Merge pull request 'styling-articles' (#126) from codddfeea/SpywareWatchdog:styling-articles into master
Reviewed-on: https://codeberg.org/shadow/SpywareWatchdog/pulls/126
This commit is contained in:
commit
c93f992759
|
@ -1,37 +1,39 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/badwolf.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>BadWolf - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/badwolf.png" alt="BadWolf Logo"/>
|
||||
<h1>BadWolf</h1>
|
||||
<p>Badwolf is a minimalist and privacy-oriented web browser based on WebKitGTK.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>BadWolf <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<p>BadWolf is a pretty decent browser worth looking into. A couple of neat features worth noting is that BadWolf has a JavaScript switch and an image viewer switch, which is useful for daily tasks.</p>
|
||||
<hr></hr>
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 6/19/2021</p>
|
||||
<p>This article was lasted edited on 6/19/2021</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>BadWolf - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/badwolf.png" alt="BadWolf Logo"/>
|
||||
<h1>BadWolf</h1>
|
||||
<p>Badwolf is a minimalist and privacy-oriented web browser based on WebKitGTK.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>BadWolf <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<p>BadWolf is a pretty decent browser worth looking into. A couple of neat features worth noting is that BadWolf has a JavaScript switch and an image viewer switch, which is useful for daily tasks.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 6/19/2021</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 6/19/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,43 +1,39 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/badwolf_de.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>BadWolf - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/badwolf.png" alt="BadWolf Logo"/>
|
||||
<h1>BadWolf</h1>
|
||||
<p>Badwolf ist ein minimalistischer und auf Privatsphäre ausgelegter Webbrowser, basierend auf WebKitGTK.</p>
|
||||
<h2>Spyware-Level: <span class="green">Keine Spyware</span></h2>
|
||||
<p>BadWolf <span class="green">stellt nicht ungefragt Verbindungen her.</span></p>
|
||||
<p>BadWolf ist ein guter Browser und definitiv einen Blick wert. Die nützlichsten Funktionen sind der integrierte JavaScript-Schalter und die Option, Bilder standardmässig nicht anzuzeigen.</p>
|
||||
<hr></hr>
|
||||
<h4>Weitere Informationen</h4>
|
||||
<p><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></p>
|
||||
<hr></hr>
|
||||
<p>Dieser Artikel wurde am 19.6.2022 erstellt</p>
|
||||
<p>Dieser Artikel wurde zuletzt am 12.2.2022 bearbeitet</p>
|
||||
<hr></hr>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>BadWolf - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/badwolf.png" alt="BadWolf Logo"/>
|
||||
<h1>BadWolf</h1>
|
||||
<p>Badwolf ist ein minimalistischer und auf Privatsphäre ausgelegter Webbrowser, basierend auf WebKitGTK.</p>
|
||||
<h2>Spyware-Level: <span class="green">Keine Spyware</span></h2>
|
||||
<p>BadWolf <span class="green">stellt nicht ungefragt Verbindungen her.</span></p>
|
||||
<p>BadWolf ist ein guter Browser und definitiv einen Blick wert. Die nützlichsten Funktionen sind der integrierte JavaScript-Schalter und die Option, Bilder standardmässig nicht anzuzeigen.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Weitere Informationen:</h4>
|
||||
<ol>
|
||||
<li><a href="https://hacktivis.me/projects/badwolf">BadWolf Homepage</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>Dieser Artikel wurde am 19.6.2022 erstellt</b>
|
||||
<br/>
|
||||
<b>Dieser Artikel wurde zuletzt am 12.2.2022 bearbeitet</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,168 +1,50 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>Bing — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/bing_logo.png" alt="Bing Logo" />
|
||||
<h1>Bing</h1>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Bing is yet another spyware search engine that collects your
|
||||
information and sells it to advertisers. It's strongly recommended
|
||||
that you do not use Bing.
|
||||
</p>
|
||||
<p>
|
||||
At some point Bing had a privacy policy, but Microsoft doesn't seem to
|
||||
be hosting it anymore. So, this article will look at the Microsoft
|
||||
Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us
|
||||
understand what information Bing collects. Similarly to the privacy
|
||||
policies of Google and Apple, the Microsoft privacy statement eclipses
|
||||
the entire spyware platform and does not help you understand in great
|
||||
detail what kind of information one single program could be
|
||||
collecting. (although this policy is more specific)
|
||||
</p>
|
||||
|
||||
<h3>Bing collects your search history</h3>
|
||||
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<i>
|
||||
"Microsoft collects data from you, through our interactions with you
|
||||
and through our products for a variety of purposes described
|
||||
below. [...] You provide some of this data directly, such as when
|
||||
you [...] submit a search query to Bing"
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Later in the Interactions -> Device and usage data section of this
|
||||
statement, it is clarified again that Microsoft collects your:
|
||||
<i>"Browse History. Data about the web pages you visit."</i>, as well
|
||||
as your:
|
||||
<i
|
||||
>"Images. Images and related information, such as picture metadata.
|
||||
For example, we collect the image you provide when you use a Bing
|
||||
image-enabled service."</i
|
||||
>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Microsoft claims to store this information for an unlimited amount of
|
||||
time, but it claims that it will eventually anonymize this information
|
||||
in a process that takes 18 months to complete.
|
||||
</p>
|
||||
<p></p>
|
||||
|
||||
<p>
|
||||
<i>
|
||||
"Has Microsoft adopted and announced a specific retention period for
|
||||
a certain data type? For example, for Bing search queries, we
|
||||
de-identify stored queries by removing the entirety of the IP
|
||||
address after 6 months, and cookie IDs and other cross-session
|
||||
identifiers after 18 months. "
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<h3>Bing uses your search history to profile you for advertising</h3>
|
||||
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"Microsoft may use data we collect to select and deliver some of the
|
||||
ads you see on Microsoft web properties, such as Microsoft.com, MSN
|
||||
and Bing."
|
||||
</i>
|
||||
</p>
|
||||
<p>
|
||||
So since your search history is part of the "data we collect", the
|
||||
natural conclusion is that, your search queries are being used to
|
||||
profile you for advertising. And of course, this is confirmed in this
|
||||
section:
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<i>
|
||||
"The ads that you see may be selected based on data we process about
|
||||
you, such as your interests and favorites, your location, your
|
||||
transactions, how you use our products,
|
||||
<b>
|
||||
<font color="red"> your search queries </font>
|
||||
</b>
|
||||
, or the content you view. For example, if you view content on MSN
|
||||
about automobiles, we may show advertisements about cars; if you
|
||||
search “pizza places in Seattle” on Bing, you may see advertisements
|
||||
in your search results for restaurants in Seattle."
|
||||
</i>
|
||||
</p>
|
||||
|
||||
<h3>Bing sells your search history to other spyware platforms</h3>
|
||||
|
||||
<p>
|
||||
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"We may share data we collect with third parties, such as Oath,
|
||||
AppNexus, or Facebook (see below), so that the ads you see in our
|
||||
products, their products, or other sites and apps serviced by these
|
||||
partners are more relevant and valuable to you. "
|
||||
</i>
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://privacy.microsoft.com/en-us/privacystatement"
|
||||
>Microsoft Privacy Statement</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/u7eZJ">[archive.li]</a><br />
|
||||
<a href="https://etched.page/b6c0a12757e73a68f1ad76e084aeb32d0123bc4b7aa223623af5440b97ae27c7/https://privacy.microsoft.com/en-us/privacystatement">[etched.page]</a><br />
|
||||
<a href="https://ghostarchive.org/archive/WxFhT?kreymer=false">[ghostarchive.org]</a><br />
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Bing — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/bing_logo.png" alt="Bing Logo"/>
|
||||
<h1>Bing</h1>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Bing is yet another spyware search engine that collects your information and sells it to advertisers. It's strongly recommended that you do not use Bing.</p>
|
||||
<p> At some point Bing had a privacy policy, but Microsoft doesn't seem to be hosting it anymore. So, this article will look at the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us understand what information Bing collects. Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand in great detail what kind of information one single program could be collecting. (although this policy is more specific)</p>
|
||||
<h3>Bing collects your search history</h3>
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described below. [...] You provide some of this data directly, such as when you [...] submit a search query to Bing"</i></p>
|
||||
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your: <i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p>
|
||||
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information in a process that takes 18 months to complete.</p>
|
||||
<p><i>"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months."</i></p>
|
||||
<h3>Bing uses your search history to profile you for advertising</h3>
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."</i></p>
|
||||
<p>So since your search history is part of the "data we collect", the natural conclusion is that, your search queries are being used to profile you for advertising. And of course, this is confirmed in this section:</p>
|
||||
<p><i>"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how you use our products, <b><span class="red"> your search queries</span></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle."</i></p>
|
||||
<h3>Bing sells your search history to other spyware platforms</h3>
|
||||
<p>From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products, their products, or other sites and apps serviced by these partners are more relevant and valuable to you."</i></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a> <a href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement">[web.archive.org]</a> <a href="https://archive.li/u7eZJ">[archive.li]</a> <a href="https://etched.page/b6c0a12757e73a68f1ad76e084aeb32d0123bc4b7aa223623af5440b97ae27c7/https://privacy.microsoft.com/en-us/privacystatement">[etched.page]</a> <a href="https://ghostarchive.org/archive/WxFhT?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,35 +1,38 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/lynx.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>BleachBit - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/bleachbit_logo.png" alt="BleachBit Logo"/>
|
||||
<h1>BleachBit</h1>
|
||||
<p>Bleachbit is Tool to Clean Your System and Free Disk Space. Also, BleachBit can Shred Files.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>BleachBit <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<hr></hr>
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://www.bleachbit.org/">BleachBit Home Page</a></p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 5/1/2022</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>BleachBit - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/bleachbit_logo.png" alt="BleachBit Logo"/>
|
||||
<h1>BleachBit</h1>
|
||||
<p>Bleachbit is Tool to Clean Your System and Free Disk Space. Also, BleachBit can Shred Files.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>BleachBit <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.bleachbit.org/">BleachBit Home Page</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 5/1/2022</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 5/1/2022</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,163 +1,82 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/brave.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Brave - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<img width="130" height="145" src="../images/brave/brave_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Brave</h1>
|
||||
<center>
|
||||
<a href="brave_ru.html">[Русский]</a>
|
||||
</center>
|
||||
<p>Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, a cleaner Preferences menu compared to other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#one">[1]</a></sup> with the built-in privacy protections.</p>
|
||||
<h2>Spyware Level: <span class="orange">High</span></h2>
|
||||
<p>Brave is self updating software, uses <a href="../articles/google.html">Google</a> as the default search engine, has built-in telemetry, and even has an opt-out rss-like news feed similar to Firefox Pocket. These shouldn't be the things that come to mind if someone were to imagine a privacy oriented browser.</p>
|
||||
<h3>Auto-updates</h3>
|
||||
<p>Brave will check for updates every time you run it, and you can't turn it off from the browser. Athough, it's on Brave's low priority list to add an option to do so.<sup><a href="#two">[2]</a></sup> The reason why it's low priority would be because it's been over a year and there hasn't been an implementation of it yet.</p>
|
||||
<h3>Brave has built-in telemetry</h3>
|
||||
<p>While running, Brave will make lots of requests to the domain <code>p3a.brave.com</code> as telemetry. They claim they store the collected data for several days.<sup><a href="#eight">[8]</a></sup> This feature is an opt-out that can be disabled. This opt-out can be disabled <a href="brave://settings/privacy">here</a>.</p>
|
||||
<h3>Brave Today</h3>
|
||||
<p>Brave now has new feature similar to Firefox Pocket called Brave Today. If you don't know what Firefox Pocket is, it's basically an rss-like news feed that's shown in every blank tab. This feature Brave has is sadly an opt-out rather than an opt-in and sends lots of requests to Brave's servers. It can't seem to be disabled it in and of itself, but <a href="brave://settings/newTab">setting the tabs to blank</a> seems to stop the requests.</p>
|
||||
<h3>SafeBrowsing</h3>
|
||||
<p>Brave uses SafeBrowsing. It's a feature that tries to "protect" the user from potentially unsafe websites and extensions. However, it sends requests to fetch the information required. Brave's SafeBrowsing is powered by google.<sup><a href="#ten">[10]</a></sup> This opt-out can be disabled <a href="brave://settings/security">here</a>.</p>
|
||||
<h3>Brave Rewards</h3>
|
||||
<p>Brave has a rewards program. You can find more information about it here.<sup><a href="#three">[3]</a></sup> At first glance it looks like the rewards program is an opt-in, but the browser makes requests to these domains regardless if you sign up or not:</p>
|
||||
<div class="center">
|
||||
<p><code>rewards.brave.com</code></p>
|
||||
<p><code>api.rewards.brave.com</code></p>
|
||||
<p><code>grant.rewards.brave.com</code></p>
|
||||
</div>
|
||||
<p>A quick update: These requests have been reported as a bug and for the most part have been fixed (with a couple exceptions). I'll remove this section once the bug has been completely fixed.<sup><a href="#twelve">[12]</a></sup></p>
|
||||
<h3>Miscellaneous requests worth noting</h3>
|
||||
<p>Brave on first run sends a request to fetch the library used for checking spelling errors:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-dict.png" alt="brave spelling library"/>
|
||||
<p>Brave on startup sends a request to <code>variations.brave.com</code>. Brave uses this to turn on and off features. There isn't a way to disable this as of yet.<sup><a href="#eleven">[11]</a></sup></p>
|
||||
<img class="screenshot" src="../images/brave/brave-cert.png" alt="brave verification tool"/>
|
||||
<p>Brave fetches the list of affiliates through <code>laptop-updates.brave.com</code>:</p>
|
||||
<img class="screenshot" src="../images/brave/custom-headers.png" alt="custom headers"/>
|
||||
