added experimental branch

This commit is contained in:
anonymous 2020-06-03 21:22:07 -04:00
parent 13f1ea7c89
commit c92e570241
71 changed files with 1226 additions and 1149 deletions

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Bing - Spyware Watchdog</title>
</head>
<body>
<h1>Bing</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/bing_logo.png" alt="Bing logo">
<h1>Bing</h1>
<p>
Bing is a search engine created and owned by Microsoft.
</p>
@ -70,6 +69,7 @@ Bing is a search engine created and owned by Microsoft.
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. "
</i></p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -84,6 +84,8 @@ Bing is a search engine created and owned by Microsoft.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,17 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Outdated Brave - Spyware Watchdog</title>
</head>
<body>
<h1>Brave Browser</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/brave_logo.png" alt="Brave logo">
<h1>Brave Browser</h1>
<h3><font color=red>Note: This article is outdated. I will try to update it soon. </font></h3>
<br>
<p>
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as</P><p><i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup></p><p>, and the built-in privacy protections would seem to agree with that, but let's see how it stacks up when we take everything into account.
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup> With the built-in privacy protections, some would seem to agree with that. Let's see how it stacks up when we take everything into account.
</p>
<h2>Spyware Level: <font color=orange>High</font></h2>
<p>
@ -27,10 +28,15 @@
"Loading a script from an edge-cache does not track a user without third-party cookies or equivalent browser-local storage, which Brave always blocks and always will block. In other words, sending requests and receiving responses without cookies or other means of identifying users does not necessarily create a tracking threat."
</i><sup><a href="#7">[7]</a></sup></p>
<p>
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit, right now, to see just how much information a JavaScript program designed to track you can get. Here are a few:
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit right now, to see just how much information a JavaScript program designed to track you can get.
</p>
<center>
<p>
Here are a few:
<br>
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br>
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a>
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a><br>
</center>
</p>
<h3>Auto-updates</h3>
<p>
@ -42,7 +48,7 @@
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p>
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. <img src="../images/brave_partners.png">Extensions are also updated often.
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. Extensions are also updated often. <img class="screenshot" src="../images/brave_partners.png">
</p>
<h3>Anti-privacy search engine by default</h3>
@ -52,16 +58,17 @@
<h3>Brave's start page contains analytics</h3>
<p>
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page.
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img class="screenshot" src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page.
</p>
<h3>Crash reports</h3>
<p>Enabled by default, but can be disabled from the preferences menu.</p>
<h3>Other requests</h3>
<p>Brave will make a connection to <img src="../images/brave_bat.png"> every time it is started up. It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request: <img src="../images/brave_httpse.png">, which downloads the rulesets for HTTPS Everywhere.</p>
<p>Brave will make a connection to this site every time it is started up: <img class="screenshot" src="../images/brave_bat.png"> It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request which downloads the rulesets for HTTPS Everywhere: <img class="screenshot" src="../images/brave_httpse.png"></p>
<h3>Brave's privacy protections</h3>
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works).
</p>
<hr>
<center>
<h2>Credits</h2>
<p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
@ -111,7 +118,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,13 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Comparison between web browsers - Spyware Watchdog</title>
</head>
<body>
<center>
<h1>Comparison between web browsers</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<p>
This purpose of this article is not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how
@ -98,7 +98,7 @@ going to be better to pick a browser higher on this list.
<td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td>
</tr>
</table>
<h2><font color=red>Shit tier - No Privacy</font></h2>
<h2><font color=red>Rock Bottom - No Privacy</font></h2>
<p>
These browsers are unashamedly designed to collect as much information about the user as possible (all are rated EXTREMELY HIGH by the site). Only SRWare Iron has it's source code availible, and all the developers have mistreated their users (complete disregard for privacy and / or false advertising) for a long time. These browsers are actively hostile against their users and thus should not be used at all.
</p>
@ -135,6 +135,8 @@ going to be better to pick a browser higher on this list.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>CCleaner - Spyware Watchdog</title>
</head>
<body>
<h1>CCleaner</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/ccleaner_logo.png" alt="ccleaner logo">
<h1>CCleaner</h1>
<p>
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.
</p>
@ -23,7 +22,7 @@ where it provides one privacy policy for every single product its company offers
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to
advertisers:
</p>
<img src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
<img class="screenshot" src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
<p>Image Source: <sup><a href="#2">[2]</a></sup></p>
<h3>CCleaner tracks a huge amount of personal information</h3>
@ -69,6 +68,7 @@ where it provides one privacy policy for every single product its company offers
In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#1">[1]</a></sup>
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -92,7 +92,8 @@ In the past, CCleaner has been compromised and backdoors have been added to it.<
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>CDex - Spyware Watchdog</title>
</head>
<body>
<h1>CDex</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/cdex_logo.png" alt="cdex logo">
<h1>CDex</h1>
<p>
CDex is an Open Source Digital Audio CD Extractor.
</p>
@ -25,8 +24,9 @@
CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be.
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users.
</p>
<img src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen">
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen">
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -41,6 +41,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,26 +1,20 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google Chrome - Spyware Watchdog</title>
</head>
<body>
<h1>Google Chrome</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/chrome_es.html">Spanish Translation</a>
<a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[4knomcor76uif5na.onion]</a>
<a href="http://archive.is/JB6Pm">[archive.is]</a>
</p>
<img src="../images/chrome_logo.png" alt="chrome logo">
<h1>Google Chrome</h1>
<center>
<a href="../articles/chrome_es.html">Spanish Translation</a>
</center>
<p>
Google Chrome is a web browser developed and distributed by <a href="../articles/google.html">Google</a>.
</p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p>
This program is spyware because...
</p>
<h3>Google Chrome is not fully open source</h3>
<p>
Large parts of Google Chrome are open source, however not all of them are, and this prevents people from checking the entire software for potential spyware features that are not disclosed.
@ -70,6 +64,7 @@ According to the privacy policy<sup><a href="#1">[1]</a></sup>, Google Chrome pr
Google Chrome has an updater which is constantly running in the background and syncing with Google servers to check for updates. The updater will download and run unverified binaries from Google when it updates Google Chrome. It is impossible for an automatic updater service such as this to verify that the updates are not spyware and/or do not contain additional spyware features.
<p>
<hr>
<center>
<h2>Further Reading</h2>
<p>
<a href="https://stallman.org/google.html">Reasons not to use Google</a>
@ -111,6 +106,8 @@ Google Chrome has an updater which is constantly running in the background and s
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,37 +1,31 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google Chrome - Spyware Watchdog</title>
</head>
<body>
<h1>Google Chrome</h1>
<p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="../articles/chrome.html">English Translation</a><br>
Mirrors:
<a href="https://qorg.xyz/spyware/chrome.html">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/chrome.cgi">[qorglaofrwqdj4is.onion]</a>
<a href="http://archive.is/JB6Pm">[archive.is]</a></p>
<img src="../images/chrome_logo.png" alt="chrome logo">
<h1>Google Chrome</h1>
<center>
<a href="../articles/chrome.html">English Translation</a><br>
</center>
<p>Google Chrome es un navegador web desarollado y distribuido por Google</p>
<h2>Nivel de spyware: <font color=red>EXTREMADAMENTE ALTO</font></h2>
<p>Este programa es spyware porque...</p>
<h3>Google Chrome no es completamente libre</h3>
<p>Muchas partes de Google Chrome son libres, pero no todas de estas lo son. y esto no permite que se compruebe que no es spyware</p>
<h3>Google Chrome rastrea el historial</h3>
Google Chrome contiene mucho spyware que responden en el historial de la busqueda de usuario. Esto es confirmado en la política de privacidad de Google Chrome<sup><a href="#1">[1]</a></sup><br>
<p> Google Chrome contiene mucho spyware que responden en el historial de la busqueda de usuario. Esto es confirmado en la política de privacidad de Google Chrome<sup><a href="#1">[1]</a></sup><br>
<p>La primera caracteristia de spyware de Chrome es la integración con la "Cuenta de Google" (Que es spyware en si). Explica que: "<i>Cuando buscas usando la barra de direccion de google, los caracteres que has escrito (incluso si no has pulsado enter todavia) son enviados a tu motor de busqueda. Si Google es tu motor de busqueda por defecto, las predicciones estan basadas en tus busquedas</i>
</p>
<br>
<p>
Encima tiene otro spyware llamado "Asistencia de naveegacion" que dice que "Cuando no puedes conectarte a una página web, puedes obtener sugerencias para páginas alternativas (Vamos, que Google Chrome envía la dirección a la que has intentado entrar para darte otra</p>
<b>Google Chrome recopila el uso de tu ordenador</b>
Encima tiene otro spyware llamado "Asistencia de naveegacion" que dice que "Cuando no puedes conectarte a una página web, puedes obtener sugerencias para páginas alternativas (Vamos, que Google Chrome envía la dirección a la que has intentado entrar para darte otra
<b>Google Chrome recopila el uso de tu ordenador</b></p>
<p>En la política de privacidad <sup><a href="#1"[1]></a></sup> Google admite el estupidamente alto spyware llamado "Estadisticas de uso y reportes de errores fatales" Lo que hace es recopilar (y enviar) informacion de tu ordenador extremadamente especifica sobre tu hardware y el uso de tu ordenador, y obviamente, tiene esto
<ul>
@ -59,6 +53,7 @@ Google Chrome contiene mucho spyware que responden en el historial de la busqued
Google Chrome tiene un actualizador que constantemente va en segundo plano y sincronizandose con los servidores de Google en busca de actualizaciones. Esto lo que hace es descargar y abrir los binarios no verificados cada vez que Google actualiza Chrome. Es imposible para un software con actualizaciones automaticas verificar si es o no spyware
</p>
<hr>
<center>
<h2>Mas cosas</h2>
<p>
<a href="https://stallman.org/google.html">Reasons not to use Google</a>
@ -102,6 +97,8 @@ Google Chrome contiene mucho spyware que responden en el historial de la busqued
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Catalog</a><br>
</center>
</body>
</html>

