity Technologies SF. Unity is a game engine developed by Unity Technologies SF.
</p> </p>
@ -18,11 +18,11 @@ Unity collects user information and uses it in a dubious and malicious way and i
</p> </p>
<h2>Unity Editor collects user activity</h2> <h2>Unity Editor collects user activity</h2>
<p> <p>
Some users have found that the Unity Editor, left idle for some time, will elicit an email from Unity support Some users have found that the Unity Editor, left idle for some time, will elicit an email from Unity support
asking for a reason for their inactivity.<sup><a href="#1">[1]</a></sup> asking for a reason for their inactivity.<sup><a href="#1">[1]</a></sup>
Unity support have also been known to contact developers suspected to be earning over the $100,000 revenue limit with the gratis Unity Editor (against Unity EULA) to pressure them into purchasing a Pro license. Several of these developers were not active on services, or did not even have accounts on said services, which Unity support claimed to have "discovered" their projects.<sup><a href="#2">[2]</a></sup> Additionally, Unity Editor analytics can no longer be disabled unless users purchase the Pro edition.<sup><a href="#3">[3]</a></sup> Unity support have also been known to contact developers suspected to be earning over the $100,000 revenue limit with the gratis Unity Editor (against Unity EULA) to pressure them into purchasing a Pro license. Several of these developers were not active on services, or did not even have accounts on said services, which Unity support claimed to have "discovered" their projects.<sup><a href="#2">[2]</a></sup> Additionally, Unity Editor analytics can no longer be disabled unless users purchase the Pro edition.<sup><a href="#3">[3]</a></sup>
</p> </p>
<img src="/images/unity_analytics.png" alt="unity data collection UI"> <img src="../images/unity_analytics.png" alt="unity data collection UI">
<h2>Unity games and system data collection</h2> <h2>Unity games and system data collection</h2>
<p> <p>
Many Unity games have been found to report telemetry at first launch and have telemetry enabled by default, sometimes with no option to disable it. With no way to disable data collection, players are left to blacklist the game through their firewall.<sup><a href="#4">[4]</a></sup> Exported Unity projects collect anonymized statistics about a systems hardware configuration to monitor and report to developers which type of devices are used to play their Unity engine games. <sup><a href="#5">[5]</a></sup> Many Unity games have been found to report telemetry at first launch and have telemetry enabled by default, sometimes with no option to disable it. With no way to disable data collection, players are left to blacklist the game through their firewall.<sup><a href="#4">[4]</a></sup> Exported Unity projects collect anonymized statistics about a systems hardware configuration to monitor and report to developers which type of devices are used to play their Unity engine games. <sup><a href="#5">[5]</a></sup>
@ -59,8 +59,8 @@ Unity collects user information and uses it in a dubious and malicious way and i
This article was created on 8/24/2018 This article was created on 8/24/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,14 +1,14 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>uTorrent</h1> <h1>uTorrent</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/utorrent_logo.png" alt="utorrent logo"> <img src="../images/utorrent_logo.png" alt="utorrent logo">
<p> <p>
uTorrent is a proprietary adware BitTorrent client owned and developed by BitTorrent, Inc. uTorrent is a proprietary adware BitTorrent client owned and developed by BitTorrent, Inc.
</p> </p>
@ -35,9 +35,9 @@ should be cited like this: <sup><a href="#1">[1]</a></sup>.
This article was last edited on 8/3/2018 This article was last edited on 8/3/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Vivaldi</h1> <h1>Vivaldi</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/vivaldi_logo.png" alt="vivaldi logo"> <img src="../images/vivaldi_logo.png" alt="vivaldi logo">
<p> <p>
Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy. Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.
</p> </p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>
<p> <p>
Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="/articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users. Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.
</p> </p>
<h3>Vivaldi's developers do not respect your privacy</h3> <h3>Vivaldi's developers do not respect your privacy</h3>
<p> <p>
@ -28,19 +28,19 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
<h3>Addon updates</h3> <h3>Addon updates</h3>
<p> <p>
<BR> <BR>
<img src = "/images/vivaldi_update.png"><BR> <img src = "../images/vivaldi_update.png"><BR>
These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font> These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font>
</p> </p>
<h3>Google Safe Browsing</h3> <h3>Google Safe Browsing</h3>
<p> <p>
<img src = "/images/vivaldi_safebrowsing.png"><BR> <img src = "../images/vivaldi_safebrowsing.png"><BR>
<img src = "/images/vivaldi_threatlist.png"><BR> <img src = "../images/vivaldi_threatlist.png"><BR>
Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu. Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.
</p> </p>
<h3>Phoning home</h3> <h3>Phoning home</h3>
<p> <p>
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, cpu architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img src="/images/vivaldi_piwik.png"> From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, cpu architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img src="../images/vivaldi_piwik.png">
</p> </p>
<h3>Anti-privacy search engine by default</h3> <h3>Anti-privacy search engine by default</h3>
@ -61,12 +61,12 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
<a href="https://matomo.org/download/">Get Matomo</a> <a href="https://matomo.org/download/">Get Matomo</a>
<a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a>
<a href="http://archive.is/q9hOn">[archive.is]</a><br> <a href="http://archive.is/q9hOn">[archive.is]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a> <a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a>
<a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a> <a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a>
<a href="http://archive.li/8Elc9">[archive.li]</a><br> <a href="http://archive.li/8Elc9">[archive.li]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href=" <a href="
https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/ https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
@ -84,9 +84,9 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
This article was created on 11/25/2017 This article was created on 11/25/2017
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,30 +1,30 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>VLC Media Player</h1> <h1>VLC Media Player</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/vlc_logo.png" alt="VLC Media Player Logo"> <img src="../images/vlc_logo.png" alt="VLC Media Player Logo">
<p> <p>
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.
</p> </p>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
<p> <p>
VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy. VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.
</p> </p>
<h3>VLC Media Player has been distributed with spyware programs by third parties</h3> <h3>VLC Media Player has been distributed with spyware programs by third parties</h3>
<p> <p>
While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's web site</a>. While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's web site</a>.
</p> </p>
<h3>VLC Media Player contains some opt-in spyware features</h3> <h3>VLC Media Player contains some opt-in spyware features</h3>
<p> <p>
VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default. VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.
</p> </p>
<img src="/images/vlc_privacy_policy.png" alt="privacy policy"> <img src="../images/vlc_privacy_policy.png" alt="privacy policy">
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
@ -38,8 +38,8 @@ VLC Media player searches through online databases to find complete album covers
This article was last edited on 7/30/2018 This article was last edited on 7/30/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,49 +1,49 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Waterfox</h1> <h1>Waterfox</h1>
<p><a href="https://spyware.neocities.org/articles">Back to catalog</a></p> <p><a href="https://spyware.neocities.o../articles">Back to catalog</a></p>
<img src="/images/waterfox logo.png" alt="Waterfox Logo"> <img src="../images/waterfox logo.png" alt="Waterfox Logo">
<p> <p>
Waterfox is a web browser that is a fork of <a href="/articles/firefox.html">Firefox</a>. Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p> </p>
<h2>Spyware Level: <font color=orange>High</font></h2> <h2>Spyware Level: <font color=orange>High</font></h2>
<p> <p>
Waterfox is a fork of Firefox that claims to be more private and secure Waterfox is a fork of Firefox that claims to be more private and secure
than Firefox. However, Waterfox contains telemetry and shares than Firefox. However, Waterfox contains telemetry and shares
information about you with Mozilla, and has other spyware features. information about you with Mozilla, and has other spyware features.
</p> </p>
<h3>Waterfox connects to spyware services when it is first run</h3> <h3>Waterfox connects to spyware services when it is first run</h3>
<p> <p>
If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably
Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
well as Waterfox's own update service. You can look at a list of these requests well as Waterfox's own update service. You can look at a list of these requests
<a href="https://digdeeper.neocities.org/images/wfox.png">here</a> or a on mirror <a href="/images/wfox.png">here</a>. <a href="https://digdeeper.neocities.o../images/wfox.png">here</a> or a on mirror <a href="../images/wfox.png">here</a>.
</p> </p>
<h3>Waterfox has a communication problem</h3> <h3>Waterfox has a communication problem</h3>
<p> <p>
There has been some controversy over Waterfox's privacy policy<sup><a href="#1">[1]</a></sup>. There has been some controversy over Waterfox's privacy policy<sup><a href="#1">[1]</a></sup>.