<p>Brave makes a request to <code>static1.brave.com</code> every once and a while, which looks like it's used to fetch plugin information?<sup><a href="#four">[4]</a></sup> When the url was placed into the browser, it was directed to Google's error 404 page.<sup><a href="#nine">[9]</a></sup></p>
|
||||
<img class="screenshot" src="../images/brave/brave-static.png" alt="static brave"/>
|
||||
<img class="screenshot" src="../images/brave/google-brave.png" alt="google error 404"/>
|
||||
<p>A quick <code>curl --head static1.brave.com</code> shows that Brave uses Google's gstatic, which uses Cloudflare as well:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-gstatic.png" alt="google error 404"/>
|
||||
<p>On the first run, Brave fetches five extensions from <code>brave-core-ext.s3.brave.com</code> and tries to install them:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-extensions.png" alt="brave extensions"/>
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p><a href="../articles/google.html">Google</a> is the default search engine of Brave. For a browser that claims to be privacy oriented, this is a red flag. They at least make it easy for you to change the default search engine on the first run.</p>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h4>Sources</h4>
|
||||
|
||||
<p>
|
||||
<a id="one">1.</a>
|
||||
<a href="https://brave.com">Brave's website</a>
|
||||
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a>
|
||||
<a href="https://archive.is/AjZnv">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/JNS4O">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/5576">Add a disable autoupdate feature</a>
|
||||
<a href="https://web.archive.org/web/20190530053311/https://github.com/brave/brave-browser/issues/5576">[web.archive.org]</a>
|
||||
<a href="https://archive.is/NzRxTgm">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/6KRXL?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="three">3.</a>
|
||||
<a href="https://brave.com/brave-rewards">Brave Rewards Program</a>
|
||||
<a href="https://web.archive.org/web/20201227180815/https://brave.com/brave-rewards">[web.archive.org]</a>
|
||||
<a href="https://archive.is/0mLht">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/F5lWl?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="four">4.</a>
|
||||
<a href="https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">Plugin Information?</a>
|
||||
<a href="https://web.archive.org/web/20201229155943/https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/owALS?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="five">5.</a>
|
||||
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">Facebook, Twitter Trackers Whitelisted by Brave Browser</a>
|
||||
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="six">6.</a>
|
||||
<a href="https://brave.com/features/">Brave Browser Features</a>
|
||||
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features">[web.archive.org]</a>
|
||||
<a href="https://archive.is/UxdJf">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/vYNnv?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="seven">7.</a>
|
||||
<a href="https://brave.com/script-blocking-exceptions-update">Script Blocking Exceptions Update</a>
|
||||
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a>
|
||||
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="eight">8.</a>
|
||||
<a href="https://brave.com/privacy-preserving-product-analytics-p3a">Brave's Analytics</a>
|
||||
<a href="https://web.archive.org/web/20201229081726/https://brave.com/privacy-preserving-product-analytics-p3a">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/ZoBSr?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="nine">9.</a>
|
||||
<!-- nothing there ? -->
|
||||
<a href="https://static1.brave.com">Brave's static site</a>
|
||||
<a href="https://archive.is/wWgtG">[archive.is]</a>
|
||||
<a href="https://web.archive.org/web/20190428070726/https://static1.brave.com/">[archive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="ten">10.</a>
|
||||
<a href="https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">Brave's Deviations from Chromium</a>
|
||||
<a href="https://web.archive.org/web/20210611085211/https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/RswOH?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="eleven">11.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/15711">Allow to opt-out of Griffin variations</a>
|
||||
<a href="https://web.archive.org/web/20210612013031/https://github.com/brave/brave-browser/issues/15711">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/oWzlF?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="twelve">12.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/14277">Only make requests to *.rewards.brave.com...</a>
|
||||
<a href="https://web.archive.org/web/20210621011812/https://github.com/brave/brave-browser/issues/14277">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<hr></hr>
|
||||
<b>This article was created on 5/7/2018</b><br/>
|
||||
<b>This article was last edited on 8/17/2021</b>
|
||||
<hr></hr>
|
||||
<!-- Don't edit below -->
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Brave - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/brave/brave_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Brave</h1>
|
||||
<p>Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, a cleaner Preferences menu compared to other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#s1">[1]</a></sup> with the built-in privacy protections.</p>
|
||||
<h2>Spyware Level: <span class="orange">High</span></h2>
|
||||
<p>Brave is self updating software, uses <a href="../articles/google.html">Google</a> as the default search engine, has built-in telemetry, and even has an opt-out rss-like news feed similar to Firefox Pocket. These shouldn't be the things that come to mind if someone were to imagine a privacy oriented browser.</p>
|
||||
<h3>Auto-updates</h3>
|
||||
<p>Brave will check for updates every time you run it, and you can't turn it off from the browser. Athough, it's on Brave's low priority list to add an option to do so.<sup><a href="#s2">[2]</a></sup> The reason why it's low priority would be because it's been over a year and there hasn't been an implementation of it yet.</p>
|
||||
<h3>Brave has built-in telemetry</h3>
|
||||
<p>While running, Brave will make lots of requests to the domain <code>p3a.brave.com</code> as telemetry. They claim they store the collected data for several days.<sup><a href="#s8">[8]</a></sup> This feature is an opt-out that can be disabled. This opt-out can be disabled <a href="brave://settings/privacy">here</a>.</p>
|
||||
<h3>Brave Today</h3>
|
||||
<p>Brave now has new feature similar to Firefox Pocket called Brave Today. If you don't know what Firefox Pocket is, it's basically an rss-like news feed that's shown in every blank tab. This feature Brave has is sadly an opt-out rather than an opt-in and sends lots of requests to Brave's servers. It can't seem to be disabled it in and of itself, but <a href="brave://settings/newTab">setting the tabs to blank</a> seems to stop the requests.</p>
|
||||
<h3>SafeBrowsing</h3>
|
||||
<p>Brave uses SafeBrowsing. It's a feature that tries to "protect" the user from potentially unsafe websites and extensions. However, it sends requests to fetch the information required. Brave's SafeBrowsing is powered by google.<sup><a href="#s10">[10]</a></sup> This opt-out can be disabled <a href="brave://settings/security">here</a>.</p>
|
||||
<h3>Brave Rewards</h3>
|
||||
<p>Brave has a rewards program. You can find more information about it here.<sup><a href="#s3">[3]</a></sup> At first glance it looks like the rewards program is an opt-in, but the browser makes requests to these domains regardless if you sign up or not:</p>
|
||||
<div class="center">
|
||||
<p><code>rewards.brave.com</code></p>
|
||||
<p><code>api.rewards.brave.com</code></p>
|
||||
<p><code>grant.rewards.brave.com</code></p>
|
||||
</div>
|
||||
<p>A quick update: These requests have been reported as a bug and for the most part have been fixed (with a couple exceptions). I'll remove this section once the bug has been completely fixed.<sup><a href="#s12">[12]</a></sup></p>
|
||||
<h3>Miscellaneous requests worth noting</h3>
|
||||
<p>Brave on first run sends a request to fetch the library used for checking spelling errors:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-dict.png" alt="brave spelling library"/>
|
||||
<p>Brave on startup sends a request to <code>variations.brave.com</code>. Brave uses this to turn on and off features. There isn't a way to disable this as of yet.<sup><a href="#s11">[11]</a></sup></p>
|
||||
<img class="screenshot" src="../images/brave/brave-cert.png" alt="brave verification tool"/>
|
||||
<p>Brave fetches the list of affiliates through <code>laptop-updates.brave.com</code>:</p>
|
||||
<img class="screenshot" src="../images/brave/custom-headers.png" alt="custom headers"/>
|
||||
<p>Brave makes a request to <code>static1.brave.com</code> every once and a while, which looks like it's used to fetch plugin information?<sup><a href="#s4">[4]</a></sup> When the url was placed into the browser, it was directed to Google's error 404 page.<sup><a href="#s9">[9]</a></sup></p>
|
||||
<img class="screenshot" src="../images/brave/brave-static.png" alt="static brave"/>
|
||||
<img class="screenshot" src="../images/brave/google-brave.png" alt="google error 404"/>
|
||||
<p>A quick <code>curl --head static1.brave.com</code> shows that Brave uses Google's gstatic, which uses Cloudflare as well:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-gstatic.png" alt="google error 404"/>
|
||||
<p>On the first run, Brave fetches five extensions from <code>brave-core-ext.s3.brave.com</code> and tries to install them:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-extensions.png" alt="brave extensions"/>
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p><a href="../articles/google.html">Google</a> is the default search engine of Brave. For a browser that claims to be privacy oriented, this is a red flag. They at least make it easy for you to change the default search engine on the first run.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://brave.com">Brave's website</a> <a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a> <a href="https://archive.is/AjZnv">[archive.is]</a> <a href="https://ghostarchive.org/archive/JNS4O">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://github.com/brave/brave-browser/issues/5576">Add a disable autoupdate feature</a> <a href="https://web.archive.org/web/20190530053311/https://github.com/brave/brave-browser/issues/5576">[web.archive.org]</a> <a href="https://archive.is/NzRxTgm">[archive.is]</a> <a href="https://ghostarchive.org/archive/6KRXL?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://brave.com/brave-rewards">Brave Rewards Program</a> <a href="https://web.archive.org/web/20201227180815/https://brave.com/brave-rewards">[web.archive.org]</a> <a href="https://archive.is/0mLht">[archive.is]</a> <a href="https://ghostarchive.org/archive/F5lWl?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">Plugin Information?</a> <a href="https://web.archive.org/web/20201229155943/https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/owALS?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">Facebook, Twitter Trackers Whitelisted by Brave Browser</a> <a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://brave.com/features/">Brave Browser Features</a> <a href="http://web.archive.org/web/20190124134301/https://brave.com/features">[web.archive.org]</a> <a href="https://archive.is/UxdJf">[archive.is]</a> <a href="https://ghostarchive.org/archive/vYNnv?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://brave.com/script-blocking-exceptions-update">Script Blocking Exceptions Update</a> <a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://brave.com/privacy-preserving-product-analytics-p3a">Brave's Analytics</a> <a href="https://web.archive.org/web/20201229081726/https://brave.com/privacy-preserving-product-analytics-p3a">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/ZoBSr?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s9"><a href="https://static1.brave.com">Brave's static site</a> <a href="https://archive.is/wWgtG">[archive.is]</a> <a href="https://web.archive.org/web/20190428070726/https://static1.brave.com/">[archive.org]</a></li>
|
||||
<li id="s10"><a href="https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">Brave's Deviations from Chromium</a> <a href="https://web.archive.org/web/20210611085211/https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/RswOH?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s11"><a href="https://github.com/brave/brave-browser/issues/15711">Allow to opt-out of Griffin variations</a> <a href="https://web.archive.org/web/20210612013031/https://github.com/brave/brave-browser/issues/15711">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/oWzlF?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s12"><a href="https://github.com/brave/brave-browser/issues/14277">Only make requests to *.rewards.brave.com...</a> <a href="https://web.archive.org/web/20210621011812/https://github.com/brave/brave-browser/issues/14277">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 5/7/2018</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 8/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,160 +1,82 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/brave.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Brave - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Каталог</a>
|
||||
</div>
|
||||
<img width="130" height="145" src="../images/brave/brave_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Brave</h1>
|
||||
<center>
|
||||
<a href="brave.html">[English]</a>
|
||||
</center>
|
||||
<p>Brave Browser - форк Chromium'а со множеством интересных возможностей, которых нет где-либо еще, такие как встроенный блокировщик рекламы и другие расширения, защита от отпечатков браузера, менее загруженное меню по сравнению с другими форками Chrome и встроенная возможность для автоматического пожертвования сайтам, которые вы посещаете. Разработчики описывают его как <i>"Браузер, защищающий ваши интересы"</i><sup><a href="#one">[1]</a></sup> со встроенной защитой конфиденциальности пользователя.</p>
|
||||
<h2>Уровень слежки: <span class="orange">Высокий</span></h2>
|
||||
<p>Brave обновляется автоматически, использует <a href="../articles/google.html">Google</a> в качестве поисковика по умолчанию, имеет встроенную телеметрию и даже имеет ленту новостей, похожую на Firefox Pocket. Этого не должно быть в браузере, который ориентирован на конфиденциальность пользователя.</p>
|
||||
<h3>Автоматические обновления</h3>
|
||||
<p>Brave будет проверять обновления каждый раз, когда вы его запускаете, и вы не можете это отключить. Добавление данной опции обладает низким приоритетом в разработке Brave<sup><a href="#two">[2]</a></sup>, так как прошло уже больше года и её всё еще нет.</p>
|
||||
<h3>Brave has built-in telemetry</h3>
|
||||
<p>Во время работы Brave будет делать много запросов к домену <code>p3a.brave.com</code> в качестве телеметрии. Они утверждают, что хранят данные только несколько дней<sup><a href="#eight">[8]</a></sup>. Эта опция может быть отключена <a href="brave://settings/privacy">здесь</a>.</p>
|
||||
<h3>Brave Today</h3>
|
||||
<p>Brave содержит сервис похожий на Firefox Pocket - Brave Today. Это новостная лента, которая показывается на каждой пустой новой вкладке. Эта возможность к сожалению включена по умолчанию и посылает множество запросов к серверам Brave. Кажется, что нельзя отключить эту опцию, но если <a href="brave://settings/newTab">установить новые вкладки как пустые</a>, то похоже, что это останавливает запросы.</p>
|
||||
<h3>SafeBrowsing</h3>
|
||||
<p>Brave использует SafeBrowsing. Это функция, которая пытается "защитить" пользователя от возможных небезопасных веб-сайтов и расширений. Однако, она посылает запросы, чтобы получить требуемую информацию. Brave SafeBrowsing поддерживается Google<sup><a href="#ten">[10]</a></sup>. Данная функция может быть отключена <a href="brave://settings/security">здесь</a>.</p>
|
||||
<h3>Brave Rewards</h3>
|
||||
<p>У Brave есть программа вознаграждений<sup><a href="#three">[3]</a></sup>. На первый взгляд кажется, что она необязательна, но браузер делает запросы к доменам ниже независимо от регистрации в программе:</p>
|
||||
<div class="center">
|
||||