View File

@ -1,20 +1,16 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Discord - Spyware Watchdog</title>
</head>
<body>
<h1>Discord</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/discord_es.html">Spanish Translation</a>
<a href="https://qorg.xyz/spyware/discord.cgi">[qorg.xyz]</a>
<a href="https://qorglaofrwqdj4is.onion/spyware/discord.cgi">[qorglaofrwqdj4is.onion]</a>
<a href="http://web.archive.org/web/20181118194244/https://qorg.xyz/spyware/discord.cgi">[web.archive.org]</a>
<a href="http://archive.is/7T29F">[archive.is]</a></p>
<img src="../images/discord_logo.png" alt="Discord-Logo">
<h1>Discord</h1>
<center>
<a href="../articles/discord_es.html">Spanish Translation</a>
</center>
<p>
Discord is an instant messaging application for MacOS, Windows, Linux,
Android, and iOS. Discord is used to communicate via voice chat and
@ -26,7 +22,7 @@ text chat, and has image-sharing and file-sharing capabilities.
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated.
</font><br>
</p>
<a href="https://spyware.neocities.o../articles/discord.html"><img src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
<p>
Discord is spyware because it collects all information that passes
through its communication platform. As Discord is a centralized
@ -111,7 +107,7 @@ turned off. Discord did <font color=lime><b>NOT</b></font> log all of the proces
However when setting the "Display currently running game as a status message" turned on, the behavior
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here:
</p>
<img src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon">
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon">
<p>
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to
@ -121,14 +117,14 @@ described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that beh
<p>
Discord shows this in it's privacy option here:
</p>
<img src="../images/discord_data.png" alt="Discord process logging usefulness">
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness">
<p>
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware),
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build
a statistical model of what programs you might buy/lisence in the future.</b></font>
</p>
<img src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising">
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising">
<h3>Discord tries to force some users to give their Telephone numbers</h3>
<p>
@ -136,7 +132,7 @@ Discord will lock users out of it's service and will not allow them to continue
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out
users isn't known.
</p>
<img src="../images/discord_verify.png" alt="discord phone verification">
<img class="screenshot src="../images/discord_verify.png" alt="discord phone verification">
<h3>Discord receives government requests for your information</h3>
<p>
@ -174,6 +170,7 @@ it probably will be forced to liquiate this asset.
</p>
<hr>
<center>
<h2>Further Reading</h2>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
@ -240,5 +237,8 @@ it probably will be forced to liquiate this asset.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body></html>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -12,178 +12,98 @@
<a href="../articles/discord.html">English Translation</a>
</center>
<p>
Discord es una aplicación de mensajería instantánea disponible para MacOS, Windows, Linux,
Android y iOS. Discord es utilizado principalmente para comunicación por voz y chat
de texto. También tiene soporte para compartir archivos.
Discord es un programa de mensajería instantanea disponible para MacOS, GNU/Linux, Android, Windows, Android e iOS.
Discord puede usarse para comunicarse vía voz y chat de texto, también se puede usar para compartir archivos e imágenes.
</p>
<h2>Nivel de Spyware: <font color="red">EXTREMADAMENTE ALTO</font></h2>
<p>
<font color="lightgreen">
Gracias a Richard Stallman por citar este artículo <a href="https://stallman.org/discord.html">aquí</a>. La mención es muy apreciada.
</font><br>
</p>
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
Discord es spyware por que recolecta toda la información que pasa por su plataforma de comunicacón. Discord es una plataforma de comunicaión centralizada, todas las comunicaciones deben ir por los servidores oficiales de Discord. Donde toda la información puede ser grabada, la gran mayoría de la información dada esta confirmada. Taén se ha confirmado que Discord usa mas spyware como formas de telemetría. La mayor fuente de ingresos de discord, que ha recibido $129 millones de dolares. Discord no puede ser compilado por que no es un programa libre.
<p>
Discord es spyware porque recoge casi toda la información que pasa por su
plataforma de comunicación. Como Discord funciona con un modelo centralizado,
todas las comunicaciones deben pasar por sus servidores oficiales, donde la
información de los usuarios puede ser recopilada. Se ha confirmado que de hecho,
la gran mayoría de las comunicaciones entre usuarios son grabadas. También se
ha confirmado que Discord contiene otras formas de spyware como telemetría. Por ahora
se sabe que la principal fuente de ingresos de Discord es la inversión, de la que ha
recibido más de $279.3 millones de dólares<sup><a href="#4">[4]</a></sup>. Discord es
software privativo y no puede ser construído desde su código fuente.
Discord no hace su código fuente disponible.
</p><p>
Es imposible descargar y examinar el código fuente de Discord, lo que hace imposible probar queDiscord no es spyware. Cualquier programa que no haga su código fuente disponible es potencialmente spyware
</p><p>
Discord confirma que recolecta varia información de los usuarios.
</p>
<h3>Discord no hace público su código fuente</h3>
<h3>Discord does not make its source code available</h3>
<p>
Es imposible descargar y examinar el código fuente de Discord, lo que significa
que es imposible probar que Discord no es spyware. De hecho, cualquier programa
que no haga público su código fuente puede ser considerado spyware potencial.
</p>
<h3>Discord ha confirmado que recolecta datos sensibles de sus usuarios</h3>
<p>
Discord confirma explícitamente en su Política de Privacidad<sup><a href="#1">[1]</a></sup> que recopila la siguiente información:
It is impossible to download and examine Discord's source code,
which means that it is impossible to prove that Discord is not
spyware. Any program which does not make its source code available is
potential spyware.
</p>
<h3>Discord confirma en su política de privacidad <sup><a href="#1">[1]</a></sup> que recolecta la siguiente información</h3>
<ul>
<li>Direcciones IP</li>
<li>Identificadores únicos del dispositivo</li>
<li>Correos electrónicos</li>
<li>Todos los mensajes de texto</li>
<li>Todas las imágenes</li>
<li>Datos VoIP (las conversaciones de voz)</li>
<li>Estadísticas basadas en correos electrónicos de Discord</li>
<li> Direccion IP
<li> UUID del dispositivo
<li> E-Mail del usuario
<li> Todos los mensajes de texto
<li> Todas las imagenes
<li> Todas los mensajes de voz (Las llamadas)
<li> Los E-mails mandados por discord
</ul>
<p>
Además, Discord no confirma que recopila la siguiente información, pero se sabe que por defecto es recopilada:
Discord no confirma que recolecta esta informacion, pero lo hace
</p>
<ul>
<li>Un registro de todos los programas abiertos en tu ordenador</li>
<li>Lista de todos los programas que estan abiertos en tu ordenador
</ul>
<p>
Toda la información anteriormente mencionada
podría estar siendo registrada por lo siguiente: Al recoger
tu dirección IP, Discord puede rastrear tu localización aproximada (la precisión
depende de tu país). Discord también puede saber qué dispositivos usas, ya que
los identifica de forma única, y también sabe cuán seguido los utilizas, ya que
analiza tus hábitos de uso (Discord siempre se está ejecutando en segundo plano para
poder recibir mensajes). Discord también sabe todas las interacciones que realizas
con otros usuarios porque registra todas tus conversaciones de texto y voz, así como
las imágenes que envías. Por lo tanto, ninguna de tus conversaciones en Discord
es privada. Su Política de Privacidad es muy explícita y contiene frases como "incluyendo,
pero no limitándose a...", lo que es una confirmación de que su aplicación de mensajería
contiene más spyware del que mencionan, el cual no es notificado al usuario.
La siguiente información puede usarse para:
Saber donde vives (El pais exacto)
Discord puede decir exactamente en que dispositivo estás
Puede saber todo lo que hace (Pues incluso en movil, discord corre en segundo plano, para recibir mensajes)
Discord tambien recolecta la información que le pasas a otros usuarios. Esto significa que Discord puede ver los mensajes, imagenes, y archivos enviados.
En otras palabras, ninguna conversacion mantenida en discord es privada.
</p>
<h3>Discord se integra con otras plataformas de spyware</h3>
<h3>Discord tambien tiene integración con otras plataformas de Spyware</h3>
<p>
Discord contiene una caracterísitca conocida como "integración con redes sociales".
Esto permite al usuario sincronizar su identidad en Discord con su identidad
en otras plataformas, como Facebook y Twitter. En la Política de Privacidad de
Discord<sup><a href="#1">[1]</a></sup>, se confirma que si optas por usar esta
característica, Discord obtendrá un nivel de acceso no revelado a tu información en
las redes sociales que elijas sincronizar.
Discord contiene "opt-in" conocido como "Integración con redes sociales" Esto hace que Discord sepa de tu identidad.
Plataformas como Facebook y Twitter, en su politica de privacidad. Discord confirma que si lo vinculas a el mismo, Discord obtendrá datos de tus redes sociales.
</p>
<h3>Discord obtiene un listado de procesos en tu dispositivo</h3>
<h3>Discord contiene un listado de procesos.</h3>
<p>
Discord monitorea los procesos abiertos en tu sistema operativo.
Esta forma de spyware se conoce como "<i>process logger</i>" en inglés, y
es usada generalmente para recopilar tus hábitos de uso. Esto fue confirmado por
el mismo Director de Tecnología (CTO) de Discord en un hilo de Reddit.<sup><a href="#2">[2]</a></sup>
En ese hilo, el CTO mencionó que esta característica espía es obligatoria para
brindar varios servicios de la plataforma. Según el CTO y un ingeniero de Discord,
los listados de procesos en los dispositivos de los usuarios no son registrados.
Está confirmado que discord tiene un monitor para ver los procesor que que corren en tu sistema operativo. Este spyware es conocido como "Listador de procesos"
Se usa mas que nada para grabar tus habitos de uso de programas.
</p>
<p>
Se llevó a acabo un procedimiento para probar si Discord de verdad no registra los procesos. Esto fue hecho usando
procmon el día 4 de abril de 2019, y las opciones de Discord
"Usar mis datos para personalizar mi experiencia" y "Mostrar el juego en curso como una notifación" fueron
desactivadas. Resultó que Discord <font color=lime><b>NO</b></font> registró todos los procesos con esa configuración.
Sin embargo, cuando la opción "Mostrar el juego en curso como una notifación" fue activada, el comportamiento
descrito en <sup><a href="#2">[2]</a></sup> fue replicado. Puedes ver el comportamiento del process logger aquí:
Esto ha sido confirmado por el CTO de Discord en un hilo de Reddit<sup><a href="#2">[2]</a></sup>
En el mismo hilo, el CTO admite que es obligatorio este spyware y no puede ser removido. El CTO y un ingeniero de Discord dice que no es spyware, pero no puede ser confirmado.
</p>
<img class="screenshot" src="../images/discord_process_logging.png" alt="Listado de procesos de Discord como se mencionó en [2], confirmado por procmon">
<h3>La mayoria de ingresos de discord viene de vender datos.</h3>
<p>
Así que esta característica de spyware <font color=lime><b>puede ser deshabilitada en Discord.</b></font> Sin embargo, por la
naturaleza del software privativo, no es posible saber cuánta información es enviada a los servidores de Discord cuando
el process logger está activado, pero al menos se puede desactivar.
</p>
<h3>Discord usa el listado de procesos para fines publicitarios</h3>
<p>
Discord lo muestra así aquí:
</p>
<img class="screenshot" src="../images/discord_data.png" alt="Uso de los procesos que Discord recopila">
<p>
Los procesos de los dispositivos de los usuarios que Discord registra en sus servidores son usados como una forma
de telemetría (spyware), y eso resuelve la especulación de por qué el process logger existe en primer lugar. Discord
confirma que esta característica es usada para mostrar publicidad a los usuarios.<sup><a href="#8">[8]</a></sup> Lo que
lleva a la conclusión de que <font color=red><b>Discord recopila tus programas abiertos para construir modelos estadísticos
sobre qué programas te interesan y podrías comprar en el futuro</b></font>
</p>
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirma que tus procesos son usados para publicidad">
Discord esta esclusivamente confiado en la informacion que los usuarios generan. Esto significa que la mayor fuente de ingresos es recolectar datos de usuarios, otras fuentes son secundiaria. Discord tiene 4,2 millones de usuarios en su plataforma<sup><a href="#3">[3]</a></sup> sin otras inversiones, esto es casi toda el dinero generado por la mineria de datos de sus usuarios, discord tiene $129 millones de dolares en inversion <sup><a href="#4">[4]</a></sup> desde 2012. Discord tiene 45 millones de usuario, por lo que pueden recolectar MUCHISIMOS datos. El "Principal" medio de llegada de Ingresos de discord es Nitro<sup><a href="#5">[5]</a></sup> realisticamente, no puede ser la principal
fuente de ingresos de discord, especialmente por que Nitro es relativamente reciente.</p>
<h3>Discord intenta forzar a sus usuarios a dar sus números de teléfono</h3>
<h3>Discord recibe peticiones de gobierno para tu informacion</h3>
<p>
Discord bloqueará a los usuarios y no los dejará continuar usando sus servicios si ellos no dan su número de teléfono o
contactan al servicio a cliente de Discord. Este tipo de características están diseñadas para extraer información sensible
de los usuarios (en este caso, sus números de teléfono). La razón por la que bloquean a los usuarios no se sabe.
Discord ha confirmado de una de sus correspondencia de E-mail <sup><a href="#6">[6]</a></sup> donde confirma que recibe peticiones del gobierno de informacion, asi que podemos saber que el gobierno tiene toda la informacion que Discord ha recolectado de ti <a href="https://spyware.neocities.org/images/discord%20government%20requests.png">aqui</a>
por si el link muere.
</p>
<img class="screenshot" src="../images/discord_verify.png" alt="Verificación por móvil de Discord">
<h3>Discord recibe solicitudes gubernamentales para acceder a tu información</h3>
<p>
Discord confirmó en un email<sup><a href="#6">[6]</a></sup> que recibe solicitudes gubernamentales para
obtener información. De esta forma sabemos que los gobiernos tienen acceso potencial a toda
la información que Discord recopila sobre ti. Puedes leer una copia del email <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">aquí</a> en caso de que el enlace original sea borrado.
</p>
<hr>
<h2>Especulación sobre el futuro de Discord</h2>
<p>
No se sabe si Discord está o no vendiendo información. Actualmente Discord ha sido capaz de recaudar
capital de inversión, lo que ha estado cubriendo todos sus costos de operación. Sin embargo, Discord, como
cualquier otra compañía, no existirá en un constante estado de dependencia de la inversión.
Discord, tarde o temprano, tendrá que moverse de su actual modelo de negocios a otro que genere ingresos
valiéndose de los usuarios de su plataforma.
</p>
<p>
Por ahora Discord tiene varias formas de hacer dinero. Puede vender características
con Discord Nitro<sup><a href="#5">[5]</a></sup>, o puede hacer dinero con su tienda de juegos que
compite con <a href="../articles/steam.html">Steam</a>. Sin embargo, esas dos fuentes de ingresos no
podrían ser suficiente. Discord ha recaudado $279.3 millones de dólares para mantener
su plataforma<sup><a href="#4">[4]</a></sup>, así tiene que generar más que esa cantidad.
</p>
<p>
Si Discord no es capaz de satisfacer su obligación con sus inversores, tiene la opción de vender datos de los
usuarios a anunciantes, y de hecho, ya está minando datos de los usuarios para su sistema de recomendaciones<sup><a href="#8">[8]</a></sup>, lo que significa que ya está construyendo una base datos valiosa y lucrativa para los anunciantes. Discord tiene
130 millones de usuarios<sup><a href="#7">[7]</a></sup>, así que puede producir modelos estadísticos de los juegos
que cada usuario posee, juega y quiere jugar/comprar. Esa es información increíblemente valiosa que Discord podría
vender en caso de no poder cumplir con sus obligaciones con los inversores. Sin embargo, si su tienda se vuelve
existosa, podría no tener necesidad de vender datos, pero si se mete en problemas financieros, es muy probable que se
vea forzada a vender datos.
</p>
<hr>
<center>
<h2>Enlaces de interés</h2>
<h2>Mas cosas</h2>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/"><i>Friends Don't Let Friends Use Discord</i></a>
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
<a href="https://archive.is/Q4N9J">[archive.is]</a><br>
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"><i>Help Me, Tom's Guide: Is Discord Tracking Me?</i></a>
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0"><i>Why Discord is Trash</i></a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU"><i>Why You Shouldn't Use Discord</i></a><br>
<a href="http://subvert.pw/res/discord.pdf"><i>THE DISCORD SITUATION</i></a>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br>
<hr>
<h2>Referencias</h2>
<p>
<a name="1">1.</a>
<a href="https://discordapp.com/privacy"><i>Discord Privacy Policy</i></a>
<a href="https://discordapp.com/privacy">Discord Privacy Policy</a>
<a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a>
<a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a><br>
<a name="2">2.</a>
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"><i>Why is Discord recording our open programs and uploading them?</i></a>
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a>
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a>
<a href="https://archive.li/qFcQA">[archive.is]</a><br>
@ -202,32 +122,15 @@ vea forzada a vender datos.
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="6">6.</a>
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"><i>Discord receives government requests. No plans on adding E2E Encryption any time soon.</i></a>
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a>
<a href="https://archive.is/JrdJ9">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br>
<a name="7">7.</a>
<a href=" https://www.statista.com/statistics/746215/discord-user-number/"><i>Number of registered Discord users</i></a>
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br>
<a name="8">8.</a>
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911"><i>Data Privacy Controls</i></a>
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br>
</p>
<hr>
<p><b>
Este artículo fue traducido al español de la versión original en inglés el día 22/5/2019 (m/d/y: 5/22/2019). Al ser una traducción,
puede quedar desactualizada en cualquier momento.
</b></p>
<p><b>
This article was last edited on 4/11/2019
</b></p>
<p><b>
This article was created on 11/23/17
This article was created on 11/18/2018<br>
This is a translation of the english article. It may become outdated- compare the dates on both articles.
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.