At the time of writing, it claims that Waterfox sends "Webpage data At the time of writing, it claims that Waterfox sends "Webpage data
to Google's SafeBrowsing service," meaning that at one point, both Google to Google's SafeBrowsing service," meaning that at one point, both Google
and Waterfox were spying on all of your internet activity. However, and Waterfox were spying on all of your internet activity. However,
according to this reddit thread<sup><a href="#2">[2]</a></sup>, according to this reddit thread<sup><a href="#2">[2]</a></sup>,
this is no longer true: therefore, Waterfox's privacy policy does not this is no longer true: therefore, Waterfox's privacy policy does not
necessarily reflect what information the browser currently collects. necessarily reflect what information the browser currently collects.
The lack of detail and clarity in the privacy policy is also very The lack of detail and clarity in the privacy policy is also very
concerning. For example, in the abovementioned section titled "Webpage concerning. For example, in the abovementioned section titled "Webpage
data to Google's SafeBrowsing service," there are links to a Firefox data to Google's SafeBrowsing service," there are links to a Firefox
Knowledge Base article and Google's privacy policy, neither of which Knowledge Base article and Google's privacy policy, neither of which
actually explain what data is sent by Waterfox to Google. If this were actually explain what data is sent by Waterfox to Google. If this were
still accurate, it would have some serious privacy implications (and still accurate, it would have some serious privacy implications (and
would certainly bump up the spyware rating of this program). An would certainly bump up the spyware rating of this program). An
inaccurate and outdated privacy policy - i.e. one that does not inaccurate and outdated privacy policy - i.e. one that does not
correctly explain what information is being shared - is correctly explain what information is being shared - is
a <font color="red"><b>serious red flag</b></font> for any privacy-conscious user. a <font color="red"><b>serious red flag</b></font> for any privacy-conscious user.
</p> </p>
<h3>Waterfox "phones home" with information about your computer whenever you start it up</h3> <h3>Waterfox "phones home" with information about your computer whenever you start it up</h3>
<p> <p>
@ -60,10 +60,10 @@ Waterfox shares this information with Mozilla and will collect this information
</p> </p>
<h3>Waterfox offers spyware search engines to its users and uses Bing as its default search engine</h3> <h3>Waterfox offers spyware search engines to its users and uses Bing as its default search engine</h3>
<p> <p>
By default Waterfox is using the spyware search engine <a href="/articles/bing.html">Bing</a>. By default Waterfox is using the spyware search engine <a href="../articles/bing.html">Bing</a>.
Why would a privacy-based Web Browser offer this search engine by default? The other offered search engines are not much better- we have the option of searching with Google, Why would a privacy-based Web Browser offer this search engine by default? The other offered search engines are not much better- we have the option of searching with Google,
which also logs your internet searches, and Ecosia, which also logs your internet searches (but it gives them to Bing). Luckily there are some more private search engines offered, which also logs your internet searches, and Ecosia, which also logs your internet searches (but it gives them to Bing). Luckily there are some more private search engines offered,
like StartPage and DuckDuckGo. What is concerning is the additude that the developer of waterfox has towards these spyware search engines: like StartPage and DuckDuckGo. What is concerning is the additude that the developer of waterfox has towards these spyware search engines:
</p> </p>
<p> <p>
<i>"Bing is actually quite good for privacy as well (let's not forget Mozilla even suggested them as a more privacy focused search back in 2009)."</i><sup><a href="#3">[3]</a></sup> <i>"Bing is actually quite good for privacy as well (let's not forget Mozilla even suggested them as a more privacy focused search back in 2009)."</i><sup><a href="#3">[3]</a></sup>
@ -73,9 +73,9 @@ It's very clear that while the browser advertizes itself as very privacy focused
</p> </p>
<h3>Waterfox sends all website notifications through Mozilla's servers</h3> <h3>Waterfox sends all website notifications through Mozilla's servers</h3>
<p> <p>
If you enable notifications on a website, all of those messages will If you enable notifications on a website, all of those messages will
be sent through Mozilla's servers. According to Waterfox's privacy policy<sup><a href="#1">[1]</a></sup>, be sent through Mozilla's servers. According to Waterfox's privacy policy<sup><a href="#1">[1]</a></sup>,
Mozilla cannot see the content of said messages. However, Mozilla will Mozilla cannot see the content of said messages. However, Mozilla will
receive the following information: receive the following information:
</p> </p>
<ul> <ul>
@ -85,61 +85,61 @@ receive the following information:
<li>Senders (which may include specific website providers)</li> <li>Senders (which may include specific website providers)</li>
</ul> </ul>
<p> <p>
So, Mozilla can see who is sending notifications, when these notifications So, Mozilla can see who is sending notifications, when these notifications
are being sent, how many notifications are sent, and how many websites you are being sent, how many notifications are sent, and how many websites you
have enabled notifications on. Waterfox collects all of the above, and have enabled notifications on. Waterfox collects all of the above, and
additionally sees your IP address for each notification sent. additionally sees your IP address for each notification sent.
</p> </p>
<h3>Waterfox is integrated into the "Firefox Accounts" spyware platform</h3> <h3>Waterfox is integrated into the "Firefox Accounts" spyware platform</h3>
<p> <p>
The "Firefox Accounts" platform allows you to sync a lot of sensitive The "Firefox Accounts" platform allows you to sync a lot of sensitive
information, such as your internet history, across all of your devices. information, such as your internet history, across all of your devices.
This is, of course, all being stored on Mozilla's servers.<sup><a href="#4">[4]</a></sup> This is, of course, all being stored on Mozilla's servers.<sup><a href="#4">[4]</a></sup>
This feature This feature
is opt-in spyware, but it should still be mentioned. is opt-in spyware, but it should still be mentioned.
If you don't want your internet history to be uploaded to Mozilla servers, If you don't want your internet history to be uploaded to Mozilla servers,
don't use this feature. don't use this feature.
</p> </p>
<h3>Waterfox is self updating software</h3> <h3>Waterfox is self updating software</h3>
<p> <p>
Self updates are a spyware feature since they are usually ways for the developer of a program to put spyware into their software without presenting it in a prominent way Self updates are a spyware feature since they are usually ways for the developer of a program to put spyware into their software without presenting it in a prominent way
where the user can understand what they are giving up when they download the update. Given Waterfox's bad communication, this is especially likely to happen. where the user can understand what they are giving up when they download the update. Given Waterfox's bad communication, this is especially likely to happen.
</p> </p>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://www.waterfoxproject.org/en-US/privacy/waterfox/">Improve security for users everywhere</a> <a href="https://www.waterfoxproject.org/en-US/privacy/waterfox/">Improve security for users everywhere</a>
<a href="http://web.archive.org/web/20180411175752/https://www.waterfoxproject.org/en-US/privacy/waterfox/">[web.archive.org]</a> <a href="http://web.archive.org/web/20180411175752/https://www.waterfoxproject.org/en-US/privacy/waterfox/">[web.archive.org]</a>
<a href="https://archive.li/ONrR3">[archive.li]</a><br> <a href="https://archive.li/ONrR3">[archive.li]</a><br>
<a name="2">2.</a> <a name="2">2.</a>
<a href="https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">What happened to Waterfox's devotion to user privacy?</a> <a href="https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">What happened to Waterfox's devotion to user privacy?</a>
<a href="http://web.archive.org/web/20180329154241/https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[web.archive.org]</a> <a href="http://web.archive.org/web/20180329154241/https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[web.archive.org]</a>
<a href="https://archive.li/omeK3">[archive.li]</a><br> <a href="https://archive.li/omeK3">[archive.li]</a><br>
<a name="3">3.</a> <a name="3">3.</a>
<a href="http://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">Waterfox and Ecosia - Privacy Concerns</a> <a href="http://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">Waterfox and Ecosia - Privacy Concerns</a>
<a href="https://web.archive.org/web/20180201210222/https://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[web.archive.org]</a> <a href="https://web.archive.org/web/20180201210222/https://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[web.archive.org]</a>
<a href="https://archive.is/smDw6">[archive.is]</a><br> <a href="https://archive.is/smDw6">[archive.is]</a><br>
<a name="4">4.</a> <a name="4">4.</a>
<a href="https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">Access Mozilla Services with Firefox Account</a> <a href="https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">Access Mozilla Services with Firefox Account</a>
<a href="https://archive.li/oDcmj">[archive.li]</a><br> <a href="https://archive.li/oDcmj">[archive.li]</a><br>
<a name="5">5.</a> <a name="5">5.</a>
<a href="https://digdeeper.neocities.org/browsers.html">How to choose a browser for everyday use?</a> <a href="https://digdeeper.neocities.org/browsers.html">How to choose a browser for everyday use?</a>
<a href="http://web.archive.org/web/20180607023304/https://digdeeper.neocities.org/browsers.html">[web.archive.org]</a> <a href="http://web.archive.org/web/20180607023304/https://digdeeper.neocities.org/browsers.html">[web.archive.org]</a>
<a href="http://archive.is/HVj9I">[archive.is]</a><br> <a href="http://archive.is/HVj9I">[archive.is]</a><br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
This article was last edited on 6/2/2018 This article was last edited on 6/2/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body></html> </body></html>

View File

@ -1,34 +1,34 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>WebDiscover</h1> <h1>WebDiscover</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/webdiscover_logo.png" alt="Webdiscover logo"> <img src="../images/webdiscover_logo.png" alt="Webdiscover logo">
<p> <p>
WebDiscover is a web browser made by WebDiscover Media. WebDiscover is a web browser made by WebDiscover Media.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
WebDiscover uses the spyware search engine <a href="/articles/yahoo.html">Yahoo</a> as it's default search engnine, but on it's website it says it uses the spyware WebDiscover uses the spyware search engine <a href="../articles/yahoo.html">Yahoo</a> as it's default search engnine, but on it's website it says it uses the spyware
search engine <a href="/articles/bing.html">Bing</a> as it's default search engine. It is hard to review since every time I run it, search engine <a href="../articles/bing.html">Bing</a> as it's default search engine. It is hard to review since every time I run it,
it messes up MITMproxy so I can't see what it's doing. The privacy policy explains that it collects a large amount of personal information from it's users, so it is at least not a secret that this browser is spyware. This program acts in a very suspicious way and it messes up MITMproxy so I can't see what it's doing. The privacy policy explains that it collects a large amount of personal information from it's users, so it is at least not a secret that this browser is spyware. This program acts in a very suspicious way and
the privacy policy contains a lot of language in it about the use of the information it collects that elevates it the privacy policy contains a lot of language in it about the use of the information it collects that elevates it
to a <b><font color=red>uniquely bad stance on user privacy and use of user information</font></b>, so I would recommend staying far away from it. to a <b><font color=red>uniquely bad stance on user privacy and use of user information</font></b>, so I would recommend staying far away from it.