<p><code>rewards.brave.com</code></p>
|
||||
<p><code>api.rewards.brave.com</code></p>
|
||||
<p><code>grant.rewards.brave.com</code></p>
|
||||
</div>
|
||||
<p>Небольшое дополнение: об этих запросах сообщалось как об ошибках, и по большей части они исправлены (за несколькими исключениями). Этот раздел будет удалён, как только ошибки будут полностью исправлены<sup><a href="#twelve">[12]</a></sup>.</p>
|
||||
<h3>Другие запросы которые стоит отметить</h3>
|
||||
<p>При первом запуске Brave отправляет запрос, чтобы получить библиотеку для проверки орфографии.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-dict.png" alt="brave spelling library"/>
|
||||
<p>При старте Brave посылает запросы к <code>variations.brave.com</code>. Brave использует это для включения и выключения функций. Пока нет никакого способа отключить это<sup><a href="#eleven">[11]</a></sup>.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-cert.png" alt="brave verification tool"/>
|
||||
<p>Brave получает список партнёров через запросы к <code>laptop-updates.brave.com</code>:</p>
|
||||
<img class="screenshot" src="../images/brave/custom-headers.png" alt="custom headers"/>
|
||||
<p>Время от времени Brave делает запрос к <code>static1.brave.com</code>, что выглядит как будто он пытается получить информацию о плагинах<sup><a href="#four">[4]</a></sup>. В браузере эта ссылка ведёт на страницу Google с ошибкой 404<sup><a href="#nine">[9]</a></sup>.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-static.png" alt="static brave"/>
|
||||
<img class="screenshot" src="../images/brave/google-brave.png" alt="google error 404"/>
|
||||
<p>Команда <code>curl --head static1.brave.com</code> показывает, что Brave использует Google gstatic, который также использует Cloudflare:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-gstatic.png" alt="google error 404"/>
|
||||
<p>При первом запуске Brave скачивает пять расширений из <code>brave-core-ext.s3.brave.com</code> и пытается установить их:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-extensions.png" alt="brave extensions"/>
|
||||
<h3>Не связано со слежением, но стоит отметить</h3>
|
||||
<h3>Неконфиденциальный поисковик по умолчанию</h3>
|
||||
<p><a href="../articles/google.html">Google</a> - стандартная поисковая система в Brave. Это очень странно для браузера, позиционирующего себя приватным. По крайней мере, при первом запуске Brave даёт выбор поисковой системы по умолчанию.</p>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h4>Источники</h4>
|
||||
<p>
|
||||
<a id="one">1.</a>
|
||||
<a href="https://brave.com">Brave's website</a>
|
||||
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a>
|
||||
<a href="https://archive.is/AjZnv">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/JNS4O">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/5576">Add a disable autoupdate feature</a>
|
||||
<a href="https://web.archive.org/web/20190530053311/https://github.com/brave/brave-browser/issues/5576">[web.archive.org]</a>
|
||||
<a href="https://archive.is/NzRxTgm">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/6KRXL?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="three">3.</a>
|
||||
<a href="https://brave.com/brave-rewards">Brave Rewards Program</a>
|
||||
<a href="https://web.archive.org/web/20201227180815/https://brave.com/brave-rewards">[web.archive.org]</a>
|
||||
<a href="https://archive.is/0mLht">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/F5lWl?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="four">4.</a>
|
||||
<a href="https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">Plugin Information?</a>
|
||||
<a href="https://web.archive.org/web/20201229155943/https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/owALS?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="five">5.</a>
|
||||
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">Facebook, Twitter Trackers Whitelisted by Brave Browser</a>
|
||||
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="six">6.</a>
|
||||
<a href="https://brave.com/features/">Brave Browser Features</a>
|
||||
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features">[web.archive.org]</a>
|
||||
<a href="https://archive.is/UxdJf">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/vYNnv?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="seven">7.</a>
|
||||
<a href="https://brave.com/script-blocking-exceptions-update">Script Blocking Exceptions Update</a>
|
||||
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a>
|
||||
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="eight">8.</a>
|
||||
<a href="https://brave.com/privacy-preserving-product-analytics-p3a">Brave's Analytics</a>
|
||||
<a href="https://web.archive.org/web/20201229081726/https://brave.com/privacy-preserving-product-analytics-p3a">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/ZoBSr?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="nine">9.</a>
|
||||
<!-- nothing there ? -->
|
||||
<a href="https://static1.brave.com">Brave's static site</a>
|
||||
<a href="https://archive.is/wWgtG">[archive.is]</a>
|
||||
<a href="https://web.archive.org/web/20190428070726/https://static1.brave.com/">[archive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="ten">10.</a>
|
||||
<a href="https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">Brave's Deviations from Chromium</a>
|
||||
<a href="https://web.archive.org/web/20210611085211/https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/RswOH?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="eleven">11.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/15711">Allow to opt-out of Griffin variations</a>
|
||||
<a href="https://web.archive.org/web/20210612013031/https://github.com/brave/brave-browser/issues/15711">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/oWzlF?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<a id="twelve">12.</a>
|
||||
<a href="https://github.com/brave/brave-browser/issues/14277">Only make requests to *.rewards.brave.com...</a>
|
||||
<a href="https://web.archive.org/web/20210621011812/https://github.com/brave/brave-browser/issues/14277">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<hr></hr>
|
||||
<b>Этот перевод был создан 13/07/2021</b><br/>
|
||||
<b>Этот перевод в последний раз изменялся 13/07/2021</b>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="ru" xml:lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Brave - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Каталог</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/brave/brave_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Brave</h1>
|
||||
<p>Brave Browser - форк Chromium'а со множеством интересных возможностей, которых нет где-либо еще, такие как встроенный блокировщик рекламы и другие расширения, защита от отпечатков браузера, менее загруженное меню по сравнению с другими форками Chrome и встроенная возможность для автоматического пожертвования сайтам, которые вы посещаете. Разработчики описывают его как <i>"Браузер, защищающий ваши интересы"</i><sup><a href="#s1">[1]</a></sup> со встроенной защитой конфиденциальности пользователя.</p>
|
||||
<h2>Уровень слежки: <span class="orange">Высокий</span></h2>
|
||||
<p>Brave обновляется автоматически, использует <a href="../articles/google.html">Google</a> в качестве поисковика по умолчанию, имеет встроенную телеметрию и даже имеет ленту новостей, похожую на Firefox Pocket. Этого не должно быть в браузере, который ориентирован на конфиденциальность пользователя.</p>
|
||||
<h3>Автоматические обновления</h3>
|
||||
<p>Brave будет проверять обновления каждый раз, когда вы его запускаете, и вы не можете это отключить. Добавление данной опции обладает низким приоритетом в разработке Brave<sup><a href="#s2">[2]</a></sup>, так как прошло уже больше года и её всё еще нет.</p>
|
||||
<h3>Brave has built-in telemetry</h3>
|
||||
<p>Во время работы Brave будет делать много запросов к домену <code>p3a.brave.com</code> в качестве телеметрии. Они утверждают, что хранят данные только несколько дней<sup><a href="#s8">[8]</a></sup>. Эта опция может быть отключена <a href="brave://settings/privacy">здесь</a>.</p>
|
||||
<h3>Brave Today</h3>
|
||||
<p>Brave содержит сервис похожий на Firefox Pocket - Brave Today. Это новостная лента, которая показывается на каждой пустой новой вкладке. Эта возможность к сожалению включена по умолчанию и посылает множество запросов к серверам Brave. Кажется, что нельзя отключить эту опцию, но если <a href="brave://settings/newTab">установить новые вкладки как пустые</a>, то похоже, что это останавливает запросы.</p>
|
||||
<h3>SafeBrowsing</h3>
|
||||
<p>Brave использует SafeBrowsing. Это функция, которая пытается "защитить" пользователя от возможных небезопасных веб-сайтов и расширений. Однако, она посылает запросы, чтобы получить требуемую информацию. Brave SafeBrowsing поддерживается Google<sup><a href="#s10">[10]</a></sup>. Данная функция может быть отключена <a href="brave://settings/security">здесь</a>.</p>
|
||||
<h3>Brave Rewards</h3>
|
||||
<p>У Brave есть программа вознаграждений<sup><a href="#s3">[3]</a></sup>. На первый взгляд кажется, что она необязательна, но браузер делает запросы к доменам ниже независимо от регистрации в программе:</p>
|
||||
<div class="center">
|
||||
<p><code>rewards.brave.com</code></p>
|
||||
<p><code>api.rewards.brave.com</code></p>
|
||||
<p><code>grant.rewards.brave.com</code></p>
|
||||
</div>
|
||||
<p>Небольшое дополнение: об этих запросах сообщалось как об ошибках, и по большей части они исправлены (за несколькими исключениями). Этот раздел будет удалён, как только ошибки будут полностью исправлены<sup><a href="#s12">[12]</a></sup>.</p>
|
||||
<h3>Другие запросы которые стоит отметить</h3>
|
||||
<p>При первом запуске Brave отправляет запрос, чтобы получить библиотеку для проверки орфографии.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-dict.png" alt="brave spelling library"/>
|
||||
<p>При старте Brave посылает запросы к <code>variations.brave.com</code>. Brave использует это для включения и выключения функций. Пока нет никакого способа отключить это<sup><a href="#s11">[11]</a></sup>.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-cert.png" alt="brave verification tool"/>
|
||||
<p>Brave получает список партнёров через запросы к <code>laptop-updates.brave.com</code>:</p>
|
||||
<img class="screenshot" src="../images/brave/custom-headers.png" alt="custom headers"/>
|
||||
<p>Время от времени Brave делает запрос к <code>static1.brave.com</code>, что выглядит как будто он пытается получить информацию о плагинах<sup><a href="#s4">[4]</a></sup>. В браузере эта ссылка ведёт на страницу Google с ошибкой 404<sup><a href="#s9">[9]</a></sup>.</p>
|
||||
<img class="screenshot" src="../images/brave/brave-static.png" alt="static brave"/>
|
||||
<img class="screenshot" src="../images/brave/google-brave.png" alt="google error 404"/>
|
||||
<p>Команда <code>curl --head static1.brave.com</code> показывает, что Brave использует Google gstatic, который также использует Cloudflare:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-gstatic.png" alt="google error 404"/>
|
||||
<p>При первом запуске Brave скачивает пять расширений из <code>brave-core-ext.s3.brave.com</code> и пытается установить их:</p>
|
||||
<img class="screenshot" src="../images/brave/brave-extensions.png" alt="brave extensions"/>
|
||||
<h3>Не связано со слежением, но стоит отметить</h3>
|
||||
<h3>Неконфиденциальный поисковик по умолчанию</h3>
|
||||
<p><a href="../articles/google.html">Google</a> - стандартная поисковая система в Brave. Это очень странно для браузера, позиционирующего себя приватным. По крайней мере, при первом запуске Brave даёт выбор поисковой системы по умолчанию.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://brave.com">Brave's website</a> <a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a> <a href="https://archive.is/AjZnv">[archive.is]</a> <a href="https://ghostarchive.org/archive/JNS4O">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://github.com/brave/brave-browser/issues/5576">Add a disable autoupdate feature</a> <a href="https://web.archive.org/web/20190530053311/https://github.com/brave/brave-browser/issues/5576">[web.archive.org]</a> <a href="https://archive.is/NzRxTgm">[archive.is]</a> <a href="https://ghostarchive.org/archive/6KRXL?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://brave.com/brave-rewards">Brave Rewards Program</a> <a href="https://web.archive.org/web/20201227180815/https://brave.com/brave-rewards">[web.archive.org]</a> <a href="https://archive.is/0mLht">[archive.is]</a> <a href="https://ghostarchive.org/archive/F5lWl?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">Plugin Information?</a> <a href="https://web.archive.org/web/20201229155943/https://static1.brave.com/chrome/config/plugins_3/plugins_linux.json">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/owALS?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">Facebook, Twitter Trackers Whitelisted by Brave Browser</a> <a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://brave.com/features/">Brave Browser Features</a> <a href="http://web.archive.org/web/20190124134301/https://brave.com/features">[web.archive.org]</a> <a href="https://archive.is/UxdJf">[archive.is]</a> <a href="https://ghostarchive.org/archive/vYNnv?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://brave.com/script-blocking-exceptions-update">Script Blocking Exceptions Update</a> <a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/i1mvb?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://brave.com/privacy-preserving-product-analytics-p3a">Brave's Analytics</a> <a href="https://web.archive.org/web/20201229081726/https://brave.com/privacy-preserving-product-analytics-p3a">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/ZoBSr?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s9"><a href="https://static1.brave.com">Brave's static site</a> <a href="https://archive.is/wWgtG">[archive.is]</a> <a href="https://web.archive.org/web/20190428070726/https://static1.brave.com/">[archive.org]</a></li>
|
||||
<li id="s10"><a href="https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">Brave's Deviations from Chromium</a> <a href="https://web.archive.org/web/20210611085211/https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/RswOH?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s11"><a href="https://github.com/brave/brave-browser/issues/15711">Allow to opt-out of Griffin variations</a> <a href="https://web.archive.org/web/20210612013031/https://github.com/brave/brave-browser/issues/15711">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/oWzlF?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s12"><a href="https://github.com/brave/brave-browser/issues/14277">Only make requests to *.rewards.brave.com...</a> <a href="https://web.archive.org/web/20210621011812/https://github.com/brave/brave-browser/issues/14277">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/cuTZl?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>Этот перевод был создан 13/07/2021</b>
|
||||
<br/>
|
||||
<b>Этот перевод в последний раз изменялся 13/07/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,181 +1,65 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<title>CCleaner — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ccleaner_logo.png" alt="CCleaner Logo" />
|
||||
<h1>CCleaner</h1>
|
||||
<p>
|
||||
CCleaner, developed by Piriform, is a utility program used to clean
|
||||
potentially unwanted files and invalid Windows Registry entries from a
|
||||
computer.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
CCleaner is spyware that collects your personal information to
|
||||
advertise to you. It also sells your information to third parties so
|
||||
that they can advertise to you. It collects a huge amount of very
|
||||
personal information, like your
|
||||
<b><font color="red">physical location.</font></b> CCleaner uses the
|
||||
technique of privacy policy obfuscation where it provides one privacy
|
||||
policy for every single product its company offers, making it more
|
||||
difficult to know what parts of the privacy policy apply to which
|
||||
program.
|
||||
</p>
|
||||
<h3>CCleaner collects and sells user information to advertisers</h3>
|
||||
<p>
|
||||
CCleaner clearly shows in its privacy settings that it is collecting
|
||||
information about your computer and selling that information to
|
||||
advertisers. Below is a screenshot on how to mitigate some of it.