View File

@ -1,15 +1,15 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Dissenter - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Dissenter</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<p>
<img src="../images/dissenter_logo.png" alt="Dissenter Logo">
<h1>Dissenter</h1>
<p>
Dissenter is a web browser and plugin released by the social network company Gab.
</p>
@ -26,19 +26,21 @@ habits than the current alternatives that already exist.
<p>
When the Dissenter Browser is started, it will make several connections to Brave's autoupdate services:
</p>
<img src="../images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave">
<img class="screenshot" src="../images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave">
<p>
Every once in a while, the Browser will send a request to Brave's instance of the Google safebrowsing service:
</p>
<img src="../images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave">
<img class="screenshot" src="../images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave">
<p>
<p>
Whenever the Dissenter extension is opened, it will phone home to several companies:
</p>
<img src="../images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home">
<img class="screenshot" src="../images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home">
<center>
<p>
This includes:
</p>
</center>
<ul>
<li>Google</li>
<li>Twitter</li>
@ -46,9 +48,11 @@ Every once in a while, the Browser will send a request to Brave's instance of th
<li>FontAwesome</li>
<li>Cloudflare</li>
</ul>
<center>
<p>
This happens every time the extension is opened.
</p>
</center>
<h3>Opt-out telemetry</h3>
<p>
Dissenter will sent crash reports to Gab automatically. This is on by default and you have to opt-out.
@ -66,7 +70,7 @@ Every once in a while, the Browser will send a request to Brave's instance of th
is correctly blocked by Shields when a normal website tries to access it, but this connection is not blocked when Dissenter accesses it...
This is an interesting double standard when it comes to privacy.
</p>
<img src="../images/sheilds_blocking.png">
<img class="screenshot" src="../images/sheilds_blocking.png">
<hr>
<h2>Inherent issues with Dissenter</h2>
<p>
@ -79,6 +83,7 @@ Every once in a while, the Browser will send a request to Brave's instance of th
articles you looked at or what discussions you tried to have. If we only consider privacy, this method is a somewhat better way of acheiving this goal.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -93,8 +98,8 @@ Every once in a while, the Browser will send a request to Brave's instance of th
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,15 +1,18 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>DuckDuckGo - Spyware Watchdog</title>
</head>
<body>
<h1>DuckDuckGo</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/duckduckgo_es.html">Spanish Translation</a></p>
<img src="../images/ddg_logo.png" alt="DuckDuckGo logo">
<h1>DuckDuckGo</h1>
<center>
<p>
<a href="../articles/duckduckgo_es.html">Spanish Translation</a>
</p>
</center>
<p>
DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck Go, Inc.
</p>
@ -36,6 +39,7 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
Whenever you use DuckDuckGo, several requests will be sent to this domain.<sup><a href="#4">[4]</a></sup> This is of course not the kind of behavior that you would expect from a privacy concerned website, but there it is. Do you trust DuckDuckGo to collect "anonymous" analytics about you?
</p>
<hr>
<center>
<h2>Futher Reading</h2>
<p>
<a href="https://8ch.net/tech/ddg.html">/tech/ FAQs - DuckDuckGo</a>
@ -76,6 +80,8 @@ DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>DuckDuckGo - Spyware Watchdog</title>
</head>
<body>
<h1>DuckDuckGo</h1>
<p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="../articles/duckduckgo.html">English Translation</a></p>
<img src="../images/ddg_logo.png" alt="">
<h1>DuckDuckGo</h1>
<center>
<p><a href="../articles/duckduckgo.html">English Translation</a></p>
</center>
<p>DuckDuckGo es un motor de busqueda creado por Gabriel Weinberg y mantenido or Duck Duck Go, inc</p>
<h3>Nivel de spyware: <font color=greenyellow>Posiblemente spyware</font></h3>
<p>DuckDuckGo es un motor de busqueda que jura proteger la privacidad de sus usuarios <sup><a href="#1">[1]</a></sup>debido a que es un servicio sentralizado, no es posible saber si es spyware viendo la tecnologia que usa. hay algunos avisos para dudar si es realmente privado. Este artículo es solo para hacerte decidir si usar o no este servicio. Ultimamente no hay prueba de que DuckDuckGo es spyware. Pero hay algunas razones para sospechar de ser spyware, de todas formas, esta bien saber de que DuckDuckGo <b><font color=lime>Ofrece un dominio onion</font></b> asi que no debes dudar en usarlo si estás en TOR</p>
@ -19,7 +19,8 @@
<h3 style="color:red;">DuckDuckGo ha violado su política de privacidad en el pasado</h3>
<p>Se sabe que DuckDuckGo no ha cumplido con su política de privacidad en el pasado <sup><a href="#2">[2]</a></sup>Si un servicio no puede seguir su propia política de privacidad, entonces no puedes esperar que protegan tu privacidad</p><h3>Seguimiento de pixeles y otro spyware</h3>
<p>DuckDuckGo usa gifs en blanco para el dominio improving.duckduckgo.com esta es una técnica de seguimiento que puede ser usada para recolectar estadísticas de tu navegador. En cualquier caso, si usas DuckDuckGo enviara varias peticiones a ese dominio<sup><a href="#4">[4]</a></sup>Esto no es, por supuesto, el tipo de comportamiento que esperas de un servicio que jura proteger tu privacidad</p>
<hr>
<center>
<h2>Mas</h2>
<p>
<a href="https://8ch.net/tech/ddg.html">/tech/ FAQs - DuckDuckGo</a>
@ -57,7 +58,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Internet Explorer - Spyware Watchdog</title>
</head>
<body>
<h1>Internet Explorer</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/ie_logo.png" alt="Internet Explorer Logo">
<h1>Internet Explorer</h1>
<p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p>
@ -36,6 +35,7 @@ Internet Explorer has the spyware feature commonly referred to as "location serv
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -52,6 +52,8 @@ Internet Explorer has the spyware feature commonly referred to as "location serv
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Falkon - Spyware Watchdog</title>
</head>
<body>
<h1>Falkon</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/falkon_logo.png" alt="falkon Logo">
<h1>Falkon</h1>
<p>
Falkon is a KDE web browser using QtWebEngine rendering engine, previously known as QupZilla.
</p>
@ -24,14 +23,17 @@ Falkon is a KDE web browser using QtWebEngine rendering engine, previously known
locally stored because it does not create any requests when I go to it normally. I don't know what these are for.
Maybe it's a form of phoning home? The first IP is for the domain: github.map.fastly.net which seems to be part of a CDN.
</p>
<img src="../images/falkon_firstrun.png" alt="Is falkon phoning home?">
<img class="screenshot" src="../images/falkon_firstrun.png" alt="Is falkon phoning home?">
<hr>
<center>
<p><b>
This article was last edited on 8/24/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,23 +1,22 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Firefox - Spyware Watchdog</title>
</head>
<body>
<h1>Mozilla Firefox</h1>
<p>
<a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/firefox.html">Mitigation Guide</a>
</p>
<img src="../images/firefox_logo.png" alt="Firefox logo">
<h1>Mozilla Firefox</h1>
<center>
<a href="../articles/firefox_es.html">Spanish Translation</a>
</center>
<p>
Mozilla Firefox is one of the most popular and longest existing
browsers. Its developers have earned it a reputation for being a "privacy and security-based browser, respecting the user" - but is it justified, or just marketing? In fact, over the years they have made several anti-privacy (and generally anti-user) decisions, but this article will focus exclusively on spying. Version tested: 52.5.0, with the default settings. Program used for testing requests: Mitmproxy.
</p>
<p>
<h2>Spyware Level: <font color=orange>High</font></h2>
<p>
After following the <a href="../guides/firefox.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p>
<p>It sends a lot of different data very often (some of which could
@ -28,7 +27,7 @@
<h3>Phoning home</h3>
<p>
Whenever you start Firefox, it makes this request: <br><img src="../images/request.png"><br> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><font color=orange>Can be disabled ONLY in about:config</font></b>. But, since you've already started Firefox, it will make this request at least once.
Whenever you start Firefox, it makes this request: <br><img class="screenshot" src="../images/request.png"><br> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><font color=orange>Can be disabled ONLY in about:config</font></b>. But, since you've already started Firefox, it will make this request at least once.
</p>
<h3>Automatic connections to some websites you've visited, including their trackers</h3>
@ -53,7 +52,8 @@ The best takeaway to this is that Mozilla wants to pretend that including spywar
</p>
<h3>"Safe" Browsing?</h3>
<p>
Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <br><img src="../images/safe_browsing.png"><b><font color=orange>Can be disabled ONLY in about:config.</font></b>
Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
<br><img class="screenshot" src="../images/safe_browsing.png">
</p>
<h3>Firefox Health Report</h3>
@ -104,9 +104,8 @@ The best takeaway to this is that Mozilla wants to pretend that including spywar
functionality. "We may also share your device ID with third parties
in connection with advertising campaigns. " And they work with
advertisers too! Describing all of Pocket's
violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default.
violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default. <font color=yellow> <b>Can be disabled in about:config</b></font><sup><a href="#8">[8]</a></sup>
</p>
<font color=yellow> <b>Can be disabled in about:config</b></font><sup><a href="#8">[8]</a></sup>
<h3>Automatic updates</h3>
<p>
Not that bad compared to all of the above, I guess - but still
@ -120,15 +119,15 @@ The best takeaway to this is that Mozilla wants to pretend that including spywar
<h3>Other issues</h3>
<p>
Firefox also sometimes makes a request to "self-repair.mozilla.org" which looks like this:
<br><img src="../images/self_repair.png">
<br><img class="screenshot" src="../images/self_repair.png">
It includes "optimizelyEndUserID" which probably means it
<b>uniquely identifies you. </b><b><font color=orange>Can be disabled ONLY in about:config.</font></b><sup><a href="#7">[7]</a></sup><br>
It also makes this request every time you open the default home page:
<img src =../images/request2.png"><br>
<img class="screenshot" src ="../images/request2.png"><br>
The number after the Firefox version is, again, <b>uniquely
identifying</b><sup><a href="#4">[4]</a></sup><b><font color=orange> Can be disabled ONLY in about:config.</font></b>
<br>
Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed). <img src =../images/blocklist.png"> The request includes a <b>uniquely identifying</b> browser installation ID. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed). <img class="screenshot" src ="../images/blocklist.png"> The request includes a <b>uniquely identifying</b> browser installation ID. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
</p>
@ -170,7 +169,7 @@ This would be nice if Mozilla didn't whitelist a massive list of domains<sup><a
<h3>Mitigating Firefox Spyware</h3>
<p>
This reveiew is also accompanied by a page about how to configure Firefox to be more privacy respecting, and links to other projects that have been created to solve this
problem. You can read about that <a href="/guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that
problem. You can read about that <a href="../guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that
they should be set too:
</p>
<table border background../images/bg.jpg" style="width:800px">
@ -203,13 +202,13 @@ they should be set too:
</tr>
</table>
<hr>
<center>
<h2>Further Reading</h2>
<p>
<a href="https://jojo-website.neocities.org/privacy.html">firefox "about:config" settings</a>
<a href="http://web.archive.org/web/20180821224202/https://jojo-website.neocities.org/privacy.html">[web.archive.org]</a>
<a href="http://archive.is/eyzdE">[archive.is]</a><br>
<a href="https://invidious.snopyta.org/watch?v=UqkeZIPLY5M">Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp?</a><br>
<a href="https://invidious.snopyta.org/watch?v=UqkeZIPLY5M">Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp?</a>
</p>
<hr>
<h2>Credits</h2>
@ -262,6 +261,7 @@ they should be set too:
<a name="9">9.</a>
<a href="https://disconnect.me/trackerprotection/unblocked">List of whitelisted trackers</a>
<a href="https://web.archive.org/web/20200411051257/https://disconnect.me/trackerprotection/unblocked">[web.archive.org]</a><br>
<hr>
<p><b>
This article was last edited on 5/25/2020
@ -272,6 +272,8 @@ they should be set too:
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="../articles/index.html">Back to catalog</a><br>
</center>
</body>
</html>