</p> </p>
<h3>WebDiscover installs itself onto users computers through installer bundling</h3> <h3>WebDiscover installs itself onto users computers through installer bundling</h3>
<p> <p>
WebDiscover is mostly installed through other programs as an opt-out. This means that most users did not want to install this browser, and WebDiscover is mostly installed through other programs as an opt-out. This means that most users did not want to install this browser, and
were tricked into doing it by other software's installer programs. For example<sup><a href="#2">[2]</a></sup>: were tricked into doing it by other software's installer programs. For example<sup><a href="#2">[2]</a></sup>:
</p> </p>
<p> <p>
<a href="/images/wd1.jpg">[1]</a> <a href="/images/wd2.jpg">[2]</a> <a href="/images/wd3.jpg">[3]</a> <a href="/images/wd4.jpg">[4]</a> <a href="../images/wd1.jpg">[1]</a> <a href="../images/wd2.jpg">[2]</a> <a href="../images/wd3.jpg">[3]</a> <a href="../images/wd4.jpg">[4]</a>
<a href="/images/wd5.jpg">[5]</a> <a href="/images/wd6.jpg">[6]</a> <a href="/images/wd7.jpg">[7]</a> <a href="/images/wd8.jpg">[8]</a> <a href="../images/wd5.jpg">[5]</a> <a href="../images/wd6.jpg">[6]</a> <a href="../images/wd7.jpg">[7]</a> <a href="../images/wd8.jpg">[8]</a>
<a href="/images/wd9.jpg">[9]</a> <a href="/images/cdex_bundling.png">[10]</a> <a href="../images/wd9.jpg">[9]</a> <a href="../images/cdex_bundling.png">[10]</a>
</p> </p>
<h3>WebDiscover collects a large amount of information about its users</h3> <h3>WebDiscover collects a large amount of information about its users</h3>
<p> <p>
@ -50,8 +50,8 @@ more concerning:
"We may collect Personal Data and Anonymous Data when you download the Browser. We may also collect Personal Data when you send us information or communications directly. “Personal Data” means data that allows someone to identify or contact you including, without limitation, your name, physical address, electronic mail (email) address, phone number, and credit card information (collectively, your “Personal Data”) for the purposes of recording the transaction when you engage in activities on the Site or through use of the Browser." "We may collect Personal Data and Anonymous Data when you download the Browser. We may also collect Personal Data when you send us information or communications directly. “Personal Data” means data that allows someone to identify or contact you including, without limitation, your name, physical address, electronic mail (email) address, phone number, and credit card information (collectively, your “Personal Data”) for the purposes of recording the transaction when you engage in activities on the Site or through use of the Browser."
</i><sup><a href="#1">[1]</a></sup></p> </i><sup><a href="#1">[1]</a></sup></p>
<p> <p>
So, WebDiscover will profile your computer, and WebDiscover Media will use every oppotunity they get to collect So, WebDiscover will profile your computer, and WebDiscover Media will use every oppotunity they get to collect
information about you. information about you.
</p> </p>
<h3>WebDiscover sells information about it's users</h3> <h3>WebDiscover sells information about it's users</h3>
<p> <p>
@ -61,11 +61,11 @@ more concerning:
"We may share Anonymous Data with selected third parties and business partners..." "We may share Anonymous Data with selected third parties and business partners..."
</i></p> </i></p>
<p> <p>
Confirming that the information that WebDiscover collects about you will be sold to advertisers. Confirming that the information that WebDiscover collects about you will be sold to advertisers.
</p> </p>
<h3>WebDiscover uses your personal information in a malcious way</h3> <h3>WebDiscover uses your personal information in a malcious way</h3>
<p> <p>
WebDiscover sells your information to advertising companies that will send you junk mail seperately from WebDiscover sells your information to advertising companies that will send you junk mail seperately from
WebDiscover's discretion- it also DOES NOT comply with requests to stop contact, and requires you to seperately WebDiscover's discretion- it also DOES NOT comply with requests to stop contact, and requires you to seperately
request each company that it has sold your information to, to stop contacting you. I didn't check if they would comply request each company that it has sold your information to, to stop contacting you. I didn't check if they would comply
with those requests or not. The following quotes from the privacy policy should explain this: with those requests or not. The following quotes from the privacy policy should explain this:
@ -107,9 +107,9 @@ more concerning:
This article was last edited on 8/4/2018 This article was last edited on 8/4/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,20 +1,20 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Yahoo! Search</h1> <h1>Yahoo! Search</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/yahoo_logo.png" alt="Yahoo Logo"> <img src="../images/yahoo_logo.png" alt="Yahoo Logo">
<p> <p>
Yahoo! search is a search engine made by Yahoo. Yahoo! search is a search engine made by Yahoo.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your
internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information) internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)
</p> </p>
<p> <p>
@ -27,8 +27,8 @@ Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not
is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with it's parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is colleted and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#1">[1]</a></sup> is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with it's parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is colleted and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#1">[1]</a></sup>
</p> </p>
<p> <p>
It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that
they fingerprint your computer and so can uniqley identify you no matter what. What is probably happening is that Yahoo will fingerprint your they fingerprint your computer and so can uniqley identify you no matter what. What is probably happening is that Yahoo will fingerprint your
use of it's services, so that you will be tracked through your usage of them, whether you have an account or not. use of it's services, so that you will be tracked through your usage of them, whether you have an account or not.
</p> </p>
<h3>Tracking users</h3> <h3>Tracking users</h3>
@ -67,9 +67,9 @@ is integrated into the "Yahoo Account" spyware platform, which shares all of the
This article was last edited on 8/3/2018 This article was last edited on 8/3/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>YouTube</h1> <h1>YouTube</h1>
<p><a href="/articles">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
<img src="/images/youtube_logo.png" alt="youtube logo"> <img src="../images/"../images/youtube_logo.png" alt="youtube logo">
<p> <p>
YouTube is an American video-sharing website headquartered in San Bruno, California. It is owned by <a href="/articles/google.html">Google</a>. YouTube is an American video-sharing website headquartered in San Bruno, California. It is owned by <a href="../articles/google.html">Google</a>.
</p> </p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p> <p>
@ -24,12 +24,12 @@ YouTube is integrated with Googles suite of advertising technologies and serv
You can find that Google operates tracking domains active on the Youtube page, “pubads.g.doubleclick.net” and “googleads.g.doubleclick.net” in addition to three cookies requested by *.youtube.com. Youtube serves a particular tracking cookie, “VISITOR_INFO1_LIVE” in order to continue monitoring users that have signed out of their account and to continue serving recommended videos related to that session. Of course, while you are logged in to any Google service, Google can track you with absolute precision. <sup><a href="#3">[3]</a></sup> You can find that Google operates tracking domains active on the Youtube page, “pubads.g.doubleclick.net” and “googleads.g.doubleclick.net” in addition to three cookies requested by *.youtube.com. Youtube serves a particular tracking cookie, “VISITOR_INFO1_LIVE” in order to continue monitoring users that have signed out of their account and to continue serving recommended videos related to that session. Of course, while you are logged in to any Google service, Google can track you with absolute precision. <sup><a href="#3">[3]</a></sup>
</p> </p>
<p> <p>
The Youtube app for android additionally uses the Google Firebase Analytics tracker which provides methods for logging events and setting user properties. The full app report finds that the Youtube app employs three trackers and requires 33 permission, 14 of which are considered dangerous such as access to the the users location and contacts. The Youtube app for android additionally uses the Google Firebase Analytics tracker which provides methods for logging events and setting user properties. The full app report finds that the Youtube app employs three trackers and requires 33 permission, 14 of which are considered dangerous such as access to the the users location and contacts.