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/ccleaner_privacy.png"
|
||||
alt="CCleaner privacy settings"
|
||||
/>
|
||||
<p>
|
||||
Image Source: <sup><a href="#s2">[2]</a></sup>
|
||||
</p>
|
||||
|
||||
<h3>CCleaner tracks a huge amount of personal information</h3>
|
||||
<p>
|
||||
If we look at the privacy policy, we can see that CCleaner reports the
|
||||
following<sup><a href="#s3">[3]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Unique User ID</li>
|
||||
<li>Operating System</li>
|
||||
<li>Other Avast Products installed</li>
|
||||
<li>
|
||||
<b><font color="red">physical location</font></b>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Beyond this, CCleaner is integrated with the following spyware
|
||||
platforms, which all collect their own sets of information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Google Analytics</li>
|
||||
<li>Logentries</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
It would be very time-consuming to go through all of those privacy
|
||||
policies (especially because many of these are obfuscated), but it
|
||||
should be enough to understand that CCleaner is full of third party
|
||||
spyware, as well as first party spyware.
|
||||
</p>
|
||||
<h3>CCleaner sends you spam email</h3>
|
||||
<p>
|
||||
From the privacy policy<sup><a href="#s3">[3]</a></sup
|
||||
>:
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"When we collect your email address, we may market our other
|
||||
products and services to you. You may choose to unsubscribe from
|
||||
future email marketing by following the instructions in the email."
|
||||
</i>
|
||||
</p>
|
||||
<h3>CCleaner tracks your physical location</h3>
|
||||
<p>
|
||||
According to the privacy policy, the CCleaner website tries to track
|
||||
your physical location.<sup><a href="#s3">[3]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
<i>
|
||||
"Our websites use cookies to acquire data that may be used to
|
||||
determine your physical location via your Internet Protocol address
|
||||
(“IP Address”) and automated geolocation techniques, or to acquire
|
||||
basic information about the computer, tablet, or mobile phone that
|
||||
you use to visit us."
|
||||
</i>
|
||||
</p>
|
||||
<p>
|
||||
<i>"location data"</i> is also mentioned when talking about the
|
||||
information that CCleaner itself collects about its users.
|
||||
</p>
|
||||
<h3>Past Security Flaws</h3>
|
||||
<p>
|
||||
In the past, CCleaner has been compromised and backdoors have been
|
||||
added to it.<sup><a href="#s1">[1]</a></sup>
|
||||
</p>
|
||||
</div>
|
||||
<hr />
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a
|
||||
href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
|
||||
>
|
||||
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud
|
||||
v1.07.3191 for 32-bit Windows users
|
||||
</a>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
|
||||
>[web.archive.org]</a>
|
||||
<a
|
||||
href="https://archive.is/UqWcU"
|
||||
>[archive.is]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a
|
||||
href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
|
||||
>CCleaner Privacy Issue
|
||||
</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.is/HJFBP">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/30k0A">[ghostarchive.org]</a>
|
||||
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="http://www.ccleaner.com/about/privacy-policy"
|
||||
>What Happens to Your Data</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="http://archive.is/DFJTA">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/nYo9M?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was last edited on 8/21/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"
|
||||
><img class="icon" src="../images/cc0.png" alt="CC0 License"
|
||||
/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>CCleaner — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ccleaner_logo.png" alt="CCleaner Logo"/>
|
||||
<h1>CCleaner</h1>
|
||||
<p>CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p> CCleaner is spyware that collects your personal information to advertise to you. It also sells your information to third parties so that they can advertise to you. It collects a huge amount of very personal information, like your <b><span class="red">physical location</span></b>. CCleaner uses the technique of privacy policy obfuscation where it provides one privacy policy for every single product its company offers, making it more difficult to know what parts of the privacy policy apply to which program.</p>
|
||||
<h3>CCleaner collects and sells user information to advertisers</h3>
|
||||
<p> CCleaner clearly shows in its privacy settings that it is collecting information about your computer and selling that information to advertisers. Below is a screenshot on how to mitigate some of it.</p>
|
||||
<img class="screenshot" src="../images/ccleaner_privacy.png" alt="CCleaner privacy settings"/>
|
||||
<p>Image Source: <sup><a href="#s2">[2]</a></sup></p>
|
||||
<h3>CCleaner tracks a huge amount of personal information</h3>
|
||||
<p> If we look at the privacy policy, we can see that CCleaner reports the following<sup><a href="#s3">[3]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Unique User ID</li>
|
||||
<li>Operating System</li>
|
||||
<li>Other Avast Products installed</li>
|
||||
<li><b><span class="red">physical location</span></b></li>
|
||||
</ul>
|
||||
<p>Beyond this, CCleaner is integrated with the following spyware platforms, which all collect their own sets of information:</p>
|
||||
<ul>
|
||||
<li>Google Analytics</li>
|
||||
<li>Logentries</li>
|
||||
</ul>
|
||||
<p>It would be very time-consuming to go through all of those privacy policies (especially because many of these are obfuscated), but it should be enough to understand that CCleaner is full of third party spyware, as well as first party spyware.</p>
|
||||
<h3>CCleaner sends you spam email</h3>
|
||||
<p>From the privacy policy<sup><a href="#s3">[3]</a></sup>:</p>
|
||||
<p><i>"When we collect your email address, we may market our other products and services to you. You may choose to unsubscribe from future email marketing by following the instructions in the email."</i></p>
|
||||
<h3>CCleaner tracks your physical location</h3>
|
||||
<p>According to the privacy policy, the CCleaner website tries to track your physical location.<sup><a href="#s3">[3]</a></sup></p>
|
||||
<p><i>"Our websites use cookies to acquire data that may be used to determine your physical location via your Internet Protocol address (“IP Address”) and automated geolocation techniques, or to acquire basic information about the computer, tablet, or mobile phone that you use to visit us."</i></p>
|
||||
<p><i>"location data"</i> is also mentioned when talking about the information that CCleaner itself collects about its users.</p>
|
||||
<h3>Past Security Flaws</h3>
|
||||
<p>In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#s1">[1]</a></sup></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users</a> <a href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">[web.archive.org]</a> <a href="https://archive.is/UqWcU">[archive.is]</a></li>
|
||||
<li id="s2"><a href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">CCleaner Privacy Issue</a> <a href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">[web.archive.org]</a> <a href="https://archive.is/HJFBP">[archive.is]</a> <a href="https://ghostarchive.org/archive/30k0A">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="http://www.ccleaner.com/about/privacy-policy">What Happens to Your Data</a> <a href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy">[web.archive.org]</a> <a href="http://archive.is/DFJTA">[archive.is]</a> <a href="https://ghostarchive.org/archive/nYo9M?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/21/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,83 +1,37 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>CDex — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/cdex_logo.png" alt="CDex Logo" />
|
||||
<img src="../images/cdex_logo.png" alt="CDex Logo"/>
|
||||
<h1>CDex</h1>
|
||||
<p>
|
||||
CDex is an Open Source Digital Audio CD Extractor.
|
||||
</p>
|
||||
<p>CDex is an Open Source Digital Audio CD Extractor.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>
|
||||
CDex's installer bundles it with spyware, and it will randomly suggest
|
||||
a spyware program to the user, with a chance to opt-out. Usually it
|
||||
attempts to bundle itself with the WebDiscover browser and one time I
|
||||
got it to try and offer me an antivirus program, but I wasn't able to
|
||||
reproduce this. The program was tested on Windows 7 32-bit with
|
||||
Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the
|
||||
program tested was 2.06.
|
||||
<b
|
||||
><font color="lime"
|
||||
>It did not make any connections to the internet</font
|
||||
></b
|
||||
>
|
||||
that my tests were able to find. To test the program I ripped the
|
||||
audio files out of a CD with both network monitoring programs open.
|
||||
</p>
|
||||
<p>CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out. Usually it attempts to bundle itself with the WebDiscover browser and one time I got it to try and offer me an antivirus program, but I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the program tested was 2.06. <b><span class="lime">It did not make any connections to the internet</span></b> that my tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open.</p>
|
||||
<h3>Bundling with spyware</h3>
|
||||
<p>
|
||||
CDex attempts to bundle itself with the
|
||||
<a href="../articles/webdiscover.html">WebDiscover</a> web browser.
|
||||
This is an Opt-out and not an Opt-in like it should be. This program
|
||||
is spyware, because according to its privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>, it collects information about its users.
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/cdex_bundling.png"
|
||||
alt="CDex installer spyware opt-out screen"
|
||||
/>
|
||||
<p>CDex attempts to bundle itself with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be. This program is spyware, because according to its privacy policy<sup><a href="#s1">[1]</a></sup>, it collects information about its users.</p>
|
||||
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen"/>
|
||||
</div>
|
||||
<hr />
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/Jyrbg?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s1"><a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a> <a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/Jyrbg?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<hr/>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -1,165 +1,73 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8" />
|
||||
<title>Google Chrome — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo" />
|
||||
<h1>Google Chrome</h1>
|
||||
<center>
|
||||
<a href="../articles/chrome_es.html">[Español]</a>
|
||||
<a href="../articles/chrome_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Google Chrome is a web browser developed and distributed by <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<h3>Google Chrome is not fully open source</h3>
|
||||
<p>
|
||||
Large parts of Google Chrome are open source, however not all of them are, and this prevents people from
|
||||
checking the entire software for potential spyware features that are not disclosed.
|
||||
</p>
|
||||
<h3>Google Chrome tracks the user's search history</h3>
|
||||
<p>
|
||||
Google Chrome contains several spyware features that reply on the user's search history being uploaded to Google
|
||||
servers. This is confirmed by the language in the privacy policy<sup><a href="#s1">[1]</a></sup>, clarifying the
|
||||
spyware features that rely on this.
|
||||
</p>
|
||||
<p>
|
||||
The first spyware feature is Google Chrome's integration with the "Google Account" spyware platform. <i>" If you
|
||||
are signed in to a Google site or signed in to Chrome and Google is your default search engine, searches you
|
||||
perform using the address bar in Chrome are stored in your Google account. "</i>
|
||||
</p>
|
||||
<p>
|
||||
Google Chrome also contains a spyware feature called "Search prediction service". It is explained that: <i>"When
|
||||
you search using the address bar in Chrome, the characters you type (even if you haven’t hit "enter" yet) are
|
||||
sent to your default search engine. If Google is your default search engine, predictions are based on your own
|
||||
search history, topics related to what you’re typing and what other people are searching for."</i>
|
||||
</p>
|
||||
<p>
|
||||
There is also the spyware feature "Navigation Assistance" which states that: <i>"When you can’t connect to a web
|
||||
page, you can get suggestions for alternative pages similar to the one you're trying to reach. In order to
|
||||
offer you suggestions, Chrome sends Google the URL of the page you're trying to reach. "</i>
|
||||
</p>
|
||||
<h3>Google Chrome profiles your computer usage</h3>
|
||||
<p>
|
||||
In the privacy policy<sup><a href="#s1">[1]</a></sup>, Google details the extreme spyware feature it labels
|
||||
"Usage Statistics and Crash Reports". What it does, is it sends very detailed information about your hardware
|
||||
and computer usage, which confirms that it definitely contains the following spyware features: </p>
|
||||
<ul>
|
||||
<li>A tracker that records mouse input over time</li>
|
||||
<li>A tracker that profiles memory usage</li>
|
||||
</ul>
|
||||
<p>
|
||||
But, it can also be extrapolated from the vague language that Chrome could and probably does monitor what other
|
||||
programs you have open. Either way, it is an extreme amount of information being collected, since it can be used
|
||||
to recreate what the user is doing on their desktop at all times. Chrome clarifies that this information is
|
||||
being sent whenever a website is being "slow" or whenever Google Chrome crashes.
|
||||
</p>
|
||||
<h3>Google Chrome is integrated with Google Payments</h3>
|
||||
<p>
|
||||
Google Payments is a spyware service that records your banking information and sends it to Google.<sup><a
|
||||
href="#s2">[2]</a></sup> This service is integrated into the Google Chrome browser, which makes it another
|
||||
opt-in spyware feature in the software.
|
||||
</p>
|
||||
<h3>Google Chrome contains a keylogger</h3>
|
||||
<p>
|
||||
This was confirmed in multiple places<sup><a href="#s3">[3]</a></sup><sup><a href="#s4">[4]</a></sup>. Basically,
|
||||
whenever you type into the search bar, that information is sent to Google. You can apparently turn it off by
|
||||
opting out of the "suggestion service".
|
||||
</p>
|
||||
<h3>Google Chrome records your voice</h3>
|
||||
<p>
|
||||
Google Chrome is confirmed to be constantly listening to any open microphones on your computer. This can be
|
||||
found in this statement<sup><a href="#s5">[5]</a></sup> in a privacy publication. <i>"Voice & audio
|
||||
information may be collected. For example, if your child uses audio activation commands (e.g., "OK, Google" or
|
||||
touching the microphone icon), a recording of the following speech/audio, <b> plus a few seconds before, </b>
|
||||
will be stored to their account…"</i> This feature is opt-in if you are using the "Google Accounts" spyware
|
||||
platform and specifically tell Google to build a profile of your child. It's unverified whether or not Google
|
||||
uploads information it listens too to its servers outside of this feature.
|
||||
</p>
|
||||
<h3>Google Chrome saves user passwords on Google Servers</h3>
|
||||
<p>
|
||||
Any password stored in Google Chrome's "password management" feature is uploaded to Google if you sign into the
|
||||
"Google Accounts" spyware platform.
|
||||
</p>
|
||||
<h3>Google Chrome profiles users in other various ways</h3>
|
||||
<p>
|
||||
According to the privacy policy<sup><a href="#s1">[1]</a></sup>, Google Chrome profiles what kinds of web forms
|
||||
you fill out, as well as what kind of language the content you consume is primarily in. Google Chrome also
|
||||
creates a unique identifier for each install you do. This unique identifier is sent to Google whenever you start
|
||||
the browser, so that Google can create a consistent user identity for you, undermining anonymity. Google also
|
||||
stores all of your settings on it's official servers when using the "Google Accounts" feature.
|
||||
</p>
|
||||
<h3>Google Chrome is self-updating software</h3>
|
||||
<p>
|
||||
Google Chrome has an updater which is constantly running in the background and syncing with Google servers to
|
||||
check for updates. The updater will download and run unverified binaries from Google when it updates Google
|
||||
Chrome. It is impossible for an automatic updater service such as this to verify that the updates are not
|
||||
spyware and/or do not contain additional spyware features.