View File

@ -1,29 +1,28 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Firefox - Spyware Watchdog</title>
</head>
<body>
<h1>Mozilla Firefox</h1>
<p>
<a href="../articles/index.html">Back to catalog</a><br>
<a href="../guides/firefox_es.html">Guía de mitigación</a>
</p>
<img src="../images/firefox_logo.png" alt="Firefox logo">
<h1>Mozilla Firefox</h1>
<center>
<a href="../articles/firefox.html">English Translation</a>
</center>
<p>
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
</p>
<p>
<h2>Nivel de Spyware: <font color=orange>Alta</font></h2>
<p>
Después de seguir la <a href="../guides/firefox.html">guía de mitigación</a>, este programa <font color=lime><b>No Es Spyware</b></font>.
</p>
<p>Este navegador envía bastante información de forma frecuente (mucha de la cual podría ser utilizada para identificarte de forma única). Todos los "servicios" que provee, como los buscadores que vienen por defecto y Pocket, son anti-privacidad. La clasificación puesta no es más alta porque al menos puedes desactivar or modificar la mayoría de estas características, aunque esto requiera lidiar bastante con about:config
</p>
<h3>Llamadas a casa</h3>
<p>
En el momento en el que inicias Firefox, el navegador hace esta solicitud: <br><img src="../images/request.png"><br> De hecho, hace esta solicitud cada vez que visitas un sitio web, e incluso puede que unas cuantas veces seguidas en un solo sitio web. Se podría decir que Firefox hace "llamadas a casa" la mayoría del tiempo, sin tu consentimiento, <b><font color=orange>Esto sólo se puede deshabilitar usando about:config</font></b>. Sin embargo, como ya has abierto el navegador, éste hará esta solicitud al menos una vez.
En el momento en el que inicias Firefox, el navegador hace esta solicitud: <br><img class="screenshot" src="../images/request.png"><br> De hecho, hace esta solicitud cada vez que visitas un sitio web, e incluso puede que unas cuantas veces seguidas en un solo sitio web. Se podría decir que Firefox hace "llamadas a casa" la mayoría del tiempo, sin tu consentimiento, <b><font color=orange>Esto sólo se puede deshabilitar usando about:config</font></b>. Sin embargo, como ya has abierto el navegador, éste hará esta solicitud al menos una vez.
</p>
<h3>Conexiones automáticas a sitios visitados, incluyendo sus rastreadores</h3>
@ -101,9 +100,8 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
violaciones a la privacidad por parte de Pocket tomaría todo este artículo. Hay servicios
similares con mejores prácticas de privacidad, pero al final, todos ellos recopilan datos
que ves en "la nube". Un navegador que realmente respete tu privacidad no debería estar integrado
con esos servicios por defecto.
con esos servicios por defecto. <font color=yellow> <b>Esto puede ser deshabilitado en about:config</b></font><sup><a href="#8">[8]</a></sup>
</p>
<font color=yellow> <b>Esto puede ser deshabilitado en about:config</b></font><sup><a href="#8">[8]</a></sup>
<h3>Actualizaciones automáticas</h3>
<p>
No es algo tan malo como lo anteriormente mencionado, teóricamente - pero aún así se
@ -117,11 +115,11 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
<h3>Otros problemas</h3>
<p>
En ocasiones Firefox hace una solicitud a "self-repair.mozilla.org", la cual luce así:
<br><img src="../images/self_repair.png">
<br><img class="screenshot" src="../images/self_repair.png">
La solicitud incluye un parámetro llamado "optimizeEndUserID", lo cual podría significar que
<b>te identifica de forma única</b> <b><font color=orange>Esto SÓLO puede ser deshabilitado en about:config</font></b><sup><a href="#7">[7]</a></sup><br>
También se hace esta solicitud cada vez que abres la página de inicio por defecto:
<img src="../images/request2.png"><br>
<img class="screenshot" src="../images/request2.png"><br>
El número después de la versión de Firefox es, nuevamente, <b>identificable de forma única</b><sup><a href="#4">[4]</a></sup><b><font color=orange>Esto SÓLO puede ser deshabilitado en about:config</font></b>
</p>
@ -130,6 +128,7 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
Firefoz envía información a Mozilla sobre casi cualquier operación básica que hagas. Esa información es atada a una ID única de cliente, una ID para tu sesión y otra información relevante relacionada a tus acciones.
<b><font color=red>Por defecto, las siguientes acciones del usuario en la interfaz, serán reportadas a Mozilla<sup><a href="#5">[5]</a></sup>:</font></b>
</p>
</center>
<ul>
<li>Realizar una búsqueda</li>
<li>Hacer clic en un elemento del panel de "Sitios Populares"</li>
@ -150,6 +149,7 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
<li>Cuando un addon falla en iniciarse</li>
<li>Se envía también un cálculo relacionado a los dominios web</li>
</ul>
<center>
<p>
Esencialmente, aunque esta característica no envía tu historial a Mozilla, sí le provee con información muy detallada y exacta sobre cómo el usuario usa la interfaz de Firefox. Esto puede ser deshabilitado a través de la interfaz de Firefox como se describe aquí:
<a href="https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">Share data with Mozilla to help improve Firefox</a>
@ -159,7 +159,7 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
<h3>Mitigando el spyware de Firefox</h3>
<p>
Esta revisión está acompañada de una página sobre cómo configurar Firefox para hacerlo más amigable para la privacidad, y también hay enlaces a otros proyectos que han sido creados para resolver este problema. Puedes leer acerca de eso <a href="/guides/firefox_es.html">aquí.</a> Estas son algunas de las preferencias en about:config mencionadas antes en el artículo, y sus valores deben ser establecidos a:
Esta revisión está acompañada de una página sobre cómo configurar Firefox para hacerlo más amigable para la privacidad, y también hay enlaces a otros proyectos que han sido creados para resolver este problema. Puedes leer acerca de eso <a href="../guides/firefox_es.html">aquí.</a> Estas son algunas de las preferencias en about:config mencionadas antes en el artículo, y sus valores deben ser establecidos a:
</p>
<table border background../images/bg.jpg" style="width:800px">
<tr>
@ -191,6 +191,7 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
</tr>
</table>
<hr>
<center>
<h2>Artículos de interés</h2>
<p>
<a href="https://jojo-website.neocities.org/privacy.html"><i>firefox "about:config" settings</i></a>
@ -246,7 +247,7 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
<a name="8">8.</a>
<a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox"><i>Disable Pocket in Firefox</i></a>
<a href="https://archive.li/mWBcp">[archive.is]</a><br>
<hr>
<p><b>
This is a translation of the original article, it may become outdated.
Esta es una traducción del artículo original en inglés, puede quedar desactualizada eventualmente.
@ -260,6 +261,8 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="../articles/index.html">Back to catalog</a><br>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google - Spyware Watchdog</title>
</head>
<body>
<h1>Google</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/google_logo.png" alt="Google logo">
<h1>Google</h1>
<p>
Google is an advertising company that produces and researches a huge amount of spyware products and services that permeate
the internet almost entirely. It is almost impossible for the naieve user to use the internet without running into Google
@ -18,16 +17,19 @@ spyware, as they have deployed products on almost every level of the user's inte
<p>
The following articles on this website have been written about technology created by Google:
</p>
<center>
<p>
<a href="../articles/chrome.html">Google Chrome</a><br>
<a href="../articles/google_search.html">Google Search</a><br>
<a href="../articles/youtube.html">YouTube</a><br>
</p>
</center>
<h2>Privacy Statements and Policies</h2>
<p>
The following documents are an incomplete list of policies Google uses for it's various products and
services when concerning user privacy.
</p>
<center>
<p>
<a href="https://policies.google.com/privacy">Google Privacy policy</a>
<a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a>
@ -46,6 +48,8 @@ services when concerning user privacy.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,18 +1,19 @@
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google Search - Spyware Watchdog</title>
</head>
<body>
<h1>Google Search</h1>
<p>
<a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/google_search_es.html">Spanish Translation</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br>
<a href="../articles/google_search_tr.html">Turkish Translation</a><br>
</p>
<img src="../images/google_logo.png" alt="Google logo">
<h1>Google Search</h1>
<center>
<p>
<a href="../articles/google_search_es.html">Spanish Translation</a></br>
<a href="../articles/google_search_tr.html">Turkish Translation</a>
</p>
</center>
<p>
Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
</p>
@ -72,6 +73,7 @@ your information, so it is really not trying to be very detailed because it woul
to one user, increasing the accuracy of their internal profile of you.
</p>
<hr>
<center>
<h2>Further Reading</h2>
<p>
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br>
@ -96,6 +98,8 @@ your information, so it is really not trying to be very detailed because it woul
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,40 +1,41 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google Search - Spyware Watchdog</title>
</head>
<body>
<img src="../images/google_logo.png">
<h1>Buscador de Google</h1>
<center>
<p>
<a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="../articles/google_search.html">English Version</a><br>
<a href="../articles/google_search.html">Turkish Version</a><br>
</p>
<img src="../images/google_logo.png">
</center>
<p>El buscador de Google es un motor de busqueda creado y mantenido por Google</p>
<h2>Nivel de spyware<font color="red"> EXTREMADAMENTE ALTO</font></h2>
<p> El buscador de Google recolecta tu información personal y está altamente integrado con otros servicios que también recolectan tu información personal. En la política de privacidad de Google<sup><a href="#1">[1]</a></sup> está escrita de mandera que no dice que tipos de información recolectam por lo que miente. Así que lo mejor que puedes hacer, es afirmar que cada vez que usas un servicio de Google es saber que está haciendo lo posible para obtener toda tu información.</p>
<p>También es importante remarcar que este artículo solo da una mínima visión de lo que espía Google. Por lo que no muestra todo detalladamente.</p>
<h3>Google recuerda tus búsquedas</h3>
<p>Las búsquedas hechas en Google estan asociadas a tu identidad y guardada en servidores de Google. La política de privacidad<sup> <a href="#1">[1]</a></sup>indica:</p>
<p>Las búsquedas hechas en Google estan asociadas a tu identidad y guardada en servidores de Google. La política de privacidad<sup> <a href="#1">[1]</a></sup>indica:
<i>Recolectamos información sobre los servicios que usas y como los usas</i>
<p>Donde "Recolectamos información" indíca<sup><a href="#2">[2]</a></sup></p>
<p>Donde "Recolectamos información" indíca<sup><a href="#2">[2]</a></sup>
<i>"Esto incluye informacion como tu uso de datos y preferencia, mensajes de Gmail, perfil de Google+, fotos, vídeos, <b><font color="red">historial de navegacion</font></b>, búsquedas de mapas, documentos, o otro servicio dado por Google. Nuestros sistemas automatizados automaticamente analizan esta información cuando son almacenadas".</i>
<p>Google confirma nuevamente que almacena información de búsqueda en sus servidores, en esta cita:</p>
<p>Google confirma nuevamente que almacena información de búsqueda en sus servidores, en esta cita:
<i>"Cuando usas o vez un servicio que da Google, nosotros automaticamente recolectamos y almacenamos informacion en nuestros registros. Esto incluye: Detalles de como usas nuestro servicio, como tus búsquedas</i>
<h3>Google usa tus búsquedas para crear un perfil basado en tus intereses, el cual es vendido a anunciadores.</h3>
<p>En esta página de la política de privacidad de Google<sup><a href="#2">[2]</a></sup>Google confirma que crea perfiles de sus usuarios.</p>
<p>En esta página de la política de privacidad de Google<sup><a href="#2">[2]</a></sup>Google confirma que crea perfiles de sus usuarios.
<i>"Por ejemplo, usaremos está informacion: ... en cookies de tu navegador para proporcionar resultados de busqueda mas relevantes</i>
<p>Es menester hacer hincapié en que a Google no le interesa si tu historial de busquedas contiene información personal, a menos de que tengan tu nombre. Se vende información a anunciadores hasta que no "Sean identificables":</p>
<p>Es menester hacer hincapié en que a Google no le interesa si tu historial de busquedas contiene información personal, a menos de que tengan tu nombre. Se vende información a anunciadores hasta que no "Sean identificables":
<i>"Posiblemente compartamos información no personal (Que sea identificable) con nuestros compañeros - como publicistas, anunciantes o sitios conectados. Por ejemplo, posiblemente compartamos tu informacion para crear estadísticas de nuestros servicios</i>
<h3>El buscador de Google está vínculado con las "Cuentas de Google"</h3>
<p>Google te permite iniciar sesión con una cuenta de Google (Que es spyware).
Esto permite a Google recolectar mas información. Y conecta a los usuarios con otros servicios de Google. Estas cuentas intentan recolectar el numero telefónico. y ayuda a Google completar la información de un usuario a travez de todos sus servicios</p>
<hr>
<center>
<h2>Mas</h2>
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br>
<a href="https://stallman.org/google.html">Reasons not to use Google</a><br>
@ -59,6 +60,7 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</body>
</html>