<sup><a href="#4">[4]</a></sup><sup><a href="#5">[5]</a></sup> <sup><a href="#4">[4]</a></sup><sup><a href="#5">[5]</a></sup>
</p> </p>
<h3>Taking down more private alternatives</h3> <h3>Taking down more private alternatives</h3>
<p> <p>
For some time, a popular Youtube tracking sanitizer, Hooktube.com was a useful resource for accessing Youtube videos without being subjected to Googles surveillance techniques in full. Hooktube was also useful for circumventing region blocking. However, Google, not to be stopped in their spying endeavors, served Hooktubes operators with a cease and desist over their use of the Youtube API. Hooktube was effectively forced to use Youtubes official embedded player if they wished to continue to operate, nullifying Hooktube as a viable means for privately viewing Youtube content.<sup><a href="#6">[6]</a></sup><sup><a href="#7">[7]</a></sup> For some time, a popular Youtube tracking sanitizer, Hooktube.com was a useful resource for accessing Youtube videos without being subjected to Googles surveillance techniques in full. Hooktube was also useful for circumventing region blocking. However, Google, not to be stopped in their spying endeavors, served Hooktubes operators with a cease and desist over their use of the Youtube API. Hooktube was effectively forced to use Youtubes official embedded player if they wished to continue to operate, nullifying Hooktube as a viable means for privately viewing Youtube content.<sup><a href="#6">[6]</a></sup><sup><a href="#7">[7]</a></sup>
</p> </p>
<h3>Youtube Requires non-free JavaScript</h3> <h3>Youtube Requires non-free JavaScript</h3>
<p> <p>
@ -88,9 +88,9 @@ The Youtube app for android additionally uses the Google Firebase Analytics trac
This article was laste updated on 12/12/2018 This article was laste updated on 12/12/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -15,8 +15,8 @@
These pins were created by fans of the site for linking to pages on the site. They're pretty cool, so I thought I would host them. You can download the ones you want These pins were created by fans of the site for linking to pages on the site. They're pretty cool, so I thought I would host them. You can download the ones you want
for your website here: for your website here:
</p> </p>
<a href="https://spyware.neocities.org/articles/discord.html"><img src="/images/discord-no-way-2.gif" alt="Discord? No Way!"></a> <a href="https://spyware.neocities.org/articles/discord.html"><img src="images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
<a href="https://spyware.neocities.org"><img src="/images/osw.jpg" alt="Online Spyware Watchdog"></a> <a href="https://spyware.neocities.org"><img src="images/osw.jpg" alt="Online Spyware Watchdog"></a>
<p> <p>
You can also visit the creator's websites:<br> You can also visit the creator's websites:<br>
<a href="https://floppys-lounge.neocities.org/">https://floppys-lounge.neocities.org/</a><br> <a href="https://floppys-lounge.neocities.org/">https://floppys-lounge.neocities.org/</a><br>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -15,23 +15,23 @@
of writing new articles for writers who don't know about things that can make the articles easier to write and more of writing new articles for writers who don't know about things that can make the articles easier to write and more
accurate. accurate.
</p> </p>
<h2>Common Privacy Policy Pitfalls</h2> <h2>Common Privacy Policy Pitfalls</h2>
<p> <p>
Lots of software today contains a privacy policy - and a great starting point for understanding how a program invades your privacy Lots of software today contains a privacy policy - and a great starting point for understanding how a program invades your privacy
is to read the privacy policy so that you know what kinds of things the developers admit that the software does. However it is a is to read the privacy policy so that you know what kinds of things the developers admit that the software does. However it is a
big mistake to take a privacy policy by its word, as many privacy policies are obfusicated, omit information, or lie. There are big mistake to take a privacy policy by its word, as many privacy policies are obfusicated, omit information, or lie. There are
several common pitfalls that most privacy policies are guilty of: several common pitfalls that most privacy policies are guilty of:
</p> </p>
<h3>Organization-Wide Privacy Policies</h3> <h3>Organization-Wide Privacy Policies</h3>
<p> <p>
This is a common obfusication tactic that many organizations use when writing privacy policies (if you want to give them the This is a common obfusication tactic that many organizations use when writing privacy policies (if you want to give them the
benefit of the doubt, it could be laziness). Instead of writing a privacy policy that explains what kind of information is benefit of the doubt, it could be laziness). Instead of writing a privacy policy that explains what kind of information is
being collected about you for each individual software, a privacy policy is written for all of the software that that company being collected about you for each individual software, a privacy policy is written for all of the software that that company
produces and operates. This obviously makes it very hard to find out what one particular software does, and it means that produces and operates. This obviously makes it very hard to find out what one particular software does, and it means that
understanding the privacy policy and how it applies to the software you are trying to find information about will take longer understanding the privacy policy and how it applies to the software you are trying to find information about will take longer
and will rely on more speculation because of how uncertain the information is. and will rely on more speculation because of how uncertain the information is.
</p> </p>
@ -40,44 +40,44 @@
<p> <p>
This category is where it's more difficult: programs that are not spyware do not have privacy policies- they don't need them if they This category is where it's more difficult: programs that are not spyware do not have privacy policies- they don't need them if they
dont violate your privacy. This is OK but there is a category of programs that do not contain privacy policies but still have privacy dont violate your privacy. This is OK but there is a category of programs that do not contain privacy policies but still have privacy
concerns. You can't take a developers word that their program is not spyware: you have to actually run the program and inspect any kind concerns. You can't take a developers word that their program is not spyware: you have to actually run the program and inspect any kind
of packets it sends out and what features it has. A lot of people have a lot of diffrent ideas about what is and isnt spyware- so you of packets it sends out and what features it has. A lot of people have a lot of diffrent ideas about what is and isnt spyware- so you
might have a developer who thinks that phoning home, etc, isn't a privacy issue that they need to make their users aware of. might have a developer who thinks that phoning home, etc, isn't a privacy issue that they need to make their users aware of.
</p> </p>
<h3>Outdated/Inaccruate Privacy Policies</h3> <h3>Outdated/Inaccruate Privacy Policies</h3>
<p> <p>
Some privacy policies are very outdated and report privacy violations in the program that dont exist anymore, or fail to report new privacy Some privacy policies are very outdated and report privacy violations in the program that dont exist anymore, or fail to report new privacy
violations, just because the developer of the software cannot be bothered to keep his privacy policy up to date. In this case such a violations, just because the developer of the software cannot be bothered to keep his privacy policy up to date. In this case such a
privacy policy should be heavily criticized because it shows that the developer cannot properly communicate to his users the privacy implications privacy policy should be heavily criticized because it shows that the developer cannot properly communicate to his users the privacy implications
of installing his software. So it's really like rolling the dice... who knows what the program will actually do? It's like not having a of installing his software. So it's really like rolling the dice... who knows what the program will actually do? It's like not having a
privacy policy at all, except worse, because it can fool people into thinking that the program does things that it doesn't do. privacy policy at all, except worse, because it can fool people into thinking that the program does things that it doesn't do.
</p> </p>
<p> <p>
Ultimately the take away is that privacy policies are meaningful, but they also can't be the only thing to prove a program's innocence. Ultimately the take away is that privacy policies are meaningful, but they also can't be the only thing to prove a program's innocence.
You have to verify all of the claims made on a privacy policy, and if you can't, you have to doubt them. When a privacy policy is not You have to verify all of the claims made on a privacy policy, and if you can't, you have to doubt them. When a privacy policy is not
enough to make a final decision, you need to use other methods of finding privacy issues in the program. enough to make a final decision, you need to use other methods of finding privacy issues in the program.