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<a href="https://stallman.org/google.html">Reasons not to use Google</a>
|
||||
<a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a>
|
||||
<br />
|
||||
<br />
|
||||
<a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a>
|
||||
<a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="http://archive.is/OR4dz">[archive.is]</a>
|
||||
</ol>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Google Chrome — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo"/>
|
||||
<h1>Google Chrome</h1>
|
||||
<p>Google Chrome is a web browser developed and distributed by <a href="../articles/google.html">Google</a>.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<h3>Google Chrome is not fully open source</h3>
|
||||
<p>Large parts of Google Chrome are open source, however not all of them are, and this prevents people from checking the entire software for potential spyware features that are not disclosed.</p>
|
||||
<h3>Google Chrome tracks the user's search history</h3>
|
||||
<p>Google Chrome contains several spyware features that reply on the user's search history being uploaded to Google servers. This is confirmed by the language in the privacy policy<sup><a href="#s1">[1]</a></sup>, clarifying the spyware features that rely on this.
|
||||
</p>
|
||||
<p>The first spyware feature is Google Chrome's integration with the "Google Account" spyware platform. <i>"If you are signed in to a Google site or signed in to Chrome and Google is your default search engine, searches you perform using the address bar in Chrome are stored in your Google account."</i></p>
|
||||
<p>Google Chrome also contains a spyware feature called "Search prediction service". It is explained that: <i>"When you search using the address bar in Chrome, the characters you type (even if you haven’t hit "enter" yet) are sent to your default search engine. If Google is your default search engine, predictions are based on your own search history, topics related to what you’re typing and what other people are searching for."</i></p>
|
||||
<p>There is also the spyware feature "Navigation Assistance" which states that: <i>"When you can’t connect to a web page, you can get suggestions for alternative pages similar to the one you're trying to reach. In order to offer you suggestions, Chrome sends Google the URL of the page you're trying to reach."</i></p>
|
||||
<h3>Google Chrome profiles your computer usage</h3>
|
||||
<p>In the privacy policy<sup><a href="#s1">[1]</a></sup>, Google details the extreme spyware feature it labels "Usage Statistics and Crash Reports". What it does, is it sends very detailed information about your hardware and computer usage, which confirms that it definitely contains the following spyware features:</p>
|
||||
<ul>
|
||||
<li>A tracker that records mouse input over time</li>
|
||||
<li>A tracker that profiles memory usage</li>
|
||||
</ul>
|
||||
<p>But, it can also be extrapolated from the vague language that Chrome could and probably does monitor what other programs you have open. Either way, it is an extreme amount of information being collected, since it can be used to recreate what the user is doing on their desktop at all times. Chrome clarifies that this information is being sent whenever a website is being "slow" or whenever Google Chrome crashes.</p>
|
||||
<h3>Google Chrome is integrated with Google Payments</h3>
|
||||
<p>Google Payments is a spyware service that records your banking information and sends it to Google.<sup><a href="#s2">[2]</a></sup> This service is integrated into the Google Chrome browser, which makes it another opt-in spyware feature in the software.</p>
|
||||
<h3>Google Chrome contains a keylogger</h3>
|
||||
<p>This was confirmed in multiple places<sup><a href="#s3">[3]</a></sup><sup><a href="#s4">[4]</a></sup>. Basically, whenever you type into the search bar, that information is sent to Google. You can apparently turn it off by opting out of the "suggestion service".</p>
|
||||
<h3>Google Chrome records your voice</h3>
|
||||
<p>Google Chrome is confirmed to be constantly listening to any open microphones on your computer. This can be found in this statement<sup><a href="#s5">[5]</a></sup> in a privacy publication. <i>"Voice & audio information may be collected. For example, if your child uses audio activation commands (e.g., "OK, Google" or touching the microphone icon), a recording of the following speech/audio, <b>plus a few seconds before</b>, will be stored to their account…"</i> This feature is opt-in if you are using the "Google Accounts" spyware platform and specifically tell Google to build a profile of your child. It's unverified whether or not Google uploads information it listens too to its servers outside of this feature.</p>
|
||||
<h3>Google Chrome saves user passwords on Google Servers</h3>
|
||||
<p>Any password stored in Google Chrome's "password management" feature is uploaded to Google if you sign into the "Google Accounts" spyware platform.</p>
|
||||
<h3>Google Chrome profiles users in other various ways</h3>
|
||||
<p>According to the privacy policy<sup><a href="#s1">[1]</a></sup>, Google Chrome profiles what kinds of web forms you fill out, as well as what kind of language the content you consume is primarily in. Google Chrome also creates a unique identifier for each install you do. This unique identifier is sent to Google whenever you start the browser, so that Google can create a consistent user identity for you, undermining anonymity. Google also stores all of your settings on it's official servers when using the "Google Accounts" feature.</p>
|
||||
<h3>Google Chrome is self-updating software</h3>
|
||||
<p>Google Chrome has an updater which is constantly running in the background and syncing with Google servers to check for updates. The updater will download and run unverified binaries from Google when it updates Google Chrome. It is impossible for an automatic updater service such as this to verify that the updates are not spyware and/or do not contain additional spyware features.</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a>
|
||||
<a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a>
|
||||
<a href="https://archive.is/GJIKw">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/yCsDg?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">Google Payments Privacy Notice</a>
|
||||
<a href="https://web.archive.org/web/20180514095832/https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/npMRW?kreymer=false">[ghostarchive.org]</a>
|
||||
<li id="s3">
|
||||
<a href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">Google Chrome – Spyware? Confirmed?</a>
|
||||
<a href="https://web.archive.org/web/20180410043922/http://www.favbrowser.com/google-chrome-spyware-confirmed/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/jxCPf">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/2ybxT">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s4">
|
||||
<a href="https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">Google Chrome a Keylogger – Privacy Concerns</a>
|
||||
<a href="https://web.archive.org/web/20180410043922/https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/HclxK">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/RhY9b">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s5">
|
||||
<a href="https://families.google.com/familylink/privacy/child-policy/">Privacy Notice for Google Accounts Managed with Family Link (“Privacy Notice”)</a>
|
||||
<a href="https://web.archive.org/web/20180524142231/https://families.google.com/familylink/privacy/child-policy/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/3ncnz">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/DSx9S?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
</ol>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a> <a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a> <a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a></li>
|
||||
<li><a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a> <a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="http://archive.is/OR4dz">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a> <a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a> <a href="https://archive.is/GJIKw">[archive.is]</a> <a href="https://ghostarchive.org/archive/yCsDg?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://payments.google.com/payments/apis-secure/get_legal_document?ldt=privacynotice">Google Payments Privacy Notice</a> <a href="https://web.archive.org/web/20180514095832/https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/npMRW?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">Google Chrome – Spyware? Confirmed?</a> <a href="https://web.archive.org/web/20180410043922/http://www.favbrowser.com/google-chrome-spyware-confirmed/">[web.archive.org]</a> <a href="https://archive.li/jxCPf">[archive.li]</a> <a href="https://ghostarchive.org/archive/2ybxT">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">Google Chrome a Keylogger – Privacy Concerns</a> <a href="https://web.archive.org/web/20180410043922/https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">[web.archive.org]</a> <a href="https://archive.li/HclxK">[archive.li]</a> <a href="https://ghostarchive.org/archive/RhY9b">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://families.google.com/familylink/privacy/child-policy/">Privacy Notice for Google Accounts Managed with Family Link (“Privacy Notice”)</a> <a href="https://web.archive.org/web/20180524142231/https://families.google.com/familylink/privacy/child-policy/">[web.archive.org]</a> <a href="https://archive.li/3ncnz">[archive.li]</a> <a href="https://ghostarchive.org/archive/DSx9S?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,115 +1,72 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="es" xml:lang="es">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Google Chrome — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/chrome_logo.png" alt="chrome logo">
|
||||
<h1>Google Chrome</h1>
|
||||
<center>
|
||||
<a href="../articles/chrome.html">[English]</a>
|
||||
<a href="../articles/chrome_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>Google Chrome es un navegador web desarollado y distribuido por Google</p>
|
||||
|
||||
<h2>Nivel de spyware: <font color=red>EXTREMADAMENTE ALTO</font></h2>
|
||||
|
||||
<h3>Google Chrome no es completamente libre</h3>
|
||||
<p>Muchas partes de Google Chrome son libres, pero no todas de estas lo son. y esto no permite que se compruebe que no es spyware</p>
|
||||
<h3>Google Chrome rastrea el historial</h3>
|
||||
|
||||
<p> Google Chrome contiene mucho spyware que responden en el historial de la busqueda de usuario. Esto es confirmado en la política de privacidad de Google Chrome<sup><a href="#1">[1]</a></sup><br>
|
||||
|
||||
<p>La primera caracteristia de spyware de Chrome es la integración con la "Cuenta de Google" (Que es spyware en si). Explica que: "<i>Cuando buscas usando la barra de direccion de google, los caracteres que has escrito (incluso si no has pulsado enter todavia) son enviados a tu motor de busqueda. Si Google es tu motor de busqueda por defecto, las predicciones estan basadas en tus busquedas</i>
|
||||
</p>
|
||||
<p>
|
||||
Encima tiene otro spyware llamado "Asistencia de naveegacion" que dice que "Cuando no puedes conectarte a una página web, puedes obtener sugerencias para páginas alternativas (Vamos, que Google Chrome envía la dirección a la que has intentado entrar para darte otra
|
||||
<b>Google Chrome recopila el uso de tu ordenador</b></p>
|
||||
|
||||
<p>En la política de privacidad <sup><a href="#1"[1]></a></sup> Google admite el estupidamente alto spyware llamado "Estadisticas de uso y reportes de errores fatales" Lo que hace es recopilar (y enviar) informacion de tu ordenador extremadamente especifica sobre tu hardware y el uso de tu ordenador, y obviamente, tiene esto
|
||||
<ul>
|
||||
<li>Un rastreador que graba el cursor</li>
|
||||
<li>Un rastrador que graba el uso de memoría (RAM)</li>
|
||||
</ul>
|
||||
</p>
|
||||
<h3>Google Chrome está integrado con Google Payments</h3>
|
||||
|
||||
<p>Google Payments es un spyware que graba tus datos bancarios y los envía a Google<sup><a href="#2">[2]</a></sup> Este servicio esta integrado en Google Chrome, lo que hace un spyware opt-in en el programa.
|
||||
</p>
|
||||
<h3>Google Chrome contiene un keylogger</h3>
|
||||
<p>Esto fue confirmado en muchos sitios <sup><a href="#3">[3]</a><a href="#4">[4]</a></sup> Basicamente, cualquier cosa que escribas en la barra de busqueda será enviada a Google. se puede, aparentemente, desactivar.
|
||||
</p>
|
||||
<h3> Google Chroome graba tu voz</h3>
|
||||
<p>Está confirmado que Google Chrome esta constantemente grabando micros en tu ordenador. Esto se puede ver en esta referencia <sup><a href="#5">[5]</a></sup> dice: "<i>Audio y voz puede ser recolectada, por ejemplo, si su hijo usa comandos de activacion (Ejemplo, "Ok, Google" o tocando el icono del microfono) se grabara <b>Tambien unos segundos despues</b> </i>" Esta caracteristica es Opt-in si usas las "Cuentas de Google" y si le dices a Google para hacer un perfil para tu hijo, es imposible saber si Google sube estos audios a sus servidores</p>
|
||||
|
||||
<h3>Google Chrome guarda contraseñas en sus servidores</h3>
|
||||
<p>Cualquier contraseña guardada en el gestor de contraseñas de Chrome es subida a los servidores de Google si inicias sesión en Google Chrome</p>
|
||||
<h3> Google Chrome recolecta profiles de usuario de otras formas</h3>
|
||||
<p>Según su política de privacidad<sup><a href="#1">[1]</a></sup> Google Chrome guarda lo que rellenarías en formularios de paginas, tambien el idioma en el que mas consumespaginas web, Google Chrome, encima, crea un identificador unico porcada instalación, esto se envía a Google cada vez que abres el navegador, esto quiere decir que Google crea una identidad tuya propia, Google tambien, como ya lo he dicho, mas de una vez, Google guarda todos tus datos si inicias sesión en Chrome con tu cuenta de Google</p>
|
||||
<h3>Google Chrome se actualiza automáticamente
|
||||
</h3>
|
||||
<p>
|
||||
Google Chrome tiene un actualizador que constantemente va en segundo plano y sincronizandose con los servidores de Google en busca de actualizaciones. Esto lo que hace es descargar y abrir los binarios no verificados cada vez que Google actualiza Chrome. Es imposible para un software con actualizaciones automaticas verificar si es o no spyware
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Mas cosas</h2>
|
||||
<p>
|
||||
<a href="https://stallman.org/google.html">Reasons not to use Google</a>
|
||||
<a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a><br>
|
||||
|
||||
<a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a>
|
||||
<a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/OR4dz">[archive.is]</a><br>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Referencias</h2>
|
||||
<ol>
|
||||
<li id="1">
|
||||
<a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a>
|
||||
<a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a>
|
||||
<a href="https://archive.is/GJIKw">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/yCsDg?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="2">
|
||||
<a href="https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">Google Payments Privacy Notice</a>
|
||||
<a href="https://web.archive.org/web/20180514095832/https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/npMRW?kreymer=false">[ghostarchive.org]</a>
|
||||
<li id="3">
|
||||
<a href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">Google Chrome – Spyware? Confirmed?</a>
|
||||
<a href="https://web.archive.org/web/20180410043922/http://www.favbrowser.com/google-chrome-spyware-confirmed/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/jxCPf">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/2ybxT">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="4">
|
||||
<a href="https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">Google Chrome a Keylogger – Privacy Concerns</a>
|
||||
<a href="https://web.archive.org/web/20180410043922/https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/HclxK">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/RhY9b">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="5">
|
||||
<a href="https://families.google.com/familylink/privacy/child-policy/">Privacy Notice for Google Accounts Managed with Family Link (“Privacy Notice”)</a>
|
||||
<a href="https://web.archive.org/web/20180524142231/https://families.google.com/familylink/privacy/child-policy/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/3ncnz">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/DSx9S?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
</ol>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was created on 08/17/2021<br>
|
||||
This is a translation of the english article. It may become outdated- compare the dates on both articles.