View File

@ -1,18 +1,19 @@
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Google Search - Spyware Watchdog</title>
</head>
<body>
<h1>Google Arama</h1>
<p>
<a href="../articles/index.html">Kataloga dön</a><br/>
<a href="../articles/google_search_es.html">İspanyolca Çeviri</a> <a href="https://qorg.xyz/spyware/google.html">[qorg.xyz]</a><br>
<a href="../articles/google_search.html">English Version</a><br>
</p>
<img src="../images/google_logo.png" alt="Google logo">
<h1>Google Arama</h1>
<center>
<a href="../articles/google_search_es.html">İspanyolca Çeviri</a></br>
<a href="../articles/google_search.html">English Version</a><br>
</center>
</p>
<p><a href="../articles/google.html">Google</a> Arama tarafından oluşturulan ve yönetilen bir arama motorudur.
</p>
<h2 class="western">Casus Yazılım Seviyesi: <font color="red">AŞIRI FAZLA</font></h2>
@ -98,6 +99,7 @@ bilgi toplayabilmesi için verir, böylelikle onların size dair
oluşturduğu iç profilin kesinliği artar.
</p>
<hr/>
<center>
<h2 class="western">Daha Fazla Okuma</h2>
<p><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Neden
Googleın Kullanıcı Verisi Üstündeki İzlemesi NSAinkinden
@ -123,6 +125,8 @@ lisansı altında lisanslanmak zorundadır.
</p>
<p><b>This article was translated from english on 4/8/2019. Check the dates of the english article with this one in case any changes have been made.
This translation might become outdated in the future.</b></p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Kataloga dön</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>GZDoom - Spyware Watchdog</title>
</head>
<body>
<h1>GZDoom</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo">
<h1>GZDoom</h1>
<p>
GZDoom is a source port of Doom based on an older source port, ZDoom.
</p>
@ -19,6 +18,7 @@ GZDoom's developers do not seem to be very good at handling privacy concerns (Af
should make sure to compile it with the telemtery disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -33,6 +33,8 @@ should make sure to compile it with the telemtery disabled, and you should make
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Hexchat - Spyware Watchdog</title>
</head>
<body>
<h1>Hexchat</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/hexchat_logo.png" alt="Hexchat Logo">
<h1>Hexchat</h1>
<p>
HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.
</p>
@ -17,9 +16,12 @@ HexChat is an IRC client based on XChat, but unlike XChat it's completely free f
Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also dstributed on spyware platforms such as the windows store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers website</a> instead of the windows store.
</p>
<hr>
<center>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>GNU IceCat - Spyware Watchdog</title>
</head>
<body>
<h1>GNU IceCat</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/icecat_es.html">Spanish Translation</a></p>
<img src="../images/icecat_logo.png" alt="icecat Logo">
<h1>GNU IceCat</h1>
<center>
<a href="../articles/icecat_es.html">Spanish Translation</a>
</center>
<p>
GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p>
@ -19,26 +19,29 @@ GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html"
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a>
</p>
<h3>IceCat's privacy features</h3>
<center>
<p>
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>
</p>
<ul>
<li>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</li>
<li>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</li>
<li>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</li>
<li>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characterisics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</li>
</ul>
</center>
<p>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</p>
<p>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</p>
<p>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</p>
<p>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characterisics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</p>
<p>
As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">
GNUzilla - News: IceCat 60.2.0 Pre-release</a>
</p>
<hr>
<center>
<p><b>
This article was last edited on 9/18/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,16 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Outdated GNU IceCat - Spyware Watchdog</title>
</head>
<body>
<h1>GNU IceCat (v59)</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/icecat_logo.png" alt="icecat Logo">
<h1>GNU IceCat (v59)</h1>
<center>
<h3><font color=red>Note: This article is outdated. <a href="../articles/icecat.html">Here</a> is the updated version. </font></h3>
</center>
<p>
GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p>
@ -16,30 +18,30 @@ GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html"
<p>
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. However it still contains a lot of the spyware features found in Firefox. So, while it's better than Firefox, it still has a lot of problems that Firefox has.
</p>
<h3><font color=red>This article is about an older version of Icecat (v59), and not the current verison. (anything v60 and higher)</font></h3>
<h3>Phoning Home</h3>
<p>
Even though IceCat has better privacy features out of the box than Firefox, it still phones home by default to GNU, Mozilla, and Google.
So, while it claims to respect your privacy, it doesn't take steps to stop spyware features like this.
</p>
<img src="../images/icecat_phones_home.png" alt="Icecat phoning home">
<img class="screenshot" src="../images/icecat_phones_home.png" alt="Icecat phoning home">
<h3>IceCat's privacy features</h3>
<center>
<p>
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>
</p>
<ul>
<li>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</li>
<li>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</li>
<li>SpyBlock: Blocks privacy trackers while in normal browsing mode, and all third party requests when in private browsing mode. Based on Adblock Plus.</li>
<li>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</li>
<li>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characterisics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</li>
</ul>
</center>
<p>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</p>
<p>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</p>
<p>SpyBlock: Blocks privacy trackers while in normal browsing mode, and all third party requests when in private browsing mode. Based on Adblock Plus.</p>
<p>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</p>
<p>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characterisics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://digdeeper.neocities.org/">Dig Deeper</a>
<a href="https://digdeeper.neocities.o../images/icecat.png">[original image link]</a><br>
<a href="../images/icecat.png">[original image link]</a><br>
</p>
<hr>
@ -49,6 +51,8 @@ GNU IceCat is a fork of Firefox that is more private and secure than Firefox and
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,17 +1,16 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>GNU IceCat - Spyware Watchdog</title>
</head>
<body>
<h1>GNU IceCat</h1>
<p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="../articles/icecat.html">English Translation</a></p>
<img src="../images/icecat_logo.png" alt="icecat Logo">
<h1>GNU IceCat</h1>
<center>
<a href="../articles/icecat.html">English Translation</a></p>
</center>
<p>
GNU IceCat es un navegador web, derivado de <a href="../articles/firefox.html">Firefox</a>.
</p>
@ -19,17 +18,17 @@ GNU IceCat es un navegador web, derivado de <a href="../articles/firefox.html">F
<p>GNU IceCat es una derivación de Firefox que es mas seguro y privado que Firefox, contiene muchas características que protegen la privacidad del usuario. IceCat 60 <font color=lime>No hace conexiones no solicitadas cuando lo abres.</font> La versión anterior tuvo problemas, pero la versión 60 no parece tener estos problemas. Puedes leer sobre la versión anterior <a href="icecat59.html">Icecat 59 [English]</a></p>
<h3>Características de privacidad de IceCat</h3>
<center>
<p>Fuente: <a href="gnu.org">gnu.org</a></p>
<ul>
<li>LibreJS: Gnu LibreJS apunta al "Problema de JavaScript" descrito por el artículo de Richard Stallman "The JavaScript Trap."</li>
<li>HTTPS-Everywhere: Extensión que encripta tu comunicación con muchos sitios web, haciendo tu navegación mas segura.</li>
<li>AboutIceCat: Añade una propia página de inicio "about:icecat" en la que puedes habilitar y deshabilitar opciones de privacidad</li>
<li>Contramedidas de "Fingerprinting": "Fingerprinting" es una serie de técnicas que permiten identificar a un navegador con características especificas (Como las fuentes instaladas en tu máquina) a diferencia de las cookies, el usuario no puede borrarla.</li>
</ul>
</center>
<p>LibreJS: Gnu LibreJS apunta al "Problema de JavaScript" descrito por el artículo de Richard Stallman "The JavaScript Trap."</p>
<p>HTTPS-Everywhere: Extensión que encripta tu comunicación con muchos sitios web, haciendo tu navegación mas segura.</p>
<p>AboutIceCat: Añade una propia página de inicio "about:icecat" en la que puedes habilitar y deshabilitar opciones de privacidad</p>
<p>Contramedidas de "Fingerprinting": "Fingerprinting" es una serie de técnicas que permiten identificar a un navegador con características especificas (Como las fuentes instaladas en tu máquina) a diferencia de las cookies, el usuario no puede borrarla.</p>
<p>Este articulo ha sido escrito (Y traducido), la información de gnu.org puede estar desactualizada, Lee <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">esto</a> para más información
</p>
<hr>
<center>
<p><b>
This article was translated on 1/31/2019<br>
This translation might become inaccurate in the future. Compare the dates of the English and Spanish articles if you aren't sure.
@ -38,6 +37,8 @@ GNU IceCat es un navegador web, derivado de <a href="../articles/firefox.html">F
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Article Directory - Spyware Watchdog</title>
<title>Catalog - Spyware Watchdog</title>
</head>
<body>
<center>
<h1>Spyware Watchdog Article Directory</h1>
<p>
<a href="../index.html">&larr; Home</a><br>
<a href="../articles/index2.html">Unfinished Articles</a><br>
</p>
<p>All of the articles on this website are available here! If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<hr>
<h2>Web Browsers</h2>
@ -40,6 +37,7 @@
<a href="../articles/otter.html">Otter Browser</a><br>
<a href="../articles/qutebrowser.html">Qutebrowser</a><br>
<a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a><br>
<a href="../articles/webbrowser.html">Web Browser</a><br>
<a href="../articles/tor.html">Tor Browser</a><br>
<h2>Online Content Platforms</h2>
<a href="../articles/snapchat.html">Snapchat</a><br>
@ -71,10 +69,16 @@
<a href="../articles/realplayer.html">RealPlayer</a><br>
<a href="../articles/itunes.html">iTunes</a><br>
<a href="../articles/vlc.html">VLC Media Player</a><br>
<h2>Other</h2>
<h2>Misc Software</h2>
<a href="../articles/ccleaner.html">CCleaner</a><br>
<a href="../articles/poweriso.html">PowerISO</a><br>
<a href="../articles/cdex.html">CDex</a><br>
<a href="../articles/paint.net.html">Paint.NET</a><br>
<h3>Other Options</h3>
<p>
<!--<a href="../articles/index2.html">Unfinished Articles</a><br>-->
<a href="../index.html">Back to Home</a><br>
</p>
</center>
</body>
</html>

View File

@ -1,18 +1,15 @@
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<center>
<h1>Online Spyware Classification Project Unfinished Article Catalog</h1>
<p>
<a href="../index.html">Back to Home</a><br>
<a href="../articles/index.html/">Main Catalog</a><br>
</p>
<p>
This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. These articles need the most help, so feel free to contribute!
</p>
<p>The <a href="../requested_articles.txt">requested articles</a> file also has a list of articles that have been requested, and the state of those
@ -25,12 +22,16 @@ This is a catalog of all of the articles that are currently works-in-progress. T
<a href="../articles/1password.html">1password</a><br>
<a href="../articles/foobar2000.html">Foobar 2000</a><br>
<a href="../articles/browsers.html">Comparison between web browsers</a><br>
<a href="../articles/example.html">Example Article</a><br>
<a href="../guides/classify.html">Classification Guide</a><br>
</p>
<h3>Other Options</h3>
<p>
<a href="../articles/index.html">Main Catalog</a><br>
<a href="../index.html">Back to Home</a><br>
</p>
</center>
</body>
</html>

View File

@ -2,15 +2,14 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Instagram - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Instagram</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/ig_logo.png" alt="Instagram logo">
<h1>Instagram</h1>
<p>
Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.
</p>
@ -47,7 +46,7 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you don't provide a either one. This is obviously a method Instagram to uniquely identify you.</p>
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see whats new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
<img src="../images/ig_sshot.png" alt="screenshot">
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot">
<h3>It Broadcasts What You Do In The App To Other Users</h3>
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
@ -57,6 +56,7 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
<hr>
<center>
<h2>Sources</h2>
<p>
@ -96,9 +96,9 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,21 +1,19 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Iridium Browser - Spyware Watchdog</title>
</head>
<body>
<h1>Iridium Browser</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/iridium.html">Mitigation Guide</a></p>
<img src="../images/iridium_logo.jpg" alt="Iridium Logo">
<h1>Iridium Browser</h1>
<p>
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.
</p>
<p>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
After following the <a href="/guides/iridium.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
<p>
After following the <a href="../guides/iridium.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p>
<p>
The only unsolicited request is for the Google SafeBrowsing feature, and can be easily turned off from the Preferences menu. Additionally, privacy enhancements unrelated to Google are added, such as blocking third party cookies by default, and deleting local storage on close. Full list of the differences between Chrome and Iridium can be found <a href="https://github.com/iridium-browser/tracker/wiki/Differences-between-Iridium-and-Chromium">here</a><sup><a href="#1">[1]</a></sup>. However this list is <b><font color=red>not accurate</font></b> and each claim it makes should be verified by the user.
@ -24,7 +22,7 @@
<p>
Iridium browser will make these requests to Google to update a blocklist of websites for its SafeBrowsing feature:
</p>
<img src="../images/iridium_request.png" alt="Iridium safebrowsing requests">
<img class="screenshot" src="../images/iridium_request.png" alt="Iridium safebrowsing requests">
<p>
Iridium browser will also download this blocklist from a mirror maintained by the developers. Since the web browser is
awalys "phoning home" to either google or the developers servers, this is a form of spyware that can be used to monitor
@ -50,6 +48,7 @@
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -79,6 +78,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a>
</center>
</body>
</html>