</p> </p>
<h2>Checking a program with MITMproxy</h2> <h2>Checking a program with MITMproxy</h2>
<p> <p>
Ultimately the only way to prove and discover what a program is actually doing to invade your privacy is to look at what kinds of Ultimately the only way to prove and discover what a program is actually doing to invade your privacy is to look at what kinds of
network activity it is doing when you run it. A great guide is written about how you can check a program's network activity with network activity it is doing when you run it. A great guide is written about how you can check a program's network activity with
MITMproxy to discover spyware by a writer for this site who has written many of the articles on here. It's linked right here: MITMproxy to discover spyware by a writer for this site who has written many of the articles on here. It's linked right here:
</p> </p>
<a href="https://digdeeper.neocities.org/liftingtheveil.html">Lifting the veil - how to test browsers for spyware.</a> <a href="https://digdeeper.neocities.org/liftingtheveil.html">Lifting the veil - how to test browsers for spyware.</a>
<h2>Citing Sources</h2> <h2>Citing Sources</h2>
<p> <p>
Sources should be cited at the bottom of the article as a list of links, with links to archived versions of these links next to them. Sources should be cited at the bottom of the article as a list of links, with links to archived versions of these links next to them.
There should be at least two archive links, from two diffrent archiving services, but ideally you should provide alterante links to as many There should be at least two archive links, from two diffrent archiving services, but ideally you should provide alterante links to as many
archives as you can. If you can't find an archived version of the page you want to save on a service that allows you to submit a link for archives as you can. If you can't find an archived version of the page you want to save on a service that allows you to submit a link for
archiving, you should submit it and use that. That being said, there is a useful online service that lets you find archived links archiving, you should submit it and use that. That being said, there is a useful online service that lets you find archived links
by searching multiple archive sources for links. <a href="http://timetravel.mementoweb.org/">http://timetravel.mementoweb.org/</a> will usually by searching multiple archive sources for links. <a href="http://timetravel.mementoweb.org/">http://timetravel.mementoweb.org/</a> will usually
automate the process of finding all of these archive links and make citing sources much easier- but it's still important to update web.archive.org automate the process of finding all of these archive links and make citing sources much easier- but it's still important to update web.archive.org
and archive.is copies of these links. and archive.is copies of these links.

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -13,8 +13,8 @@
This guide specifies how the articles on this website classify programs as spyware, and assign scores. Programs given an amount of points for every spyware feature that the program contains and every spyware criteria that the program meets. It is important to note that not every feature and critera is proof that a program is spyware, but proof that the program could be spywre. Since we are holding all programs in contempt, programs that might not be spyware, but cannot be proven to not be spyware, are given spyware scores above 0 (not spyware) until they can be proven to not be spyware. If you want to amend/change this document, please follow the instructions in the <a href="/guides/faq.html">FAQ</a>. This guide specifies how the articles on this website classify programs as spyware, and assign scores. Programs given an amount of points for every spyware feature that the program contains and every spyware criteria that the program meets. It is important to note that not every feature and critera is proof that a program is spyware, but proof that the program could be spywre. Since we are holding all programs in contempt, programs that might not be spyware, but cannot be proven to not be spyware, are given spyware scores above 0 (not spyware) until they can be proven to not be spyware. If you want to amend/change this document, please follow the instructions in the <a href="/guides/faq.html">FAQ</a>.
</p> </p>
<p> <p>
This guide is written in a format where the name of each spyware feature or critera and the number of points given from containing said feature or meeting said critera is written in a header, and then a short description explaining why this feature or criteria is a spyware feature or criteria; and justifying the score given. There are diffrent severities of data collection or potential data collection, so it is important to outline how many points should be given for each type of feature. This document starts out by explaining what types of spyware criterias or features are given what scores, and then lists actual features and criterias and their classifications. This guide is written in a format where the name of each spyware feature or critera and the number of points given from containing said feature or meeting said critera is written in a header, and then a short description explaining why this feature or criteria is a spyware feature or criteria; and justifying the score given. There are diffrent severities of data collection or potential data collection, so it is important to outline how many points should be given for each type of feature. This document starts out by explaining what types of spyware criterias or features are given what scores, and then lists actual features and criterias and their classifications.
</p> </p>
<h2>Types of Spyware Features and Criterias and their scores</h2> <h2>Types of Spyware Features and Criterias and their scores</h2>
<h3>Low Potential For Data Collection - 1</h3> <h3>Low Potential For Data Collection - 1</h3>
<p> <p>
@ -26,7 +26,7 @@ The Spyware Feature or Criteria does not prove that data collection is happening
</p> </p>
<h3>High Potential For Data Collection - 3</h3> <h3>High Potential For Data Collection - 3</h3>
<p> <p>
The Spyware Feature or Criteria does not prove that data collection is happening, but proves that we cannot prove that data collection is not happening. The creators of the software have created spyware programs in the past and/or there is evidence that there may be or is a data collection feature inside of their program, but they have claimed that their software is not using this feature. An example is a known data collection feature in a program that the creators of the program have claimed is no longer active, but have not proven that said feature is no longer active. Another example is software creators who do not claim to include spyware features in their programs, but have failed to disclose spyware features in past programs that they have created. The Spyware Feature or Criteria does not prove that data collection is happening, but proves that we cannot prove that data collection is not happening. The creators of the software have created spyware programs in the past and/or there is evidence that there may be or is a data collection feature inside of their program, but they have claimed that their software is not using this feature. An example is a known data collection feature in a program that the creators of the program have claimed is no longer active, but have not proven that said feature is no longer active. Another example is software creators who do not claim to include spyware features in their programs, but have failed to disclose spyware features in past programs that they have created.
</p> </p>
<h3>Normal Potential Amount of Possible Data Collection - 3</h3> <h3>Normal Potential Amount of Possible Data Collection - 3</h3>
<p> <p>
@ -34,7 +34,7 @@ The Spyware Feature or Criteria proves that data collection is possible, in the
</p> </p>
<h3>High Potential Amount of Possible Data Collection - 10</h3> <h3>High Potential Amount of Possible Data Collection - 10</h3>
<p> <p>
The Spyware Feature or Criteria proves that the program may be accessing an elevated amount of features that normal programs are unable to access. The program may require or ask the user to run it as a superuser (i.e. the program must be run as "root" on Unix-based systems and as "Administrator" on Windows-based systems). The program may install a kernel module or otherwise run in security levels higher than userspace, such as "ring 0". The Spyware Feature or Criteria proves that the program may be accessing an elevated amount of features that normal programs are unable to access. The program may require or ask the user to run it as a superuser (i.e. the program must be run as "root" on Unix-based systems and as "Administrator" on Windows-based systems). The program may install a kernel module or otherwise run in security levels higher than userspace, such as "ring 0".
</p> </p>
<h3>Confirmed Low Amount of Data Collection - 5</h3> <h3>Confirmed Low Amount of Data Collection - 5</h3>
<p> <p>
@ -46,7 +46,7 @@ The Spyware Feature or Criteria proves that the program is collecting an substan
</p> </p>
<h3>Confirmed High Amount of Data Collection - 25</h3> <h3>Confirmed High Amount of Data Collection - 25</h3>
<p> <p>
The Spyware Feature or Criteria proves that the program is collecting a high amount of information on the user. This information can include but is not limited to keylogging, screen capture or any form of screen recording, chat logs, search history, webcam access, filesystem scanning and/or profiling, and recording information from the microphone. The Spyware Feature or Criteria proves that the program is collecting a high amount of information on the user. This information can include but is not limited to keylogging, screen capture or any form of screen recording, chat logs, search history, webcam access, filesystem scanning and/or profiling, and recording information from the microphone.
</p> </p>
</body> </body>
</html> </html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -16,7 +16,7 @@ Spyware is a classification of programs which collect information about their us
<p> <p>
At a glance, this website will give spyware programs a spyware rating and then a summary of why it has that rating, followed by a detailed rationale for giving the program that rating. The ratings that are present on the website right now are: At a glance, this website will give spyware programs a spyware rating and then a summary of why it has that rating, followed by a detailed rationale for giving the program that rating. The ratings that are present on the website right now are:
</p> </p>
<table border background="/images/bg.jpg" style="width:800px"> <table border background="../images/bg.jpg" style="width:800px">
<tr> <tr>
<th>Spyware Rating</th> <th>Spyware Rating</th>
<th>Category Rationale</th> <th>Category Rationale</th>
@ -64,7 +64,7 @@ Articles can be submitted by emailing me at <a href="mailto:spyware@aaathats3as.
</p> </p>
<h2>What language do the submissions need to be in?</h2> <h2>What language do the submissions need to be in?</h2>
<p> <p>
Any language should be fine. Currently there are only English and Spanish articles on the site, but it doesn't matter what language you want to submit articles in. Any language should be fine. Currently there are only English and Spanish articles on the site, but it doesn't matter what language you want to submit articles in.