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Catalog</a><br>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chrome_logo.png" alt="chrome logo"/>
|
||||
<h1>Google Chrome</h1>
|
||||
<p>Google Chrome es un navegador web desarollado y distribuido por Google</p>
|
||||
<h2>Nivel de spyware: <span class="red">EXTREMADAMENTE ALTO</span></h2>
|
||||
<h3>Google Chrome no es completamente libre</h3>
|
||||
<p>Muchas partes de Google Chrome son libres, pero no todas de estas lo son. y esto no permite que se compruebe que no es spyware</p>
|
||||
<h3>Google Chrome rastrea el historial</h3>
|
||||
<p>Google Chrome contiene mucho spyware que responden en el historial de la busqueda de usuario. Esto es confirmado en la política de privacidad de Google Chrome<sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>La primera caracteristia de spyware de Chrome es la integración con la "Cuenta de Google" (Que es spyware en si). Explica que: "<i>Cuando buscas usando la barra de direccion de google, los caracteres que has escrito (incluso si no has pulsado enter todavia) son enviados a tu motor de busqueda. Si Google es tu motor de busqueda por defecto, las predicciones estan basadas en tus busquedas</i></p>
|
||||
<p>Encima tiene otro spyware llamado "Asistencia de naveegacion" que dice que "Cuando no puedes conectarte a una página web, puedes obtener sugerencias para páginas alternativas (Vamos, que Google Chrome envía la dirección a la que has intentado entrar para darte otra <b>Google Chrome recopila el uso de tu ordenador</b></p>
|
||||
<p>En la política de privacidad <sup><a href="#s1">[1]</a></sup> Google admite el estupidamente alto spyware llamado "Estadisticas de uso y reportes de errores fatales" Lo que hace es recopilar (y enviar) informacion de tu ordenador extremadamente especifica sobre tu hardware y el uso de tu ordenador, y obviamente, tiene esto</p>
|
||||
<ul>
|
||||
<li>Un rastreador que graba el cursor</li>
|
||||
<li>Un rastrador que graba el uso de memoría (RAM)</li>
|
||||
</ul>
|
||||
<h3>Google Chrome está integrado con Google Payments</h3>
|
||||
<p>Google Payments es un spyware que graba tus datos bancarios y los envía a Google<sup><a href="#s2">[2]</a></sup> Este servicio esta integrado en Google Chrome, lo que hace un spyware opt-in en el programa.</p>
|
||||
<h3>Google Chrome contiene un keylogger</h3>
|
||||
<p>Esto fue confirmado en muchos sitios <sup><a href="#s3">[3]</a><a href="#s4">[4]</a></sup> Basicamente, cualquier cosa que escribas en la barra de busqueda será enviada a Google. se puede, aparentemente, desactivar.</p>
|
||||
<h3> Google Chroome graba tu voz</h3>
|
||||
<p>Está confirmado que Google Chrome esta constantemente grabando micros en tu ordenador. Esto se puede ver en esta referencia <sup><a href="#s5">[5]</a></sup> dice: "<i>Audio y voz puede ser recolectada, por ejemplo, si su hijo usa comandos de activacion (Ejemplo, "Ok, Google" o tocando el icono del microfono) se grabara <b>Tambien unos segundos despues</b> </i>" Esta caracteristica es Opt-in si usas las "Cuentas de Google" y si le dices a Google para hacer un perfil para tu hijo, es imposible saber si Google sube estos audios a sus servidores</p>
|
||||
<h3>Google Chrome guarda contraseñas en sus servidores</h3>
|
||||
<p>Cualquier contraseña guardada en el gestor de contraseñas de Chrome es subida a los servidores de Google si inicias sesión en Google Chrome</p>
|
||||
<h3> Google Chrome recolecta profiles de usuario de otras formas</h3>
|
||||
<p>Según su política de privacidad<sup><a href="#s1">[1]</a></sup> Google Chrome guarda lo que rellenarías en formularios de paginas, tambien el idioma en el que mas consumespaginas web, Google Chrome, encima, crea un identificador unico porcada instalación, esto se envía a Google cada vez que abres el navegador, esto quiere decir que Google crea una identidad tuya propia, Google tambien, como ya lo he dicho, mas de una vez, Google guarda todos tus datos si inicias sesión en Chrome con tu cuenta de Google</p>
|
||||
<h3>Google Chrome se actualiza automáticamente</h3>
|
||||
<p>Google Chrome tiene un actualizador que constantemente va en segundo plano y sincronizandose con los servidores de Google en busca de actualizaciones. Esto lo que hace es descargar y abrir los binarios no verificados cada vez que Google actualiza Chrome. Es imposible para un software con actualizaciones automaticas verificar si es o no spyware</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Mas cosas:</h4>
|
||||
<ol>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a> <a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a> <a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a></li>
|
||||
<li><a href="https://8ch.net/tech/chrome.html">Welcome to the Botnet. Or, The Case Against Google Chrome</a> <a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="http://archive.is/OR4dz">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Referencias:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.google.com/chrome/browser/privacy/index.html">Google Chrome Privacy Notice</a> <a href="http://web.archive.org/web/20180427041202/https://www.google.com/chrome/browser/privacy/index.html">[web.archive.org]</a> <a href="https://archive.is/GJIKw">[archive.is]</a> <a href="https://ghostarchive.org/archive/yCsDg?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://payments.google.com/payments/apis-secure/get_legal_document?ldt=privacynotice">Google Payments Privacy Notice</a> <a href="https://web.archive.org/web/20180514095832/https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/npMRW?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">Google Chrome – Spyware? Confirmed?</a> <a href="https://web.archive.org/web/20180410043922/http://www.favbrowser.com/google-chrome-spyware-confirmed/">[web.archive.org]</a> <a href="https://archive.li/jxCPf">[archive.li]</a> <a href="https://ghostarchive.org/archive/2ybxT">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">Google Chrome a Keylogger – Privacy Concerns</a> <a href="https://web.archive.org/web/20180410043922/https://jischinger.wordpress.com/2008/11/16/google-chrome-a-keylogger-privacy-concerns/">[web.archive.org]</a> <a href="https://archive.li/HclxK">[archive.li]</a> <a href="https://ghostarchive.org/archive/RhY9b">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://families.google.com/familylink/privacy/child-policy/">Privacy Notice for Google Accounts Managed with Family Link (“Privacy Notice”)</a> <a href="https://web.archive.org/web/20180524142231/https://families.google.com/familylink/privacy/child-policy/">[web.archive.org]</a> <a href="https://archive.li/3ncnz">[archive.li]</a> <a href="https://ghostarchive.org/archive/DSx9S?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 08/17/2021</b>
|
||||
<br/>
|
||||
<b>This is a translation of the english article. It may become outdated- compare the dates on both articles.</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -2,21 +2,17 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8" />
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Google Chrome — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo" />
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo"/>
|
||||
<h1>Google Chrome</h1>
|
||||
<center>
|
||||
<a href="../articles/chrome.html">[English]</a>
|
||||
<a href="../articles/chrome_es.html">[Español]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Google Chrome jest przeglądarką internetową opracowaną i rozpowszechnianą przez <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
|
@ -154,7 +150,7 @@
|
|||
<b>This article was last edited on 12/12/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -1,23 +1,18 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="pt-BR" xml:lang="pt-BR">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8" />
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Google Chrome — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo" />
|
||||
<img src="../images/chrome_logo.png" alt="Chrome logo"/>
|
||||
<h1>Google Chrome</h1>
|
||||
<center>
|
||||
<a href="../articles/chrome.html">[English]</a>
|
||||
<a href="../articles/chrome_es.html">[Español]</a>
|
||||
<a href="../articles/chrome_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
O Google Chrome é um navegador web desenvolvido e distribuído pela <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
|
@ -123,8 +118,8 @@
|
|||
<a href="https://stallman.org/google.html">Razões para não usar o Google</a>
|
||||
<a href="https://web.archive.org/web/20180512214729/http://stallman.org/google.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20170929072403/https://stallman.org/google.html">[archive.is]</a>
|
||||
<br />
|
||||
<br />
|
||||
<br/>
|
||||
<br/>
|
||||
<a href="https://8ch.net/tech/chrome.html">Bem-vindo à Botnet. Ou, o caso contra o Google Chrome</a>
|
||||
<a href="https://web.archive.org/web/20150501010435/https://8ch.net/tech/chrome.html">[web.archive.org]</a> <a href="http://archive.is/OR4dz">[archive.is]</a>
|
||||
</ol>
|
||||
|
@ -168,7 +163,7 @@
|
|||
<p><b>Esta é uma tradução do artigo em inglês. Pode estar desatualizado. Compare as datas em ambos os artigos.</b></p>
|
||||
<p>Se você quiser editar este artigo, ou contribuir com seu(s) próprio(s) artugo(s), visite-nos no repositório git no <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>Todas as contribuições devem ser licenciadas sob a licença CC0 para serem aceitas.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -1,46 +1,40 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Clementine — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<p>
|
||||
<img src="../images/clementine.png" alt="Clementine logo" />
|
||||
</p>
|
||||
<h1>Clementine</h1>
|
||||
<p>
|
||||
Clementine - is a music player and library organizer, based on Amarok 1.4, and licensed under the GPL.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Possible Spyware</span></h2>
|
||||
<h3>Clementine is making some http requests on start</h3>
|
||||
<p>
|
||||
As Mitmproxy + Proxychains show, Clementine makes requests to <code> data.clementine-player.org</code>. If we search information about this domain, we can see it's for fetching information about artists, songs and OAuth info.<sup><a href="#2">[2]</a></sup>
|
||||
</p>
|
||||
<h3>Clementine is using Non-Free Web services</h3>
|
||||
<p>It's made to give search suggestitions, lyrics, and internet radio and podcast lists. Also, Clementine is using Wikipedia as the main source of information about artists. Wikipedia is logging your IP-adress. Clementine does have the native possibility to run network traffic through a proxy.</p>
|
||||
<hr />
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.clementine-player.org/">Clementine Music Player</a><br/>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://github.com/clementine-player/Website/blob/master/README.md">info about data.clementine-player.org</a>
|
||||
<br />
|
||||
<hr />
|
||||
<p><b>
|
||||
This article was last edited on 2/3/2022
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/clementine.png" alt="Clementine logo"/>
|
||||
<h1>Clementine</h1>
|
||||
<p>Clementine - is a music player and library organizer, based on Amarok 1.4, and licensed under the GPL.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Possible Spyware</span></h2>
|
||||
<h3>Clementine is making some http requests on start</h3>
|
||||
<p>As Mitmproxy + Proxychains show, Clementine makes requests to <code> data.clementine-player.org</code>. If we search information about this domain, we can see it's for fetching information about artists, songs and OAuth info.<sup><a href="#s2">[2]</a></sup></p>
|
||||
<h3>Clementine is using Non-Free Web services</h3>
|
||||
<p>It's made to give search suggestitions, lyrics, and internet radio and podcast lists. Also, Clementine is using Wikipedia as the main source of information about artists. Wikipedia is logging your IP-adress. Clementine does have the native possibility to run network traffic through a proxy.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.clementine-player.org/">Clementine Music Player</a></li>
|
||||
<li id="s2"><a href="https://github.com/clementine-player/Website/blob/master/README.md">info about data.clementine-player.org</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 2/3/2022</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,73 +1,27 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Discord — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/discord_logo.png" alt="Discord Logo" />
|
||||
<img src="../images/discord_logo.png" alt="Discord Logo"/>
|
||||
<h1>Discord</h1>
|
||||
<center>
|
||||
<a href="../articles/discord_es.html">[Español]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Discord is an instant messaging application for macOS, Windows, GNU/Linux,
|
||||
Android, and iOS. Discord is used to communicate via voice chat and
|
||||
text chat, and has image-sharing and file-sharing capabilities.
|
||||
</p>
|
||||
<p>Discord is an instant messaging application for macOS, Windows, GNU/Linux, Android, and iOS. Discord is used to communicate via voice chat and text chat, and has image-sharing and file-sharing capabilities.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
<font color="lightgreen">
|
||||
Thanks to Richard Stallman for linking to our article
|
||||
<a href="https://stallman.org/discord.html"> here</a>!
|
||||
The spotlight is very much appreciated.
|
||||
</font>
|
||||
<br />
|
||||
</p>
|
||||
<a href="../articles/discord.html"
|
||||
><img
|
||||
class="icon"
|
||||
src="../images/discord-no-way-2.gif"
|
||||
alt="Discord? No Way!"
|
||||
/></a>
|
||||
<p>
|
||||
Discord is spyware because it collects all information that passes
|
||||
through its communication platform. As Discord is a centralized
|
||||
communication platform, all communications have to go through
|
||||
Discord's official servers, where all of that information can
|
||||
potentially be recorded. The vast majority of said information has
|
||||
been confirmed to be recorded, such as all communications between
|
||||
users. Discord has also been confirmed to use other spyware features
|
||||
such as various forms of telemetry. Discord's main source of income is
|
||||
from investment, from which it has received over $279.3 million
|
||||
dollars<sup><a href="#s4">[4]</a></sup
|
||||
>. Discord cannot be built from source and the source code for Discord
|
||||
is unavailable.
|
||||
</p>
|
||||
<p><span class="lightgreen">Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html">here</a>! The spotlight is very much appreciated.</span></p>
|
||||
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"/></a>
|
||||
<p>Discord is spyware because it collects all information that passes through its communication platform. As Discord is a centralized communication platform, all communications have to go through Discord's official servers, where all of that information can potentially be recorded. The vast majority of said information has been confirmed to be recorded, such as all communications between users. Discord has also been confirmed to use other spyware features such as various forms of telemetry. Discord's main source of income is from investment, from which it has received over $279.3 million dollars<sup><a href="#s4">[4]</a></sup>. Discord cannot be built from source and the source code for Discord is unavailable.</p>
|
||||
<h3>Discord does not make its source code available</h3>
|
||||
<p>
|
||||
It is impossible to download and examine Discord's source code, which
|
||||
means that it is impossible to prove that Discord is not spyware. Any
|
||||
program which does not make its source code available is potential
|
||||
spyware.