View File

@ -1,15 +1,15 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>SRWare Iron - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>SRWare Iron</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/srware_logo.png" alt="SRWare Iron Logo">
<h1>SRWare Iron</h1>
<p>
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
</p>
@ -90,7 +90,7 @@ After you've finished identifying your web browser to just about every single sp
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
</p>
<img src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
<img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
<p>
Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
@ -150,6 +150,7 @@ Bing through it's own domains.
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -171,8 +172,9 @@ Bing through it's own domains.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
<center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>iTunes - Spyware Watchdog</title>
</head>
<body>
<h1>iTunes</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/itunes_logo.png" alt="itunes logo">
<h1>iTunes</h1>
<p>
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
</p>
@ -56,6 +55,7 @@ So, there can be no illusion or mistake about what happens to the information yo
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -84,6 +84,8 @@ So, there can be no illusion or mistake about what happens to the information yo
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Kerbal Space Program - Spyware Watchdog</title>
</head>
<body>
<h1>Kerbal Space Program</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/ksp_logo.png" alt="Kerbal Space Program Logo">
<h1>Kerbal Space Program</h1>
<p>
Kerbal Space Program is a space flight simulation video game developed and published by Squad, and currently owned by Take-Two Interactive.
</p>
@ -147,7 +146,8 @@
source code.
</p>
<hr>
<center>
<h3>Further Reading</h3>
<a href="https://www.youtube.com/watch?v=WCLbUD_aubQ">Kerbal Space Program's New EULA Makes it Spyware </a><br>
@ -179,6 +179,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -7,11 +7,11 @@
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
<h1>Netsurf</h1>
<p>
From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more" <sup><a href="#one">[1]</a></sup> Verstion Tested: Netsurf 3.9
From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more" <sup><a href="#1">[1]</a></sup> Verstion Tested: Netsurf 3.9
</p>
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
<p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
@ -19,17 +19,18 @@
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<h4>Sources</h4>
<center>
<ol>
<li id="one"><a href="https://www.netsurf-browser.org/">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a></li>
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a></br>
</ol>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 licensed to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</div>
</div>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Opera - Spyware Watchdog</title>
</head>
<body>
<h1>Opera</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/opera_logo.png" alt="Images are in the /images folder">
<h1>Opera</h1>
<p>
A web browser made by Opera Software, using the Blink engine. Has some interesting features like mouse gestures, a built-in ad blocker and VPN. It is the sixth most popular browser. But how does it look like in terms of privacy?
</p>
@ -19,11 +18,11 @@
<h3>Geolocation</h3>
<p>The first request Opera makes is the geolocation request: <img src="../images/opera_geo.png"> which includes your country and the precise timestamp.</p>
<p>The first request Opera makes is the geolocation request: <img class="screenshot" src="../images/opera_geo.png"> which includes your country and the precise timestamp.</p>
<h3>Homepage request</h3>
<p>If this is the first time you run Opera, it makes this request: <img src="../images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p>
<p>If this is the first time you run Opera, it makes this request: <img class="screenshot" src="../images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p>
<h3>Cxense analytics</h3>
@ -35,14 +34,14 @@
<h3>Search engines</h3>
<p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img src="../images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="../articles/google.html">Google</a>.</p>
<p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img class="screenshot" src="../images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="../articles/google.html">Google</a>.</p>
<h3>OCSP querying</h3>
<p>Opera will query OCSP servers (ocsp.comodoca.com) to check if SSL certificates expired.
<h3>Malware / Phishing protection</h3>
<p>Anytime you visit a website, Opera will make a request like this: <img src="../images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p>
<p>Anytime you visit a website, Opera will make a request like this: <img class="screenshot" src="../images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p>
<h3>Other requests</h3>
@ -63,6 +62,7 @@
<p>Therefore, some other spyware might be hiding in there.</p>
<hr>
<center>
<h2>Credits</h2>
<p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
@ -78,6 +78,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Otter Browser - Spyware Watchdog</title>
</head>
<body>
<h1>Otter Browser</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/otter_browser_logo.png" alt="Otter Browser Logo">
<h1>Otter Browser</h1>
<p>
From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.
</p>
@ -18,12 +17,15 @@
</p>
<hr>
<center>
<p><b>
This article was created on 11/25/2017
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Paint.NET - Spyware Watchdog</title>
</head>
<body>
<h1>Paint.NET</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/paintnet_logo.png" alt="logo">
<h1>Paint.NET</h1>
<p>
Paint.NET is a freeware image editor program for Microsoft Windows.
</p>
@ -27,6 +26,7 @@ Paint.NET contains an updater that downloads new version of Paint.NET. This upda
So the only way to avoid this is to block the program from accessing the internet, and disabling all updates.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -46,6 +46,8 @@ So the only way to avoid this is to block the program from accessing the interne
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,22 +1,20 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Pale Moon - Spyware Watchdog</title>
</head>
<body>
<h1>Pale Moon</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/palemoon.html">Mitigation Guide</a></p>
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
<h1>Pale Moon</h1>
<p>
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
write this article. This article replaces an old article (<a href="../articles/palemoon_old.html">here</a>).
</p>
<p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
<p>After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p>
<p>
Connects to analytics services, and these requests can <b>only be avoided on subsequent runs</b>. Has block lists, search suggestions, and auto-updates.
@ -27,7 +25,7 @@
By default, Pale Moon's home page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run.
This page connects to Google Analytics, which can fingerprint and track you across the internet.
</p>
<img src="../images/pm_analytics.png" alt="Google Analyics requests sent by Pale Moon's default homepage">
<img class="screenshot" src="../images/pm_analytics.png" alt="Google Analyics requests sent by Pale Moon's default homepage">
<h3>Blocking privacy-enhancing addons</h3>
<p>
Pale Moon by default won't allow you to install the privacy-enhancing addon noscript, citing this rationale for
@ -47,6 +45,7 @@ NoScript will cause display issues and functional issues. "</i><sup><a href="#1"
<h3>OCSP querying</h3>
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -64,6 +63,8 @@ NoScript will cause display issues and functional issues. "</i><sup><a href="#1"
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,23 +1,23 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="/style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Outdated Pale Moon - Spyware Watchdog</title>
</head>
<body>
<h1>Pale Moon</h1>
<p><a href="../articles/index.html">Back to catalog</a><br>
<a href="/guides/palemoon.html">Mitigation Guide</a></p>
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
<h1>Pale Moon</h1>
<center>
<h3><font color=red>Note: This article is outdated. <a href="../articles/palemoon.html">Here</a> is the updated version. </font></h3>
</center>
<p>
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article.
</p>
<p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
<p>After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p>
<h3><font color=red>This article talks about the older behaviors of the spyware services that Pale Moon was connecting too, which have changed. This article is oudated.</font></h3>
<p>
Connects to a MASSIVE amount of trackers, and these requests can <b>only be avoided on subsequent runs</b>. Has geolocation, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit. Together made 169 unsolicited requests upon my first run of it, but again, most of them can be avoided on subsequent runs. Pale Moon, in the end, has less privacy issues than Firefox, aside from its terrible start page, so the rating is Medium.
</p>
@ -67,6 +67,7 @@ privacy-concerned users, and would rather allow websites to execute malicious EC
<h3>OCSP querying</h3>
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -91,6 +92,8 @@ privacy-concerned users, and would rather allow websites to execute malicious EC
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,15 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>PowerISO - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>PowerISO</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/poweriso_logo.png" alt="PowerISO logo">
<h1>PowerISO</h1>
<p>
PowerISO is a CD / DVD / BD image file processing tool.
</p>
@ -37,13 +36,13 @@ When you try to download this program off of the developer's website (<a href="h
which appears to be a link to: <code>http://www.fettcedob-nero.com/vf6o1o5/PowerISO7-x64.exe</code>, is actually a redirect to a website that tries to run a third
party script (spyware) on your browser.
</p>
<img src="../images/piso_scripts.png" alt="PowerISO install button running scripts- caught by noscript.">
<img class="screenshot" src="../images/piso_scripts.png" alt="PowerISO install button running scripts- caught by noscript.">
<h3>Attempting to install a chrome extenison</h3>
<p>
I could not manage to download this program with a Firefox-based browser so I used a Chrome-Based browser to download it. Once I had enabled JavaScript and executed all of the
spyware involved, it attempted to get me to install this chrome extension:
</p>
<img src="../images/piso_extension.png" alt="PowerISO attempt to install a chrome extension">
<img class="screenshot" src="../images/piso_extension.png" alt="PowerISO attempt to install a chrome extension">
<p>
While this is not a review of search manager, it's worth noting that this extension is known adware at least, and who knows what else it does. Any searches about this
extension should explain this. But at the very least, assuming that you didn't install any spyware yet, you at least have the PowerISO installer...
@ -52,22 +51,23 @@ extension should explain this. But at the very least, assuming that you didn't i
<p>
Once you run the PowerISO installer, it will attempt to install the following progams on your computer:
</p>
<img src="../images/PowerISO7-x64_1.png" alt="PowerISO attempt to install spyware 1">
<img src="../images/PowerISO7-x64_2.png" alt="PowerISO attempt to install spyware 2">
<img class="screenshot" src="../images/PowerISO7-x64_1.png" alt="PowerISO attempt to install spyware 1">
<img class="screenshot" src="../images/PowerISO7-x64_2.png" alt="PowerISO attempt to install spyware 2">
<p>
Which both look very shady. <a href="../articles/cdex.html">CDex</a> also seems to be using this same tactic and installer software.<br>
Now, to top it all off, the PowerISO installer will also phone home to some Amazon Servers:
</p>
<img src="../images/piso_installer_phone_home.png" alt="PowerISO installer phoning home">
<img class="screenshot" src="../images/piso_installer_phone_home.png" alt="PowerISO installer phoning home">
<hr>
<center>
<p><b>
This article was created on 10/7/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Qutebrowser - Spyware Watchdog</title>
</head>
<body>
<h1>Qutebrowser</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo">
<h1>Qutebrowser</h1>
<p>
From their website: "qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL." Program tested: v1.3.0 for Windows 7 64-bit. Mitmproxy was used to check for connections.
</p>
@ -18,12 +17,15 @@ Qutebrowser <b><font color=lime>makes no unsolicited requests at all.</font></b>
nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well... ) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.
</p>
<hr>
<center>
<p><b>
This article was created on 5/10/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,16 @@
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Razer - Spyware Watchdog</title>
</head>
<body>
<h1>Spyware de Razer</h1>
<p> <p><a href="../articles/index.html">Back to catalog (English)</a><br>
<a href="../articles/index_es.html">Back to catalog (Spanish)</a><br>
<a href="../articles/razer_en.html">English Translation</a></p>
<img src="../images/razer_logo.png">
<h1>Razer</h1>
<center>
<p><a href="../articles/razer_en.html">English Translation</a></p>
</center>
<p>Razer es una compañía que hace programas y hardware para videojugadores</p>
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
<h3>Información que recolecta</h3>
@ -27,13 +27,14 @@
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
<p>También dice que los empleados pueden ver esos datos.</p>
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
<img src="../images/theevidence.png">
<img class="screenshot" src="../images/theevidence.png">
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
<hr>
<center>
<h2>Mas lecturas</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
<hr>
@ -57,7 +58,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,17 +1,16 @@
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Razer - Spyware Watchdog</title>
</head>
<body>
<h1>Razer's spyware</h1>
<p>
<a href="../articles/index.html">Back to catalog</a><br>
<a href="../articles/razer.html">Spanish Article</a>
</p>
<img src="../images/razer_logo.png">
<h1>Razer</h1>
<center>
<p><a href="../articles/razer.html">Spanish Article</a></p>
</center>
<p>Razer is a company that makes software and hardware for gamers.</p>
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
@ -33,7 +32,7 @@
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
Razer FORCES you to create an account to use YOUR products.
</p>
<img src="../images/theevidence.png">
<img class="screenshot" src="../images/theevidence.png">
<p>
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody's
@ -41,6 +40,7 @@
</p>
<hr>
<center>
<h2>Further reading</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
<hr>
@ -62,7 +62,8 @@
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>RealPlayer - Spyware Watchdog</title>
</head>
<body>
<h1>RealPlayer</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/realplayer_logo.png" alt="realplayer logo">
<h1>RealPlayer</h1>
<p>
RealPlayer, formerly RealAudio Player, RealOne Player and RealPlayer G2, is a cross-platform media player app, developed by RealNetworks.
</p>
@ -101,6 +100,7 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
more information on it.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -114,7 +114,8 @@ receive a higher rating or a diffrent advisory: <b><font color=red>Do not use th
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Redshell - Spyware Watchdog</title>
</head>
<body>
<h1>Redshell</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/redshell_logo.png" alt="redshell Logo">
<h1>Redshell</h1>
<p>
Redshell is a spyware platform that is integrated into many video games.
</p>
@ -60,6 +59,8 @@ avoided entirely.
the information it's spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
will not sell the information that they collect through Redshell to third parties.
</p>
<hr>
<center>
<h3>Further Reading</h3>
<p>
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware - "Holy Potatoes! Were in Space?!" integrated and removed it after complaints</a>
@ -81,6 +82,8 @@ avoided entirely.
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Slimjet - Spyware Watchdog</title>
</head>
<body>
<h1>Slimjet</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/slimjet_logo.png" alt="slimjet Logo">
<h1>Slimjet</h1>
<p>
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
</p>
@ -22,7 +21,7 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup>
the moment I turn it on with MITMproxy running, I am greeted with this:
</p>
<img src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<p>
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
</p>
@ -32,7 +31,7 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
</p>
<img src="../images/fpseek.png" alt="Fpseek connection">
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
<p>
So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad
default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact
@ -55,18 +54,19 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer
updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy:
</p>
<img src="../images/sj_google_BITS.png" alt="Bits1">
<img src="../images/sj_google_BITS_2.png" alt="Bits2">
<img src="../images/sj_google_BITS_3.png" alt="Bits3">
<img class="screenshot" src="../images/sj_google_BITS.png" alt="Bits1">
<img class="screenshot" src="../images/sj_google_BITS_2.png" alt="Bits2">
<img class="screenshot" src="../images/sj_google_BITS_3.png" alt="Bits3">
<p>
Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the
"CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented.
</p>
<img src="../images/sj_cloud.png" alt="cloud sync feature">
<img class="screenshot" src="../images/sj_cloud.png" alt="cloud sync feature">
<p>
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -88,6 +88,8 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -2,15 +2,14 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Snapchat - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Snapchat</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/snapchat_logo.png" alt="Snapchat Logo">
<h1>Snapchat</h1>
<p>
Snapchat, developed by <a href="https://en.wikipedia.org/wiki/Snap_Inc">Snap Inc</a> is designed to be a free, and fun smartphone app to send messages as "Snaps" to your friends. It is popular among teenagers and millennials, however older people have started using the app too.
</p>
@ -50,6 +49,7 @@ For a simple social media app, Snapchat demands too many permissions. When I tes
<p>If a user is fed up with the the vast amount of information the official Snapchat client collects about you, they CANNOT change to the 3rd party client. Doing so is strictly prohibited. Snapchat has a service that is designed to catch users using 3rd party clients and permanently lock your account. This forces the user to use the official client which contains the spyware.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -86,10 +86,8 @@ For a simple social media app, Snapchat demands too many permissions. When I tes
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,15 +1,14 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Sphere Browser - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Sphere Browser</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/sphere_logo.png" alt="sphere browser logo">
<h1>Sphere Browser</h1>
<p>
Sphere Browser is a privacy-focused web Browser made by Tenebris.
</p>
@ -27,25 +26,25 @@ the internet in a rather easy way- and then it by default loads the site <code>f
centeralized way, and even includes a tracking pixel from the getclicky analytics service. If you want to use this browser, you really
should not be using this default homepage. It contrasts with the privacy features of the browser rather poorly.
</p>
<img src="../images/sphere_tracking.png" alt="getclicky tracking pixel on the sphere browser default homepage">
<img class="screenshot" src="../images/sphere_tracking.png" alt="getclicky tracking pixel on the sphere browser default homepage">
<h3>JavaScript from an Analytics company on the download site</h3>
<p>
Another problem is, you need to load JavaScript to download the browser itself at sphere.tenebris.cc/, which tries to load JS code from Tenebris
as well as JavaScript from the same analytics company that has the tracking pixel on <code>f.vision</code>. Why are these analytics here if the browser
is so focused on privacy?
</p>
<img src="../images/sphere_homepage.png" alt="getclicky tracking JS on the sphere browser download page">
<img class="screenshot" src="../images/sphere_homepage.png" alt="getclicky tracking JS on the sphere browser download page">
<hr>
<center>
<p><b>
This article was last edited on 12/12/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Steam - Spyware Watchdog</title>
</head>
<body>
<h1>Steam</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/steam_logo.png" alt="Steam logo">
<h1>Steam</h1>
<p>
Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.
</p>
@ -61,6 +60,7 @@ Steam will "phone home" whenever the Steam client is opened or a program is laun
Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.
</p>
<hr>
<center>
<h2>Further Reading</h2>
<p>
@ -108,6 +108,8 @@ Steam contains spyware features that allow it to update itself without user veri
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -7,11 +7,14 @@
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
<h1>Surf</h1>
<center>
<a href="../articles/surf_fr.html">French Translation</a>
</center>
<p>
From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#one">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.
From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.
</p>
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>
@ -23,15 +26,18 @@
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<h4>Sources</h4>
<ol>
<li id="one"><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></li>
<center>
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
</center>
</ol>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</div>
</div>
</body>