</p> </p>
<h2>I want to amend/change the style guide and/or the spyware classification guide.</h2> <h2>I want to amend/change the style guide and/or the spyware classification guide.</h2>
<p> <p>
@ -75,7 +75,7 @@ Send an email to me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats
To be able to know if a program has absolutely no spyware features, you have to be able to compile it from source- it does not need to meet any of the other requirements that it would need to meet to be called "Free Software" or "Open Source Software" according to the definitions of the FSF or OSI. So, I don't like to use the words "Free Software" or "Open Source Software" on my website because it implies that a program needs to meet all of the requirements set by those organizations to be called "Free" or "Open" for spyware concerns to be alleviated. If you can compile it from source, that is the only thing needed. To be able to know if a program has absolutely no spyware features, you have to be able to compile it from source- it does not need to meet any of the other requirements that it would need to meet to be called "Free Software" or "Open Source Software" according to the definitions of the FSF or OSI. So, I don't like to use the words "Free Software" or "Open Source Software" on my website because it implies that a program needs to meet all of the requirements set by those organizations to be called "Free" or "Open" for spyware concerns to be alleviated. If you can compile it from source, that is the only thing needed.
</p> </p>
<p> <p>
Although, I don't want to say that just because a program allows you to compile it from source, it isn't spyware. It just ensures that you can be aware of all spyware features, and that there is no spyware hidden inside of a binary blob. Also, programs that do not distribute their sources can be analyzed even though they are only dstributed as binaries, which is in fact how we know about some of the more underhanded spyware features that Steam and Discord have, for example. Although, I don't want to say that just because a program allows you to compile it from source, it isn't spyware. It just ensures that you can be aware of all spyware features, and that there is no spyware hidden inside of a binary blob. Also, programs that do not distribute their sources can be analyzed even though they are only dstributed as binaries, which is in fact how we know about some of the more underhanded spyware features that Steam and Discord have, for example.
</p> </p>
</body> </body>

View File

@ -1,27 +1,27 @@
<!DOCTYPE html> <!DOCTYPE html>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Mozilla Firefox Spyware Mitigation Guide</h1> <h1>Mozilla Firefox Spyware Mitigation Guide</h1>
<p> <p>
<a href="/">Back to Home</a><br> <a href="/">Back to Home</a><br>
<a href="/articles/firefox.html">Back to Firefox</a> <a href="/articles/firefox.html">Back to Firefox</a>
</p> </p>
<img src="/images/firefox_logo.png"> <img src="../images/firefox_logo.png">
<p> <p>
After configuring Mozilla Firefox according to this guide it's rating changes like so: After configuring Mozilla Firefox according to this guide it's rating changes like so:
</p> </p>
<h3>Spyware Rating: <font color="orange">High</font> =&gt; <font color="lime">Not Spyware</font></h3> <h3>Spyware Rating: <font color="orange">High</font> =&gt; <font color="lime">Not Spyware</font></h3>
<p> <p>
Before beginning this guide it is important that you try and cross-reference it with other guides, Before beginning this guide it is important that you try and cross-reference it with other guides,
to see which prespective on this topic is the best way to do it for you. At the bottom of the page are links to see which prespective on this topic is the best way to do it for you. At the bottom of the page are links
to <a href="#Other_Guides">other guides</a> and projects like this one. You should strongly consider this as <b><font color=orange> to <a href="#Other_Guides">other guides</a> and projects like this one. You should strongly consider this as <b><font color=orange>
you may find other guides more useful than this one.</font></b> you may find other guides more useful than this one.</font></b>
</p> </p>
<p> <p>
Mozilla Firefox has a huge amount of spyware features, but they all can be disabled by using predefined profile settings. Mozilla Firefox has a huge amount of spyware features, but they all can be disabled by using predefined profile settings.
@ -32,8 +32,8 @@
<li> Exit. </li> <li> Exit. </li>
</ul> </ul>
Then open your Firefox user profiles directory. It should be located at: Then open your Firefox user profiles directory. It should be located at:
<table border background="/images/bg.jpg" style="width:800px"> <table border background="../images/bg.jpg" style="width:800px">
<tr> <tr>
<th> OS</th> <th> OS</th>
<th> Path</th> <th> Path</th>
@ -204,11 +204,11 @@
</code> </code>
</p> </p>
<p> <p>
If you want to disable OCSP as well, you should also add this to your user.js. These settings are seperated If you want to disable OCSP as well, you should also add this to your user.js. These settings are seperated
because while OCSP is a privacy breach it is also a security feature, and so whether to have it on or off should because while OCSP is a privacy breach it is also a security feature, and so whether to have it on or off should
be thought about before continuing. You can read about OCSP here: <a href="https://scotthelme.co.uk/revocation-is-broken/"> be thought about before continuing. You can read about OCSP here: <a href="https://scotthelme.co.uk/revocation-is-broken/">
https://scotthelme.co.uk/revocation-is-broken/</a> <a href="http://web.archive.org/web/20180831224302/https://scotthelme.co.uk/revocation-is-broken/"> https://scotthelme.co.uk/revocation-is-broken/</a> <a href="http://web.archive.org/web/20180831224302/https://scotthelme.co.uk/revocation-is-broken/">
[web.archive.org]</a> . The problem is, that OCSP is a form of phoning home, and you might not want to make those requests. [web.archive.org]</a> . The problem is, that OCSP is a form of phoning home, and you might not want to make those requests.
</p> </p>
<code> <code>
user_pref("security.ssl.enable_ocsp_stapling", false);<br> user_pref("security.ssl.enable_ocsp_stapling", false);<br>
@ -216,8 +216,8 @@
user_pref("security.OCSP.require", false);<br> user_pref("security.OCSP.require", false);<br>
</code> </code>
<p> <p>
With this installation method, if you change any of user.js settings through about:config or Firefox preferences dialogs, With this installation method, if you change any of user.js settings through about:config or Firefox preferences dialogs,
they will be reset to the user.js defined values after you restart Firefox. they will be reset to the user.js defined values after you restart Firefox.
This makes sure they're always back to secure defaults when starting the browser. This makes sure they're always back to secure defaults when starting the browser.
At the end you need to delete several default plugins in Firefox directory at <code>\Mozilla Firefox\browser\features\</code> that can violate privacy: At the end you need to delete several default plugins in Firefox directory at <code>\Mozilla Firefox\browser\features\</code> that can violate privacy:
</p> </p>
@ -238,11 +238,11 @@
<a name="Other_Guides"></a> <a name="Other_Guides"></a>
<h2>Other Guides</h2> <h2>Other Guides</h2>
<p> <p>
These are other guides and projects to help protect your privacy using Firefox. It's important to look at These are other guides and projects to help protect your privacy using Firefox. It's important to look at
other prespectives instead of reading JUST this guide. So you should be comparing all of the other prespectives instead of reading JUST this guide. So you should be comparing all of the
guides that you can find to hear everyone's ideas about how this should be done, before you guides that you can find to hear everyone's ideas about how this should be done, before you
finish setting Firefox up. Librefox is less of a guide and more of a project and series of tools and settings finish setting Firefox up. Librefox is less of a guide and more of a project and series of tools and settings
you can download to help you make Firefox private. you can download to help you make Firefox private.
</p> </p>
<a href="https://www.privacytools.io/#about_config">Firefox: Privacy Related "about:config" Tweaks</a> <a href="https://www.privacytools.io/#about_config">Firefox: Privacy Related "about:config" Tweaks</a>
<a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a> <a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a>
@ -255,14 +255,14 @@ you can download to help you make Firefox private.
<a href="http://archive.is/Nb6oz">[archive.is]</a><br> <a href="http://archive.is/Nb6oz">[archive.is]</a><br>
<hr> <hr>
<h2>Sources</h2> <h2>Sources</h2>
<p> <p>
<p> <p>
<a name="1">1.</a> <a name="1">1.</a>
<a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a> <a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a>
<a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a> <a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a>
<a href="http://archive.is/GXIBO">[archive.is]</a> <a href="http://archive.is/GXIBO">[archive.is]</a>
<br> <br>
</p> </p>
<hr> <hr>
<p><b> <p><b>
@ -270,8 +270,8 @@ you can download to help you make Firefox private.
This guide was last updated on 12/26/2018 This guide was last updated on 12/26/2018
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body></html> </body></html>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -11,26 +11,26 @@
<a href="/">Back to Home</a><br> <a href="/">Back to Home</a><br>
<a href="/articles/iridium.html">Back to Iridium</a> <a href="/articles/iridium.html">Back to Iridium</a>
</p> </p>
<img src="/images/iridium_logo.jpg"> <img src="../images/iridium_logo.jpg">
<p> <p>
After configuring Iridium according to this guide it's rating changes like so: After configuring Iridium according to this guide it's rating changes like so:
</p> </p>
<h3>Spyware Rating: <font color=yellowgreen>Low</font> => <font color=lime>Not Spyware</font></h3> <h3>Spyware Rating: <font color=yellowgreen>Low</font> => <font color=lime>Not Spyware</font></h3>
<p> <p>
Iridium only has one spyware feature, so the only thing that needs to be removed is google safebrowsing. Iridium only has one spyware feature, so the only thing that needs to be removed is google safebrowsing.