|
||||
</p>
|
||||
<h3>
|
||||
Discord confirms that it collects large amounts of sensitive user data
|
||||
</h3>
|
||||
<p>
|
||||
Discord explicitly confirms in its privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>
|
||||
that it collects the following information:
|
||||
</p>
|
||||
<p>It is impossible to download and examine Discord's source code, which means that it is impossible to prove that Discord is not spyware. Any program which does not make its source code available is potential spyware.</p>
|
||||
<h3>Discord confirms that it collects large amounts of sensitive user data</h3>
|
||||
<p>Discord explicitly confirms in its privacy policy<sup><a href="#s1">[1]</a></sup> that it collects the following information:</p>
|
||||
<ul>
|
||||
<li>IP Address</li>
|
||||
<li>Device UUID</li>
|
||||
|
@ -77,391 +31,67 @@
|
|||
<li>All VOIP data (voice chat)</li>
|
||||
<li>Open rates for e-mail sent by Discord</li>
|
||||
</ul>
|
||||
<p>
|
||||
Discord does not explicitly confirm that it collects this information,
|
||||
but still collects it by default:
|
||||
</p>
|
||||
<p>Discord does not explicitly confirm that it collects this information, but still collects it by default:</p>
|
||||
<ul>
|
||||
<li>
|
||||
Logs of all of the other programs that are open on your computer
|
||||
</li>
|
||||
<li>Logs of all of the other programs that are open on your computer</li>
|
||||
</ul>
|
||||
<p>
|
||||
The implications of this information can be broken down like this: By
|
||||
recording your IP address, Discord can track your general location
|
||||
(about as precise as which county you are in). Discord can also tell
|
||||
which devices you use, as it uniquely identifies each device, and how
|
||||
much you use those devices, as it can record your device usage habits
|
||||
(since Discord is usually open in the background so that it can
|
||||
receive messages). Discord also records every single interaction you
|
||||
have with other users through its service. This means that Discord is
|
||||
confirmed to log every conversation that you have through Discord, and
|
||||
record everything that you say on Discord, and view all images that
|
||||
you send through Discord. Therefore, none of your interactions on
|
||||
Discord are private. Discord's privacy policy also contains several
|
||||
occurrences of phrases such as "including but not limited to," which
|
||||
is an explicit confirmation that Discord contains more spyware
|
||||
features that are not disclosed to the user.
|
||||
</p>
|
||||
<h3>
|
||||
Discord contains features which allow integration with other spyware
|
||||
platforms
|
||||
</h3>
|
||||
<p>
|
||||
Discord contains the opt-in spyware feature known as "social media
|
||||
integration." This allows you to sync your persistent user identity on
|
||||
Discord with your persistent user identity on other spyware platforms,
|
||||
such as Facebook and Twitter. In its privacy policy<sup
|
||||
><a href="#s1">[1]</a></sup
|
||||
>, Discord has confirmed that if you opt in to this spyware feature,
|
||||
Discord will obtain an undisclosed amount of access to information
|
||||
obtained about you by the spyware platforms that you choose to sync
|
||||
with.
|
||||
</p>
|
||||
<p>The implications of this information can be broken down like this: By recording your IP address, Discord can track your general location (about as precise as which county you are in). Discord can also tell which devices you use, as it uniquely identifies each device, and how much you use those devices, as it can record your device usage habits (since Discord is usually open in the background so that it can receive messages). Discord also records every single interaction you have with other users through its service. This means that Discord is confirmed to log every conversation that you have through Discord, and record everything that you say on Discord, and view all images that you send through Discord. Therefore, none of your interactions on Discord are private. Discord's privacy policy also contains several occurrences of phrases such as "including but not limited to," which is an explicit confirmation that Discord contains more spyware features that are not disclosed to the user.</p>
|
||||
<h3>Discord contains features which allow integration with other spyware platforms</h3>
|
||||
<p>Discord contains the opt-in spyware feature known as "social media integration." This allows you to sync your persistent user identity on Discord with your persistent user identity on other spyware platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#s1">[1]</a></sup>, Discord has confirmed that if you opt in to this spyware feature, Discord will obtain an undisclosed amount of access to information obtained about you by the spyware platforms that you choose to sync with.</p>
|
||||
<h3>Discord contains a process logger</h3>
|
||||
<p>
|
||||
Discord has been confirmed to monitor the open processes on your
|
||||
operating system. This is a spyware feature known as a "process
|
||||
logger" that is generally used to record your program usage habits.
|
||||
This was confirmed by the CTO of Discord in a Reddit thread.<sup
|
||||
><a href="#s2">[2]</a></sup
|
||||
>
|
||||
In the same thread, the CTO also elaborates that this spyware feature
|
||||
(the monitoring of processes) is mandatory for several features of the
|
||||
platform. The CTO and a Discord engineer go on to claim that Discord
|
||||
does not use the process logger to send records of the open processes
|
||||
on the user's computer.
|
||||
</p>
|
||||
<p>
|
||||
The test to prove that Discord logs processes was done again by the
|
||||
writer with procmon on 4/11/2019 with the features: "Use data to
|
||||
customize my Discord Experience" and "Display currently running game
|
||||
as a status message" turned off. Discord did
|
||||
<font color="lime"><b>NOT</b></font> log all of the processes open
|
||||
this way. However, when setting the "Display currently running game as
|
||||
a status message" turned on, the behavior described in<sup
|
||||
><a href="#s2">[2]</a></sup
|
||||
>
|
||||
was replicated. You can see that behavior here:
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_process_logging.png"
|
||||
alt="Discord process logging as described in [2] confirmed with procmon"
|
||||
/>
|
||||
<p>
|
||||
Discord claims this feature can be disabled through the UI.
|
||||
This is sadly <a href="https://github.com/snapcrafters/discord/issues/23">false</a>.
|
||||
Because of the nature of closed-source software it isn't possible for
|
||||
either this article or the Discord developers to prove how much
|
||||
information is being sent to Discord's servers when the process logger
|
||||
is turned on. But it's at least possible to turn it off.
|
||||
</p>
|
||||
<p>Discord has been confirmed to monitor the open processes on your operating system. This is a spyware feature known as a "process logger" that is generally used to record your program usage habits. This was confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#s2">[2]</a></sup> In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is mandatory for several features of the platform. The CTO and a Discord engineer go on to claim that Discord does not use the process logger to send records of the open processes on the user's computer.</p>
|
||||
<p>The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message" turned off. Discord did <span class="lime"><b>NOT</b></span> log all of the processes open this way. However, when setting the "Display currently running game as a status message" turned on, the behavior described in<sup><a href="#s2">[2]</a></sup> was replicated. You can see that behavior here:</p>
|
||||
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon"/>
|
||||
<p>Discord claims this feature can be disabled through the UI. This is sadly <a href="https://github.com/snapcrafters/discord/issues/23">false</a>. Because of the nature of closed-source software it isn't possible for either this article or the Discord developers to prove how much information is being sent to Discord's servers when the process logger is turned on. But it's at least possible to turn it off.</p>
|
||||
<h3>Discord uses its process logging for advertising</h3>
|
||||
<p>
|
||||
Discord shows this in its privacy option here:
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_data.png"
|
||||
alt="Discord process logging usefulness"
|
||||
/>
|
||||
<p>
|
||||
That the process logging features of Discord are now being recorded on
|
||||
Discord's servers as a form of telemetry (spyware), and removes
|
||||
speculation about why this feature exists. It is clarified by Discord
|
||||
that this spyware feature is used for advertising to its users.<sup
|
||||
><a href="#s8">[8]</a></sup
|
||||
>
|
||||
This means that Discord is
|
||||
<font color="red"
|
||||
><b
|
||||
>recording the programs you have open to build a statistical model
|
||||
of what programs you might buy/license in the future.</b
|
||||
></font
|
||||
>
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_2.png"
|
||||
alt="Discord confirms process logging is used for advertising"
|
||||
/>
|
||||
|
||||
<h3>
|
||||
Discord tries to force some users to give their Telephone numbers
|
||||
</h3>
|
||||
<p>
|
||||
Discord will lock users out of its service and will not allow them to
|
||||
continue using it without giving their phone number or contacting
|
||||
Discord support. This is especially true for TOR users.
|
||||
This kind of feature is designed to extract very
|
||||
personal information out of its users (phone numbers). The criteria
|
||||
for locking out users isn't known.
|
||||
<!--
|
||||
You can be locked out of your account for spamming
|
||||
multiple users in dm's a short ammount of time,
|
||||
This is due to the spam protection
|
||||
-->
|
||||
</p>
|
||||
<img
|
||||
class="screenshot"
|
||||
src="../images/discord_verify.png"
|
||||
alt="discord phone verification"
|
||||
/>
|
||||
|
||||
<p>Discord shows this in its privacy option here:</p>
|
||||
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness"/>
|
||||
<p>That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware), and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising to its users.<sup><a href="#s8">[8]</a></sup> This means that Discord is <span class="red"><b>recording the programs you have open to build a statistical model of what programs you might buy/license in the future.</b></span></p>
|
||||
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising"/>
|
||||
<h3>Discord tries to force some users to give their Telephone numbers</h3>
|
||||
<p>Discord will lock users out of its service and will not allow them to continue using it without giving their phone number or contacting Discord support. This is especially true for TOR users. This kind of feature is designed to extract very personal information out of its users (phone numbers). The criteria for locking out users isn't known.</p>
|
||||
<img class="screenshot" src="../images/discord_verify.png" alt="discord phone verification"/>
|
||||
<h3>Discord receives government requests for your information</h3>
|
||||
<p>
|
||||
Discord has confirmed in an email correspondence<sup
|
||||
><a href="#s6">[6]</a></sup
|
||||
>
|
||||
that it does receive government requests for information. So, we know
|
||||
that the government potentially has access to all of the information
|
||||
that Discord collects about you. You can read a copy of the email
|
||||
image posted in the source
|
||||
<a
|
||||
href="https://spyware.neocities.org/images/discord%20government%20requests.png"
|
||||
>here</a
|
||||
>
|
||||
in case the link there dies.
|
||||
</p>
|
||||
<hr />
|
||||
<p>Discord has confirmed in an email correspondence<sup><a href="#s6">[6]</a></sup> that it does receive government requests for information. So, we know that the government potentially has access to all of the information that Discord collects about you. You can read a copy of the email image posted in the source<a href="https://spyware.neocities.org/images/discord%20government%20requests.png">here</a> in case the link there dies.</p>
|
||||
<hr/>
|
||||
<h2>Speculation on Discord's future</h2>
|
||||
<p>
|
||||
It's unknown whether Discord currently is or isn't selling user
|
||||
information. Currently, Discord has been able to consistently raise new
|
||||
investment capital, which is at a level where it could reasonably be
|
||||
covering all of its operating costs. However, Discord, like any other
|
||||
company, is not going to exist in a constant state of investment.
|
||||
Discord is going to have to transition away from an
|
||||
investment-financed business model to a revenue model that exclusively
|
||||
relies on generating revenue from the users of the platform.
|
||||
</p>
|
||||
<p>
|
||||
Discord has several ways of making money. It can license emoji's and
|
||||
other features of the program with Discord Nitro<sup
|
||||
><a href="#s5">[5]</a></sup
|
||||
>, or it can make money licensing video games through its new online
|
||||
store, as a competitor to <a href="../articles/steam.html">Steam</a>.
|
||||
However, both of these revenue sources may not be enough. Discord has
|
||||
raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup>
|
||||
and it has to return on this investment. (which is more than 279.3
|
||||
million dollars that has to be paid back)
|
||||
</p>
|
||||
<p>
|
||||
If Discord is not able to satisfy its obligation to its investors,
|
||||
it has a third option- selling user information to advertisers.
|
||||
Discord is already datamining its users to produce its
|
||||
recommendation system,<sup><a href="#s8">[8]</a></sup> which means
|
||||
that it is already turning its userbase into extremely valuable,
|
||||
sellable, advertising data. Discord has 130 million users<sup
|
||||
><a href="#s7">[7]</a></sup
|
||||
>, and it can produce a statistical model of what games each user (who
|
||||
does not opt-out of advertising) owns, plays, and wants to buy. This
|
||||
is incredibly valuable information that Discord can sell if it cannot
|
||||
reach its profit obligations with its current revenue model. If Discord
|
||||
was a successful games store, then it would not need to do this. But
|
||||
if Discord gets in financial trouble, it probably will be forced to
|
||||
liquidate this asset.