View File

@ -7,11 +7,14 @@
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalogue</a></div>
<div class="main">
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
<h1>Surf</h1>
<center>
<a href="../articles/surf.html">English Translation</a>
</center>
<p>
D'apres le site de Suckless: "surf est un navigateur simple basé sur WebKit2/GTK+. Il peut afficher des sites web et suivre des liens."<sup><a href="#one">[1]</a></sup> Testé: version 2.0 pour Linux. Mitmproxy a été utilisé pour vérifier les connections.
D'apres le site de Suckless: "surf est un navigateur simple basé sur WebKit2/GTK+. Il peut afficher des sites web et suivre des liens."<sup><a href="#1">[1]</a></sup> Testé: version 2.0 pour Linux. Mitmproxy a été utilisé pour vérifier les connections.
</p>
<h2>Niveau: <span class="green">Pas un Spyware</span></h2>
<p>
@ -23,15 +26,16 @@
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="one"><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></li>
</ol>
<h4>Sources</h4>
<center>
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
</center>
</div>
<hr/>
<p>Si vous voulez editer cet article ou contribuer sur vos propres article(s), contactez nous sur XMPP a spyware@conference.nuegia.net, ou visitez le repo Git a <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>Toutes les contributions doivent etre sous license CC0 pour etre acceptées.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<p><a href="../articles/index.html">Catalogue</a></p>
</div>
</div>
</body>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Telegram - Spyware Watchdog</title>
</head>
<body>
<h1>Telegram</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/telegram_logo.png" alt="Telegram Logo">
<h1>Telegram</h1>
<p>
Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.
</p>
@ -33,6 +32,7 @@ of this, meaning that the servers that the developers operate are the only choic
Telegram clients are advertised as free software, but in practice the source code is not immediately accessible<sup><a href="#2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since its not provable whether or not the binaries that are distributed have unknown spyware or not.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -52,6 +52,8 @@ Telegram clients are advertised as free software, but in practice the source cod
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Thunderbird - Spyware Watchdog</title>
</head>
<body>
<h1>Mozilla Thunderbird</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/thunderbird.png" alt="Mozilla Thunderbird logo">
<h1>Thunderbird</h1>
<p>
Mozilla Thunderbird is an email, newsgroup, news feed, and chat client that was developed by the Mozilla Foundation, who are also the developers of <a href="../articles/firefox.html">Firefox</a>.
</p>
@ -50,6 +49,7 @@ Thunderbird will try and download new versions of itself using its update system
Thunderbird contains several forms of opt-in spyware that only collects information when the user specifically authorizes it. This includes crash reports and detailed user analytics. Mozilla says that it anonymizes this information if you choose to share it.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -67,8 +67,8 @@ Thunderbird contains several forms of opt-in spyware that only collects informat
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,15 +1,14 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Tor Browser - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Tor Browser</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/tor_logo.png" alt="TOR browser logo">
<h1>Tor Browser</h1>
<p>
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>
</p>
@ -25,6 +24,7 @@ One thing that complicates this review is that most browsers are chastized for s
this over the Tor network... so while it's definitely "phoning home", it's doing so in an anonymous way.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -44,8 +44,8 @@ this over the Tor network... so while it's definitely "phoning home", it's doing
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,16 +1,15 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Ungoogled-Chromium - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Ungoogled-Chromium</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo">
<h1>Ungoogled-Chromium</h1>
<p>
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,
control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup>
@ -24,6 +23,7 @@ Otherwise <a href="../guides/iridium.html">configuring Iridium</a> to a sufficie
looking for a Chrome-based browser to switch too without taking the time to compile any software.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -38,8 +38,8 @@ looking for a Chrome-based browser to switch too without taking the time to comp
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Unity - Spyware Watchdog</title>
</head>
<body>
<h1>Unity</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/unity_logo.png" alt="unity Logo">
<h1>Unity</h1>
<p>
Unity is a game engine developed by Unity Technologies SF.
</p>
@ -28,6 +27,7 @@ Unity collects user information and uses it in a dubious and malicious way and i
Many Unity games have been found to report telemetry at first launch and have telemetry enabled by default, sometimes with no option to disable it. With no way to disable data collection, players are left to blacklist the game through their firewall.<sup><a href="#4">[4]</a></sup> Exported Unity projects collect anonymized statistics about a systems hardware configuration to monitor and report to developers which type of devices are used to play their Unity engine games. <sup><a href="#5">[5]</a></sup>
</p>
<hr>
<center>
<h2>Credits</h2>
<p>
This reveiew was written by Alia Sarmor.<br>
@ -61,6 +61,8 @@ Unity collects user information and uses it in a dubious and malicious way and i
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Vivaldi - Spyware Watchdog</title>
</head>
<body>
<h1>Vivaldi</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/vivaldi_logo.png" alt="vivaldi logo">
<h1>Vivaldi</h1>
<p>
Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.
</p>
@ -28,19 +27,19 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
<h3>Addon updates</h3>
<p>
<BR>
<img src = "../images/vivaldi_update.png"><BR>
<img class="screenshot" src = "../images/vivaldi_update.png"><BR>
These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font>
</p>
<h3>Google Safe Browsing</h3>
<p>
<img src = "../images/vivaldi_safebrowsing.png"><BR>
<img src = "../images/vivaldi_threatlist.png"><BR>
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png"><BR>
<img class="screenshot" src = "../images/vivaldi_threatlist.png"><BR>
Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.
</p>
<h3>Phoning home</h3>
<p>
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, cpu architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img src="../images/vivaldi_piwik.png">
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, cpu architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img class="screenshot" src="../images/vivaldi_piwik.png">
</p>
<h3>Anti-privacy search engine by default</h3>
@ -55,6 +54,7 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#3">[3]</a></sup>
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -86,7 +86,8 @@ are <font color=red><b>not developers you can trust.</b></font> Below is an anti
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>VLC - Spyware Watchdog</title>
</head>
<body>
<h1>VLC Media Player</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo">
<h1>VLC Media Player</h1>
<p>
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.
</p>
@ -24,8 +23,9 @@ While VLC's creators do not distribute their player with spyware, it has been di
<p>
VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.
</p>
<img src="../images/vlc_privacy_policy.png" alt="privacy policy">
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy">
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -40,6 +40,8 @@ VLC Media player searches through online databases to find complete album covers
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Waterfox - Spyware Watchdog</title>
</head>
<body>
<h1>Waterfox</h1>
<p><a href="https://spyware.neocities.o../articles">Back to catalog</a></p>
<img src="../images/waterfox logo.png" alt="Waterfox Logo">
<h1>Waterfox</h1>
<p>
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
</p>
@ -106,6 +105,7 @@ Self updates are a spyware feature since they are usually ways for the developer
where the user can understand what they are giving up when they download the update. Given Waterfox's bad communication, this is especially likely to happen.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
@ -141,5 +141,8 @@ where the user can understand what they are giving up when they download the upd
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body></html>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