You have to turn off your internet connection or otherwise stop Iridium from connecting to the internet You have to turn off your internet connection or otherwise stop Iridium from connecting to the internet
while you turn it off, so it doesn't make any requests before you opt-out. Then uncheck "protect you and while you turn it off, so it doesn't make any requests before you opt-out. Then uncheck "protect you and
your device from dangerous sites" in the advanced settings menu. your device from dangerous sites" in the advanced settings menu.
</p> </p>
<img src="/images/iridium_disablesb.png" alt="disabling safebrowsing from the advanced settings menu"> <img src="../images/iridium_disablesb.png" alt="disabling safebrowsing from the advanced settings menu">
<hr> <hr>
<p><b> <p><b>
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,33 +1,33 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Pale Moon Browser Spyware Mitigation Guide</h1> <h1>Pale Moon Browser Spyware Mitigation Guide</h1>
<p><a href="/">Back to Home</a><br> <p><a href="/">Back to Home</a><br>
<a href="/articles/palemoon.html">Back to Palemoon</a> <a href="../articles/palemoon.html">Back to Palemoon</a>
</p> </p>
<img src="/images/palemoon_logo.png"> <img src="../images/palemoon_logo.png">
<p> <p>
After configuring Pale Moon according to this guide it's rating changes like so: After configuring Pale Moon according to this guide it's rating changes like so:
</p> </p>
<h3>Spyware Rating: <font color=yellow>Medium</font> => <font color=lime>Not Spyware</font></h3> <h3>Spyware Rating: <font color=yellow>Medium</font> => <font color=lime>Not Spyware</font></h3>
<p> <p>
The first thing to do, after you have downloaded Pale Moon, is to turn off your internet connection. Then The first thing to do, after you have downloaded Pale Moon, is to turn off your internet connection. Then
install the browser and change the homepage to something else. In the "options" dialog: install the browser and change the homepage to something else. In the "options" dialog:
</p> </p>
<img src="/images/pm_hp.png" alt="Pale moon options screen"> <img src="../images/pm_hp.png" alt="Pale moon options screen">
<p> <p>
The next step is to disable update checking, you can do that like this: The next step is to disable update checking, you can do that like this:
</p> </p>
<img src="/images/pm_ud.png" alt="Pale moon options screen"> <img src="../images/pm_ud.png" alt="Pale moon options screen">
<p> <p>
Finally, these settings should be changed in about:config: Finally, these settings should be changed in about:config:
</p> </p>
<table border background="/images/bg.jpg" style="width:800px"> <table border background="../images/bg.jpg" style="width:800px">
<tr> <tr>
<th>Spyware Feature</th> <th>Spyware Feature</th>
<th>about:config flag</th> <th>about:config flag</th>
@ -69,9 +69,9 @@
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), email me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. All contributions must be liscenced under the CC0 liscence to be accepted. If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p> </p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="/images/cc0.png" alt="CC0 Liscence"></a> <a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body> </body>
</html> </html>

View File

@ -1,21 +1,21 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Answers To Common Criticisms Of This Website</h1> <h1>Answers To Common Criticisms Of This Website</h1>
<p> <p>
Sometimes I read criticisims of this website online, where the author finds a reason Sometimes I read criticisims of this website online, where the author finds a reason
to "debunk" or otherwise invalidate (to them) the concerns or evidence that is brought to "debunk" or otherwise invalidate (to them) the concerns or evidence that is brought
up in the articles on this website, when this criticisim does not actually invalidate or up in the articles on this website, when this criticisim does not actually invalidate or
debunk what is discussed in the articles on the website. So, I thought it would be debunk what is discussed in the articles on the website. So, I thought it would be
useful to write a page that lists common criticisims of the website and an adequate useful to write a page that lists common criticisims of the website and an adequate
response to each type of criticisim. Please understand that this page is not meant to response to each type of criticisim. Please understand that this page is not meant to
write off people who have serious criticisms, and of course if you email me with those write off people who have serious criticisms, and of course if you email me with those
you can exect a serious answer back. you can exect a serious answer back.
</p> </p>
<ul> <ul>
<li><a href="#Iknow">"I know that the program does this!"</a></li> <li><a href="#Iknow">"I know that the program does this!"</a></li>
@ -34,7 +34,7 @@ you can exect a serious answer back.
<p> <p>
The obvious response is that just because you KNOW that a program does something doesn't The obvious response is that just because you KNOW that a program does something doesn't
validate what it is doing or sheild it from criticisim. If you KNOW a program is spying on validate what it is doing or sheild it from criticisim. If you KNOW a program is spying on
you, that doesn't change anything about the situation or make it less of a problem. Just you, that doesn't change anything about the situation or make it less of a problem. Just
because you know that a program can do certain things also doesn't mean that other people because you know that a program can do certain things also doesn't mean that other people
know these things too, like someone who has not used the program before and is using the know these things too, like someone who has not used the program before and is using the
articles on this website to evaluate whether he should use that program or not. articles on this website to evaluate whether he should use that program or not.
@ -49,8 +49,8 @@ you can exect a serious answer back.
<p> <p>
But just because you are OK with using spyware, doesn't mean that everyone else is OK with But just because you are OK with using spyware, doesn't mean that everyone else is OK with
that. The articles on this website can only say: "This is what the program is doing.". And, that. The articles on this website can only say: "This is what the program is doing.". And,
it's up to you if you're OK with that or not. Being OK with using spyware might invalidate it's up to you if you're OK with that or not. Being OK with using spyware might invalidate
the criticisims of the spyware for you as an individual. But it doesn't invalidate it for the criticisims of the spyware for you as an individual. But it doesn't invalidate it for
anyone else who might think diffrently about using spyware. anyone else who might think diffrently about using spyware.
</p> </p>
<a name="SpywareDefinition"></a> <a name="SpywareDefinition"></a>
@ -62,7 +62,7 @@ you can exect a serious answer back.
</p> </p>
<p> <p>
The point of the articles are not really the Spyware label that it assigns to everything, but The point of the articles are not really the Spyware label that it assigns to everything, but
rather to raise awareness of features that can be used to invade user privacy. Even if the rather to raise awareness of features that can be used to invade user privacy. Even if the
definition of spyware that this website uses is wider than someone elses definition, that definition of spyware that this website uses is wider than someone elses definition, that
doesn't change the facts about what is happening: it just changes the label we use to describe doesn't change the facts about what is happening: it just changes the label we use to describe
those facts. Instead of thinking about "Is this Spyware?", we should consider: "Is this OK?" those facts. Instead of thinking about "Is this Spyware?", we should consider: "Is this OK?"
@ -70,12 +70,12 @@ you can exect a serious answer back.
<a name="Popularity"></a> <a name="Popularity"></a>
<h2>"Lots of people use this software!"</h2> <h2>"Lots of people use this software!"</h2>
<p> <p>
This criticisim states that because so many people use the software being criticised, that it This criticisim states that because so many people use the software being criticised, that it
is safe to use and is not spyware. is safe to use and is not spyware.
</p> </p>
<p> <p>
This is a very obvious appeal to popularity fallacy- as if the collective "Trust" (ignorance) This is a very obvious appeal to popularity fallacy- as if the collective "Trust" (ignorance)
of a massive userbase changes the facts about what a program is doing to its userbase. The of a massive userbase changes the facts about what a program is doing to its userbase. The
existence of a massive userbase of course changes nothing about the facts about what such a existence of a massive userbase of course changes nothing about the facts about what such a
program is actually doing, and what information it is actually collecting. program is actually doing, and what information it is actually collecting.
</p> </p>
@ -88,12 +88,12 @@ you can exect a serious answer back.
<p> <p>
The question here is whether spyware can be justified by a "really good reason". How else will the The question here is whether spyware can be justified by a "really good reason". How else will the
developer have feature X without it, after all? To anyone who is concerned with their privacy, the answer to developer have feature X without it, after all? To anyone who is concerned with their privacy, the answer to
this is an obvious NO. Just because there are (spyware) features that can be implemented into a program that this is an obvious NO. Just because there are (spyware) features that can be implemented into a program that
require the exposure of user information, this does not justify their implementation into any program. require the exposure of user information, this does not justify their implementation into any program.
</p> </p>
<p> <p>
It's also important to notice that a lot of spyware features are designed in a way where they collect more information It's also important to notice that a lot of spyware features are designed in a way where they collect more information
than they need to collect in order to function. In fact, a lot of these features could function without spying on the than they need to collect in order to function. In fact, a lot of these features could function without spying on the
user! So a lot of the time it's not even a feature that NEEDS spyware to function that is being criticized. user! So a lot of the time it's not even a feature that NEEDS spyware to function that is being criticized.
Lots of developers come up with reasons to implement features into their program that collect way more information Lots of developers come up with reasons to implement features into their program that collect way more information
than needed, either innocently or maliciously, both should be critcized. than needed, either innocently or maliciously, both should be critcized.
@ -101,11 +101,11 @@ you can exect a serious answer back.
<a name="OptingOut"></a> <a name="OptingOut"></a>
<h2>"I can disable this feature!"</h2> <h2>"I can disable this feature!"</h2>
<p> <p>
This criticisim states that because the software can be configured so that the spyware feature being criticised in the This criticisim states that because the software can be configured so that the spyware feature being criticised in the
article is disabled, that this criticisim of the spyware feature is no longer valid. article is disabled, that this criticisim of the spyware feature is no longer valid.
</p> </p>
<p> <p>
This is a very attractive criticisim, to say that it doesn't matter if a program comes with spyware as long as it can all be This is a very attractive criticisim, to say that it doesn't matter if a program comes with spyware as long as it can all be
disabled through configuration. The most important issue is that an opt-out is not acceptable, since it doesn't change the fact that the program does spy on a portion of its userbase that have not opted-out, and that the program is designed to collect information about its users. So even disabled through configuration. The most important issue is that an opt-out is not acceptable, since it doesn't change the fact that the program does spy on a portion of its userbase that have not opted-out, and that the program is designed to collect information about its users. So even
if some minority of users opt-out from the spyware, it is still damaging the privacy of users who don't know about these spyware features. if some minority of users opt-out from the spyware, it is still damaging the privacy of users who don't know about these spyware features.
</p> </p>
@ -118,9 +118,9 @@ you can exect a serious answer back.
</p> </p>
<p> <p>
Even if you can opt-out from certain features, the privacy concerned user won't be aware of many of these features until his privacy has already Even if you can opt-out from certain features, the privacy concerned user won't be aware of many of these features until his privacy has already
been compromised, since most spyware found in modern programs is not explained in any prominent place for a user to understand before they begin been compromised, since most spyware found in modern programs is not explained in any prominent place for a user to understand before they begin
using the software. Lots of programs require the user to block the program from acessing the internet, for example, in order to disable all of the spyware, since to disable the spyware, you have to execute the program, but executing the program will also compromise your privacy... a totally using the software. Lots of programs require the user to block the program from acessing the internet, for example, in order to disable all of the spyware, since to disable the spyware, you have to execute the program, but executing the program will also compromise your privacy... a totally
inadequate chicken-and-egg scenario. inadequate chicken-and-egg scenario.
</p> </p>
</body> </body>

View File

@ -1,7 +1,7 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
@ -9,7 +9,7 @@
<h1>Online Spyware Classification Project Article Style Guide</h1> <h1>Online Spyware Classification Project Article Style Guide</h1>
<p><a href="/">Back to Home</a></p> <p><a href="/">Back to Home</a></p>
<p> <p>
This is a pretty old page, and I don't think it's linked anywhere on the site anymore. If you want a better style guide, look at /articles/example.html and try and This is a pretty old page, and I don't think it's linked anywhere on the site anymore. If you want a better style guide, look at /articles/example.html and try and
follow that in the spirit of this guide. follow that in the spirit of this guide.
</p> </p>
<p> <p>

View File

@ -1,28 +1,31 @@
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang="en">
<head> <head>
<link rel="stylesheet" href="/style.css"> <link rel="stylesheet" href="style.css">
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>Spyware Watchdog</title> <title>Spyware Watchdog</title>
</head> </head>
<body> <body>
<h1>Online Spyware Classification Project</h1> <h1>Online Spyware Classification Project</h1>
<img src="/images/logo.png" alt="The Watchdog - Spyware beware!"> <div class="border">
<p> <h2 class="notice">NOTICE!:</h2>
The goal of this website is to classify spyware programs, so that users can be aware that they are installing spyware. Most modern programs that people use today contain malicious spyware features, such as any form of telemetry or information collection of users. This website contains articles on popular programs and internet services explaining spyware features, so that potential users can be aware of the information they may be giving away by downloading or using spyware, using easy to understand ratings and detailed explanations and proofs of how the features of these programs can spy on the user. <p>Spyware Watchdog is now under the stewardship of the <i>Shadow</i>.<br/>Spyware himself has retired from the role of managing the website.<br>Visit us at the git repo at <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>, or on XMPP in spyware@conference.nuegia.net.</p>
</p> </div>
<h2><a href="/articles">Browse Articles</a></h2> <br>
<a href="/articles/index_es.html">Browse Spanish Articles</a><br> <br>
<a href="http://spywaxy77egeozv2.onion/">Deep Web Mirror</a></br> <img src="images/logo.png" alt="The Watchdog - Spyware beware!">
<a href="/articles/index2.html">Browse Unfinished Articles</a><br> <br>
<a href="/guides/faq.html">Frequently Asked Questions</a><br> <p>The goal of this website is to classify spyware programs, so that users can be aware that they are installing spyware. Most modern programs that people use today contain malicious spyware features, such as any form of telemetry or information collection of users. This website contains articles on popular programs and internet services explaining spyware features, so that potential users can be aware of the information they may be giving away by downloading or using spyware, using easy to understand ratings and detailed explanations and proofs of how the features of these programs can spy on the user.</p>
<a href="extra.html">Extra Content</a><br> <h2><a href="articles/index.html">Browse Articles</a></h2>
<a href="contact.html">Contact</a><br> <a href="articles/index_es.html">Browse Spanish Articles</a><br>
<a href="https://digdeeper.neocities.org">Dig Deeper - A great privacy site made by one of the biggest contributors to this one!</a><br> <a href="http://spywaxy77egeozv2.onion/">Deep Web Mirror</a><br>
<br> <a href="articles/index2.html">Browse Unfinished Articles</a><br>
Original Image by (c) <a href="https://de.wikipedia.org/wiki/Benutzer:Raboe001" class="extiw" title="de:Benutzer:Raboe001">Ra Boe / Wikipedia</a> - <span class="int-own-work" lang="en">Own work</span>, <a title="Creative Commons Attribution-Share Alike 3.0" href="https://creativecommons.org/licenses/by-sa/3.0">CC BY-SA 3.0</a>, <a href="https://commons.wikimedia.org/w/index.php?curid=10400853">Link</a><br> <a href="guides/faq.html">Frequently Asked Questions</a><br>
<p> <a href="extra.html">Extra Content</a><br>
<a href="https://spyware.neocities.org"><img src="/images/osw.jpg" alt="Online Spyware Watchdog"></a> <a href="contact.html">Contact</a><br>
</p> <a href="https://digdeeper.neocities.org">Dig Deeper - A great privacy site made by one of the biggest contributors to this one!</a><br>
</body> <br>
Original Image by (c) <a href="https://de.wikipedia.org/wiki/Benutzer:Raboe001" class="extiw" title="de:Benutzer:Raboe001">Ra Boe / Wikipedia</a> - <span class="int-own-work" lang="en">Own work</span>, <a title="Creative Commons Attribution-Share Alike 3.0" href="https://creativecommons.org/licenses/by-sa/3.0">CC BY-SA 3.0</a>, <a href="https://commons.wikimedia.org/w/index.php?curid=10400853">Link</a><br>
<p><a href="https://spyware.neocities.org"><img src="images/osw.jpg" alt="Online Spyware Watchdog"></a></p>
</body>
</html> </html>

View File

@ -1,15 +1,26 @@
a:link {color:coral; background-color:transparent; text-decoration:underline} a:link {color:coral; background-color:transparent; text-decoration:underline}
a:visited {color:coral; background-color:transparent; text-decoration:underline} a:visited {color:coral; background-color:transparent; text-decoration:underline}
a:hover {color:red; background-color:transparent; text-decoration:underline} a:hover {color:red; background-color:transparent; text-decoration:underline}
sup:hover {text-decoration:none} sup:hover {text-decoration:none}
p { p {
max-width: 800px; max-width: 800px;
}
} li {
li {
max-width: 800px; max-width: 800px;
} }
body{ body {
background: url("/images/blackbg.jpg"); background: url("images/blackbg.jpg");
color: white; color: white;
} }
.notice {
color: coral;
margin-bottom: -0.5em;
margin-top: -0.1em;
}
.border {
display: inline-block;
border: 2px solid coral;
border-radius: 10px;
padding: 1em;
background: black;
}