45
articles/webbrowser.html Normal file
View File

@ -0,0 +1,45 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Web Browser - Spyware Watchdog</title>
<link rel="stylesheet" href="../style2.css"/>
</head>
<body>
<div class="case">
<div class="main">
<img width="130" height="145" src="../images/web_browser_logo.png" alt="Web Browser Logo"/>
<center>
<p>
Web Browser is a browser originally based on Pale Moon.
<!--"My goals are to create a private by default browser without a million bells and whistles for power users and maintain XUL plugin compatibility"/-->
</p>
</center>
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>
Web Browser <b><span class="green">makes no unsolicited requests at all.</span></b>
It is also fully open source.<sup><a href="#1">[1]</a></sup> It is a great choice for everyday use and due to it being based on Pale Moon, it has access to all of the XUL plugins available.
</p>
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<center>
<ol>
<a name="1">1.</a><a href="https://git.nuegia.net/webbrowser.git/">Project's homepage</a></br>
</ol>
</div>
<hr>
<p><b>
This article was last edited on 5/12/2020
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a><br>
</center>
</div>
</div>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>WebDiscover - Spyware Watchdog</title>
</head>
<body>
<h1>WebDiscover</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/webdiscover_logo.png" alt="Webdiscover logo">
<h1>WebDiscover</h1>
<p>
WebDiscover is a web browser made by WebDiscover Media.
</p>
@ -24,8 +23,6 @@ to a <b><font color=red>uniquely bad stance on user privacy and use of user info
<p>
WebDiscover is mostly installed through other programs as an opt-out. This means that most users did not want to install this browser, and
were tricked into doing it by other software's installer programs. For example<sup><a href="#2">[2]</a></sup>:
</p>
<p>
<a href="../images/wd1.jpg">[1]</a> <a href="../images/wd2.jpg">[2]</a> <a href="../images/wd3.jpg">[3]</a> <a href="../images/wd4.jpg">[4]</a>
<a href="../images/wd5.jpg">[5]</a> <a href="../images/wd6.jpg">[6]</a> <a href="../images/wd7.jpg">[7]</a> <a href="../images/wd8.jpg">[8]</a>
<a href="../images/wd9.jpg">[9]</a> <a href="../images/cdex_bundling.png">[10]</a>
@ -92,6 +89,7 @@ more concerning:
This was discovered using Microsoft Network Monitor 3.4.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -109,7 +107,8 @@ more concerning:
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Yahoo! Search - Spyware Watchdog</title>
</head>
<body>
<h1>Yahoo! Search</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/yahoo_logo.png" alt="Yahoo Logo">
<h1>Yahoo! Search</h1>
<p>
Yahoo! search is a search engine made by Yahoo.
</p>
@ -55,6 +54,7 @@ is integrated into the "Yahoo Account" spyware platform, which shares all of the
A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
@ -69,7 +69,8 @@ is integrated into the "Yahoo Account" spyware platform, which shares all of the
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,14 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>YouTube - Spyware Watchdog</title>
</head>
<body>
<img src="../images/youtube_logo.png" alt="youtube logo">
<h1>YouTube</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/"../images/youtube_logo.png" alt="youtube logo">
<p>
YouTube is an American video-sharing website headquartered in San Bruno, California. It is owned by <a href="../articles/google.html">Google</a>.
</p>
@ -39,6 +38,7 @@ The Youtube app for android additionally uses the Google Firebase Analytics trac
All that said, it would be wise to avoiding using any of Googles services. If you must access Youtube, we recommend doing so through one of the remaining sanitizers such as Invidious (<a href="https://www.invidio.us">https://www.invidio.us</a>).
</p>
<hr>
<center>
<h2>Credits</h2>
<p>
This reveiew was written by Alia Sarmor.<br>
@ -90,7 +90,8 @@ The Youtube app for android additionally uses the Google Firebase Analytics trac
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -2,22 +2,21 @@
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Mozilla Firefox Spyware Mitigation Guide - Spyware Watchdog</title>
<title>Firefox Spyware Mitigation Guide - Spyware Watchdog</title>
<link rel="stylesheet" href="../style2.css"/>
</head>
<body>
<div class="case">
<div class="nav">
<a href="../index.html">&larr; Home</a>
<a class="right" href="../articles/firefox.html">Firefox &rarr; </a>
</div>
<div class="main">
<img alt="Firefox Logo" src="../images/firefox_logo3.svg">
<img alt="Firefox Logo" src="../images/firefox_logo.png">
<h1>Mozilla Firefox Spyware Mitigation Guide</h1>
<center>
<a href="../guides/firefox_es.html">Spanish Translation</a>
</center>
<p>This guide was tested working with Firefox version 74.</p>
<p>After configuring Mozilla Firefox with ghacks-user.js, according to this guide it's rating changes like so:</p>
<h2>Spyware Rating: <span class="orange">High</span> &rarr; <span class="green">Not Spyware</span></h2>
<p>The ghacks user.js is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).<sup><a href="#two">[2]</a></sup></p>
<p>The ghacks user.js is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).<sup><a href="#5">[5]</a></sup></p>
<br/>
<p>
Before beginning this guide it is important that you try and cross-reference it with other guides,
@ -101,7 +100,7 @@
<li>webcompat@mozilla.org.xpi - Web Compatibility Reporter</li>
</ul>
<p>
It is highly recommended to also check other user.js template settings from ongoing <i>"ghacks-user.js project"</i><sup><a href="#one">[1]</a></sup> for further hardening Firefox privacy, security and anti-fingerprinting.
It is highly recommended to also check other user.js template settings from ongoing <i>"ghacks-user.js project"</i><sup><a href="#4">[4]</a></sup> for further hardening Firefox privacy, security and anti-fingerprinting.
</p>
<br/>
<p>Run <code>firefox -no-remote -ProfileManager</code> again and start the profile you created. Delete any others if needed. Check to make sure, after the first start, that another profile which does <i>not</i> use ghacks was not created by Firefox.</p>
@ -114,23 +113,27 @@
finish setting Firefox up. Librewolf is less of a guide and more of a project and series of tools and settings
you can download to help you make Firefox private.
</p>
<center>
<ol>
<li><a href="https://www.privacytools.io/#about_config">Privacy Related "about:config" Tweaks to Firefox</a> <a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a> <a href="http://archive.fo/SEFXb">[archive.is]</a></li>
<li><a href="https://restoreprivacy.com/firefox-privacy/">Firefox Privacy The Complete How-To Guide</a> <a href="https://web.archive.org/web/20181015023738/https://restoreprivacy.com/firefox-privacy/">[web.archive.org]</a> <a href="http://archive.is/20180414165038/https://restoreprivacy.com/firefox-privacy/">[archive.is]</a></li>
<li><a href="https://gitlab.com/librewolf-community/browser/linux/">Librewolf, Firefox with privacy enhancements</a></li>
<a name="1">1.</a><a href="https://www.privacytools.io/#about_config">Privacy Related "about:config" Tweaks to Firefox</a> <a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a> <a href="http://archive.fo/SEFXb">[archive.is]</a></br>
<a name="2">2.</a><a href="https://restoreprivacy.com/firefox-privacy/">Firefox Privacy The Complete How-To Guide</a> <a href="https://web.archive.org/web/20181015023738/https://restoreprivacy.com/firefox-privacy/">[web.archive.org]</a> <a href="http://archive.is/20180414165038/https://restoreprivacy.com/firefox-privacy/">[archive.is]</a></br>
<a name="3">3.</a><a href="https://gitlab.com/librewolf-community/browser/linux/">Librewolf, Firefox with privacy enhancements</a></br>
</ol>
<hr/>
<h2>Sources</h2>
<ol>
<li value="0"><a href="https://commons.wikimedia.org/wiki/File:Firefox_logo,_2019.svg">https://commons.wikimedia.org/wiki/File:Firefox_logo,_2019.svg</a> (Firefox Logo)</li>
<li id="one"><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a> <a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a> <a href="http://archive.is/GXIBO">[archive.is]</a></li>
<li id="two"><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md">https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md</a></li>
<a name="4">4.</a><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a> <a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a> <a href="http://archive.is/GXIBO">[archive.is]</a></br>
<a name="5">5.</a><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md">https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md</a></li>
</ol>
</center>
<hr/>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<center>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</div>
</div>
</body>

View File

@ -8,16 +8,17 @@
<body>
<div class="case">
<div class="nav">
<a href="../index.html">&larr; Home</a>
<a class="right" href="../articles/firefox_es.html">Firefox &rarr; </a>
</div>
<div class="main">
<img alt="Firefox Logo" src="../images/firefox_logo3.svg">
<img alt="Firefox Logo" src="../images/firefox_logo.png">
<h1>Guía de Mitigación de Spyware para Mozilla Firefox</h1>
<center>
<a href="../guides/firefox.html">English Translation</a>
</center>
<p>Esta guía fue elaborada utilizando la versión 74 de Firefox.</p>
<p>Después de configurar Firefox con el script ghacks-user.js su clasificación de spyware cambia, por lo que pasa a ser:</p>
<h2>Nivel de Spyware: <span class="orange">Alto</span> &rarr; <span class="green">No Es Spyware</span></h2>
<p>El script ghacks-user.js es una plantilla que clama mejorar la privacidad y seguridad tanto como sea posible, así como reducir el rastreo y el <i>fingerprinting</i> - intentando minimizar cualquier pérdida de funcionalidad y errores (aunque si se provocarán algunos).<sup><a href="#two">[2]</a></sup></p>
<p>El script ghacks-user.js es una plantilla que clama mejorar la privacidad y seguridad tanto como sea posible, así como reducir el rastreo y el <i>fingerprinting</i> - intentando minimizar cualquier pérdida de funcionalidad y errores (aunque si se provocarán algunos).<sup><a href="#5">[5]</a></sup></p>
<br/>
<p>
Antes de comenzar, es importante hacer mención de otras guías de mitigación, de esta forma
@ -99,7 +100,7 @@
<li>webcompat@mozilla.org.xpi - Web Compatibility Reporter</li>
</ul>
<p>
También es altamente recomendado buscar templates de user.js, como el <i>"ghacks-user.js project"</i><sup><a href="#one">[1]</a></sup> para aumentar la privacidad de Firefox, así como su seguridad y técnicas anti-<i>fingerprinting</i> (rastreo)
También es altamente recomendado buscar templates de user.js, como el <i>"ghacks-user.js project"</i><sup><a href="#4">[4]</a></sup> para aumentar la privacidad de Firefox, así como su seguridad y técnicas anti-<i>fingerprinting</i> (rastreo)
</p>
<br/>
<p>Por último, ejecuta el comando <code>firefox -no-remote -ProfileManager</code> nuevamente y abre el perfil que creaste. Elimina los otros perfiles si es necesario. También, para mayor seguridad, verifica que después de inciar el navegador, Firefox <i>no</i> ha creado nuevos perfiles.</p>
@ -112,17 +113,17 @@
no es exactamente una guía, pero sí un proyecto y una serie de herramientas y configuraciones que puedes descargar para
hacer Firefox más privado.
</p>
<center>
<ol>
<li><a href="https://www.privacytools.io/#about_config"><i>Privacy Related "about:config" Tweaks to Firefox</i></a> <a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a> <a href="http://archive.fo/SEFXb">[archive.is]</a></li>
<li><a href="https://restoreprivacy.com/firefox-privacy/"><i>Firefox Privacy The Complete How-To Guide</i></a> <a href="https://web.archive.org/web/20181015023738/https://restoreprivacy.com/firefox-privacy/">[web.archive.org]</a> <a href="http://archive.is/20180414165038/https://restoreprivacy.com/firefox-privacy/">[archive.is]</a></li>
<li><a href="https://gitlab.com/librewolf-community/browser/linux/">Librewolf, Firefox con mejoras de privacidad</a></li>
<a name="1">1.</a><a href="https://www.privacytools.io/#about_config"><i>Privacy Related "about:config" Tweaks to Firefox</i></a> <a href="http://web.archive.org/web/20181031171622/https://www.privacytools.io/">[web.archive.org]</a> <a href="http://archive.fo/SEFXb">[archive.is]</a></br>
<a name="2">2.</a><a href="https://restoreprivacy.com/firefox-privacy/"><i>Firefox Privacy The Complete How-To Guide</i></a> <a href="https://web.archive.org/web/20181015023738/https://restoreprivacy.com/firefox-privacy/">[web.archive.org]</a> <a href="http://archive.is/20180414165038/https://restoreprivacy.com/firefox-privacy/">[archive.is]</a></br>
<a name="3">3.</a><a href="https://gitlab.com/librewolf-community/browser/linux/">Librewolf, Firefox con mejoras de privacidad</a></li>
</ol>
<hr/>
<h2>Referencias</h2>
<ol>
<li value="0"><a href="https://commons.wikimedia.org/wiki/File:Firefox_logo,_2019.svg">https://commons.wikimedia.org/wiki/File:Firefox_logo,_2019.svg</a> (Logotipo de Firefox)</li>
<li id="one"><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a> <a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a> <a href="http://archive.is/GXIBO">[archive.is]</a></li>
<li id="two"><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md">https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md</a></li>
<a name="4">4.</a><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">ghacksuserjs/ghacks-user.js</a> <a href="http://web.archive.org/web/20181015031306/https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js">[web.archive.org]</a> <a href="http://archive.is/GXIBO">[archive.is]</a></br>
<a name="5">5.</a><a href="https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md">https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md</a></br>
</ol>
<hr/>
<p>
@ -133,6 +134,8 @@
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</div>
</div>
</body>

View File

@ -1,17 +1,13 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title>
</head>
<body>
<h1>Iridium Browser Spyware Mitigation Guide</h1>
<p>
<a href="/">Back to Home</a><br>
<a href="/articles/iridium.html">Back to Iridium</a>
</p>
<img src="../images/iridium_logo.jpg">
<h1>Iridium Browser Spyware Mitigation Guide</h1>
<p>
After configuring Iridium according to this guide it's rating changes like so:
</p>
@ -22,15 +18,15 @@
while you turn it off, so it doesn't make any requests before you opt-out. Then uncheck "protect you and
your device from dangerous sites" in the advanced settings menu.
</p>
<img src="../images/iridium_disablesb.png" alt="disabling safebrowsing from the advanced settings menu">
<img class="screenshot" src="../images/iridium_disablesb.png" alt="disabling safebrowsing from the advanced settings menu">
<hr>
<p><b>
</b></p>
<center>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be liscenced under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -7,15 +7,14 @@
</head>
<body>
<div class="case">
<div class="nav">
<a href="../index.html">&larr; Home</a>
<a class="right" href="../articles/netsurf.html">NetSurf &rarr; </a>
<div class="main">
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
<h1>Netsurf Spyware Mitigation Guide</h1>
<center>
<p>
This guide was tested using Netsurf 3.9.
</p>
</center>
<h2>Spyware Level: <span class="yellowgreen">Low</span><span class="green">Not Spyware</span></h2>
<h3>Mitigation Method 1:</h3>
<p>This method is rather simple, change the default search engine and the request to google will no longer happen, if you wish you can do this with the internet disconnected, that will prevent an initial request.</p>
@ -25,15 +24,18 @@
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<h4>Sources</h4>
<center>
<ol>
<li id="one"><a href="https://git.parabola.nu/abslibre.git/tree/libre/netsurf/remove_nonprivacy_options.patch">Patch</a> <a href="https://web.archive.org/web/20200409032203/https://git.parabola.nu/abslibre.git/tree/libre/netsurf/remove_nonprivacy_options.patch">[web.archive.org]</a> <a href="https://archive.is/esaPM">[archive.is]</a></li>
<a name="1">1.</a><a href="https://git.parabola.nu/abslibre.git/tree/libre/netsurf/remove_nonprivacy_options.patch">Patch</a> <a href="https://web.archive.org/web/20200409032203/https://git.parabola.nu/abslibre.git/tree/libre/netsurf/remove_nonprivacy_options.patch">[web.archive.org]</a> <a href="https://archive.is/esaPM">[archive.is]</a></br>
</ol>
</center>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 licensed to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</div>
</div>
</body>

BIN
images/web_browser_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 11 KiB

View File

@ -9,7 +9,7 @@
<div class="case">
<div class="nav wide-nav">
<a href="articles/index.html">Articles</a>
<a href="https://spyware.neocities.org">Neocities Mirror</a>
<a href="https://spyware.neocities.org/">Neocities Mirror</a>
<a href="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/">Tor Mirror</a>
<a href="misc.html">Misc</a>
</div>

View File

@ -7,7 +7,6 @@
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Home</a></div>
<h1>Misc Page</h1>
<div class="main center">
<p>
@ -43,5 +42,8 @@
</div>
<br/>
</div>
<center>
<p><a href="index.html">Back to Home</a></p>
</center>
</body>
</html>

View File

@ -1,9 +1,8 @@
body {
margin: 0;
padding: 0;
background: black;
color: #F5F5F5;
font-family: "sans";
background: url("images/blackbg.jpg");
color: white;
}
p {
max-width: 780px;
@ -43,7 +42,10 @@ img {
width: 155px;
}
.icon {
width: 77px
width: 77px;
}
.screenshot {
width: 780px;
}
hr {
border: 1px solid #1A1A1A;
@ -132,3 +134,13 @@ ol {
margin-top: 1vh;
text-align: center;
}
li {
max-width: 800px;
margin-left: 30%;
margin-right: auto;
}
xmp {
max-width: 800px;
margin-left: 20%;
margin-right: auto;
}