|
||||
</p>
|
||||
<p>It's unknown whether Discord currently is or isn't selling user information. Currently, Discord has been able to consistently raise new investment capital, which is at a level where it could reasonably be covering all of its operating costs. However, Discord, like any other company, is not going to exist in a constant state of investment. Discord is going to have to transition away from an investment-financed business model to a revenue model that exclusively relies on generating revenue from the users of the platform.</p>
|
||||
<p>Discord has several ways of making money. It can license emoji's and other features of the program with Discord Nitro<sup><a href="#s5">[5]</a></sup>, or it can make money licensing video games through its new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However, both of these revenue sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup> and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back)</p>
|
||||
<p>If Discord is not able to satisfy its obligation to its investors, it has a third option- selling user information to advertisers. Discord is already datamining its users to produce its recommendation system,<sup><a href="#s8">[8]</a></sup> which means that it is already turning its userbase into extremely valuable, sellable, advertising data. Discord has 130 million users<sup><a href="#s7">[7]</a></sup>, and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy. This is incredibly valuable information that Discord can sell if it cannot reach its profit obligations with its current revenue model. If Discord was a successful games store, then it would not need to do this. But if Discord gets in financial trouble, it probably will be forced to liquidate this asset.</p>
|
||||
</div>
|
||||
<hr />
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<a
|
||||
href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_don't_let_friends_use_discord_the/"
|
||||
>Friends Don't Let Friends Use Discord</a
|
||||
>
|
||||
<a href="https://removeddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">[removeddit.com]</a
|
||||
>
|
||||
|
||||
<a href="https://archive.is/Q4N9J">[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
|
||||
<br />
|
||||
|
||||
<a
|
||||
href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
|
||||
>Help Me, Tom's Guide: Is Discord Tracking Me?</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/8dKmc?kreymer=false"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
<br />
|
||||
|
||||
<a href="https://www.youtube.com/watch?v=cn4CENr5NV0"
|
||||
>Why Discord is Trash</a
|
||||
><br />
|
||||
<a href="https://www.youtube.com/watch?v=QN_6AZT92pU"
|
||||
>Why You Shouldn't Use Discord</a
|
||||
><br />
|
||||
|
||||
<a href="http://subvert.pw/res/discord.pdf"
|
||||
>THE DISCORD SITUATION</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<li><a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_don't_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a> <a href="https://removeddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">[removeddit.com]</a> <a href="https://archive.is/Q4N9J">[archive.is]</a> <a href="https://ghostarchive.org/">[ghostarchive.org]</a></li>
|
||||
<li><a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a> <a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a> <a href="https://ghostarchive.org/archive/8dKmc?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a></li>
|
||||
<li><a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a> <a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://discordapp.com/privacy"
|
||||
>Discord Privacy Policy</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20180515102020/https://discordapp.com/privacy"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/22yke"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a
|
||||
href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>Why is Discord recording our open programs and uploading
|
||||
them?</a
|
||||
>
|
||||
<a
|
||||
href="https://www.removeddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>[removeddit.com]</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/qFcQA">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/MQBEv?kreymer=true">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="https://discordapp.com/company">Discord</a>
|
||||
<a
|
||||
href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
|
||||
>[wayback.archive-it.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/30TU8"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s4">
|
||||
<a href="https://www.crunchbase.com/organization/discord"
|
||||
>Crunchbase</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<!-- archive.is page was a dud
|
||||
<a
|
||||
href="https://archive.is/KvEdW"
|
||||
>[archive.is]</a
|
||||
>
|
||||
-->
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s5">
|
||||
<a href="https://discordapp.com/nitro">Discord Nitro</a>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/xbj7M?kreymer=true"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s6">
|
||||
<a
|
||||
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>Discord receives government requests. No plans on adding E2E
|
||||
Encryption any time soon.</a
|
||||
>
|
||||
<a href="https://archive.is/JrdJ9">[archive.is]</a>
|
||||
<a href="https://removeddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[removeddit.com]</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/trU1V"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s7">
|
||||
<a
|
||||
href="https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>Number of registered Discord users</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/bK9Ai"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s8">
|
||||
<a
|
||||
href="https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>Data Privacy Controls</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/vx3aY"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="s1"><a href="https://discordapp.com/privacy">Discord Privacy Policy</a> <a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a> <a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a> <a href="https://ghostarchive.org/archive/22yke">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploadingthem?</a> <a href="https://www.removeddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[removeddit.com]</a> <a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> <a href="https://archive.li/qFcQA">[archive.is]</a> <a href="https://ghostarchive.org/archive/MQBEv?kreymer=true">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://discordapp.com/company">Discord</a> <a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a> <a href="https://ghostarchive.org/archive/30TU8">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://discordapp.com/nitro">Discord Nitro</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a> <a href="https://ghostarchive.org/archive/xbj7M?kreymer=true">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> <a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://removeddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[removeddit.com]</a> <a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/trU1V">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a> <a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/bK9Ai">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a> <a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/vx3aY">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr />
|
||||
<b>This article was created on 11/23/17</b><br />
|
||||
<hr/>
|
||||
<b>This article was created on 11/23/17</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 8/17/2021</b>
|
||||
<!--Dont change-->
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us
|
||||
at the git repo on
|
||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
||||
</p>
|
||||
<p>
|
||||
All contributions must be licensed under the CC0 license to be
|
||||
accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -1,238 +1,85 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="es" xml:lang="es">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Discord — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/discord_logo.png" alt="Discord-Logo">
|
||||
<h1>Discord</h1>
|
||||
<center>
|
||||
<a href="../articles/discord.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Discord es un programa de mensajería instantanea disponible para MacOS, GNU/Linux, Android, Windows, Android e iOS.
|
||||
Discord puede usarse para comunicarse vía voz y chat de texto, también se puede usar para compartir archivos e imágenes.
|
||||
</p>
|
||||
<h2>Nivel de Spyware: <font color="red">EXTREMADAMENTE ALTO</font></h2>
|
||||
<p>
|
||||
Discord es spyware por que recolecta toda la información que pasa por su plataforma de comunicacón. Discord es una plataforma de comunicaión centralizada, todas las comunicaciones deben ir por los servidores oficiales de Discord. Donde toda la información puede ser grabada, la gran mayoría de la información dada esta confirmada. Taén se ha confirmado que Discord usa mas spyware como formas de telemetría. La mayor fuente de ingresos de discord, que ha recibido $129 millones de dolares. Discord no puede ser compilado por que no es un programa libre.
|
||||
<p>
|
||||
Discord no hace su código fuente disponible.
|
||||
</p><p>
|
||||
Es imposible descargar y examinar el código fuente de Discord, lo que hace imposible probar queDiscord no es spyware. Cualquier programa que no haga su código fuente disponible es potencialmente spyware
|
||||
</p><p>
|
||||
Discord confirma que recolecta varia información de los usuarios.
|
||||
</p>
|
||||
<h3>Discord does not make its source code available</h3>
|
||||
<p>
|
||||
It is impossible to download and examine Discord's source code,
|
||||
which means that it is impossible to prove that Discord is not
|
||||
spyware. Any program which does not make its source code available is
|
||||
potential spyware.
|
||||
</p>
|
||||
<h3>Discord confirma en su política de privacidad <sup><a href="#1">[1]</a></sup> que recolecta la siguiente información</h3>
|
||||
<ul>
|
||||
<li> Direccion IP
|
||||
<li> UUID del dispositivo
|
||||
<li> E-Mail del usuario
|
||||
<li> Todos los mensajes de texto
|
||||
<li> Todas las imagenes
|
||||
<li> Todas los mensajes de voz (Las llamadas)
|
||||
<li> Los E-mails mandados por discord
|
||||
</ul>
|
||||
<p>
|
||||
Discord no confirma que recolecta esta informacion, pero lo hace
|
||||
</p>
|
||||
<ul>
|
||||
<li>Lista de todos los programas que estan abiertos en tu ordenador
|
||||
</ul>
|
||||
<p>
|
||||
La siguiente información puede usarse para:
|
||||
Saber donde vives (El pais exacto)
|
||||
Discord puede decir exactamente en que dispositivo estás
|
||||
Puede saber todo lo que hace (Pues incluso en movil, discord corre en segundo plano, para recibir mensajes)
|
||||
Discord tambien recolecta la información que le pasas a otros usuarios. Esto significa que Discord puede ver los mensajes, imagenes, y archivos enviados.
|
||||
En otras palabras, ninguna conversacion mantenida en discord es privada.
|
||||
</p>
|
||||
<h3>Discord tambien tiene integración con otras plataformas de Spyware</h3>
|
||||
<p>
|
||||
Discord contiene "opt-in" conocido como "Integración con redes sociales" Esto hace que Discord sepa de tu identidad.
|
||||
Plataformas como Facebook y Twitter, en su politica de privacidad. Discord confirma que si lo vinculas a el mismo, Discord obtendrá datos de tus redes sociales.
|
||||
</p>
|
||||
<h3>Discord contiene un listado de procesos.</h3>
|
||||
<p>
|
||||
Está confirmado que discord tiene un monitor para ver los procesor que que corren en tu sistema operativo. Este spyware es conocido como "Listador de procesos"
|
||||
Se usa mas que nada para grabar tus habitos de uso de programas.
|
||||
</p>
|
||||
<p>
|
||||
Esto ha sido confirmado por el CTO de Discord en un hilo de Reddit<sup><a href="#2">[2]</a></sup>
|
||||
En el mismo hilo, el CTO admite que es obligatorio este spyware y no puede ser removido. El CTO y un ingeniero de Discord dice que no es spyware, pero no puede ser confirmado.
|
||||
</p>
|
||||
<h3>La mayoria de ingresos de discord viene de vender datos.</h3>
|
||||
<p>
|
||||
Discord esta esclusivamente confiado en la informacion que los usuarios generan. Esto significa que la mayor fuente de ingresos es recolectar datos de usuarios, otras fuentes son secundiaria. Discord tiene 4,2 millones de usuarios en su plataforma<sup><a href="#3">[3]</a></sup> sin otras inversiones, esto es casi toda el dinero generado por la mineria de datos de sus usuarios, discord tiene $129 millones de dolares en inversion <sup><a href="#4">[4]</a></sup> desde 2012. Discord tiene 45 millones de usuario, por lo que pueden recolectar MUCHISIMOS datos. El "Principal" medio de llegada de Ingresos de discord es Nitro<sup><a href="#5">[5]</a></sup> realisticamente, no puede ser la principal
|
||||
fuente de ingresos de discord, especialmente por que Nitro es relativamente reciente.</p>
|
||||
|
||||
<h3>Discord recibe peticiones de gobierno para tu informacion</h3>
|
||||
<p>
|
||||
Discord ha confirmado de una de sus correspondencia de E-mail <sup><a href="#6">[6]</a></sup> donde confirma que recibe peticiones del gobierno de informacion, asi que podemos saber que el gobierno tiene toda la informacion que Discord ha recolectado de ti <a href="https://spyware.neocities.org/images/discord%20government%20requests.png">aqui</a>
|
||||
por si el link muere.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Mas cosas</h2>
|
||||
|
||||
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_don't_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
|
||||
<a href="https://archive.is/Q4N9J">[archive.is]</a><br>
|
||||
|
||||
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
|
||||
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
|
||||
|
||||
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
|
||||
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
|
||||
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
|
||||
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br>
|
||||
<hr>
|
||||
<h2>Referencias</h2>
|
||||
<ol>
|
||||
<li id="1">
|
||||
<a href="https://discordapp.com/privacy"
|
||||
>Discord Privacy Policy</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20180515102020/https://discordapp.com/privacy"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/22yke"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="2">
|
||||
<a
|
||||
href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>Why is Discord recording our open programs and uploading
|
||||
them?</a
|
||||
>
|
||||
<a
|
||||
href="https://www.removeddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>[removeddit.com]</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a href="https://archive.li/qFcQA">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/MQBEv?kreymer=true">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="3">
|
||||
<a href="https://discordapp.com/company">Discord</a>
|
||||
<a
|
||||
href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
|
||||
>[wayback.archive-it.org]</a
|
||||
>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/30TU8"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="4">
|
||||
<a href="https://www.crunchbase.com/organization/discord"
|
||||
>Crunchbase</a
|
||||
>
|
||||
<a
|
||||
href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<!-- archive.is page was a dud
|
||||
<a
|
||||
href="https://archive.is/KvEdW"
|
||||
>[archive.is]</a
|
||||
>
|
||||
-->
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="5">
|
||||
<a href="https://discordapp.com/nitro">Discord Nitro</a>
|
||||
<a
|
||||
href="http://archive.is/20170724163442/https://discordapp.com/company"
|
||||
>[archive.is]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/xbj7M?kreymer=true"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="6">
|
||||
<a
|
||||
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>Discord receives government requests. No plans on adding E2E
|
||||
Encryption any time soon.</a
|
||||
>
|
||||
<a href="https://archive.is/JrdJ9">[archive.is]</a>
|
||||
<a href="https://removeddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[removeddit.com]</a>
|
||||
<a
|
||||
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/trU1V"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="7">
|
||||
<a
|
||||
href="https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>Number of registered Discord users</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/bK9Ai"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<li id="8">
|
||||
<a
|
||||
href="https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>Data Privacy Controls</a
|
||||
>
|
||||
<a
|
||||
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
|
||||
>[web.archive.org]</a
|
||||
>
|
||||
<a
|
||||
href="https://ghostarchive.org/archive/vx3aY"
|
||||
>[ghostarchive.org]</a
|
||||
>
|
||||
</li>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/discord_logo.png" alt="Discord-Logo"/>
|
||||
<h1>Discord</h1>
|
||||
<p>Discord es un programa de mensajería instantanea disponible para MacOS, GNU/Linux, Android, Windows, Android e iOS. Discord puede usarse para comunicarse vía voz y chat de texto, también se puede usar para compartir archivos e imágenes.</p>
|
||||
<h2>Nivel de Spyware: <span class="red">EXTREMADAMENTE ALTO</span></h2>
|
||||
<p>Discord es spyware por que recolecta toda la información que pasa por su plataforma de comunicacón. Discord es una plataforma de comunicaión centralizada, todas las comunicaciones deben ir por los servidores oficiales de Discord. Donde toda la información puede ser grabada, la gran mayoría de la información dada esta confirmada. Taén se ha confirmado que Discord usa mas spyware como formas de telemetría. La mayor fuente de ingresos de discord, que ha recibido $129 millones de dolares. Discord no puede ser compilado por que no es un programa libre.</p>
|
||||
<p>Discord no hace su código fuente disponible.</p>
|
||||
<p>Es imposible descargar y examinar el código fuente de Discord, lo que hace imposible probar queDiscord no es spyware. Cualquier programa que no haga su código fuente disponible es potencialmente spyware</p>
|
||||
<p>Discord confirma que recolecta varia información de los usuarios.</p>
|
||||
<h3>Discord does not make its source code available</h3>
|
||||
<p>It is impossible to download and examine Discord's source code, which means that it is impossible to prove that Discord is not spyware. Any program which does not make its source code available is potential spyware.</p>
|
||||
<h3>Discord confirma en su política de privacidad<sup><a href="#s1">[1]</a></sup> que recolecta la siguiente información</h3>
|
||||
<ul>
|
||||
<li>Direccion IP</li>
|
||||
<li>UUID del dispositivo</li>
|
||||
<li>E-Mail del usuario</li>
|
||||
<li>Todos los mensajes de texto</li>
|
||||
<li>Todas las imagenes</li>
|
||||
<li>Todas los mensajes de voz (Las llamadas)</li>
|
||||
<li>Los E-mails mandados por discord</li>
|
||||
</ul>
|
||||
<p>Discord no confirma que recolecta esta informacion, pero lo hace</p>
|
||||
<ul>
|
||||
<li>Lista de todos los programas que estan abiertos en tu ordenador</li>
|
||||
</ul>
|
||||
<p>La siguiente información puede usarse para: Saber donde vives (El pais exacto) Discord puede decir exactamente en que dispositivo estás Puede saber todo lo que hace (Pues incluso en movil, discord corre en segundo plano, para recibir mensajes) Discord tambien recolecta la información que le pasas a otros usuarios. Esto significa que Discord puede ver los mensajes, imagenes, y archivos enviados. En otras palabras, ninguna conversacion mantenida en discord es privada.</p>
|
||||
<h3>Discord tambien tiene integración con otras plataformas de Spyware</h3>
|
||||
<p>Discord contiene "opt-in" conocido como "Integración con redes sociales" Esto hace que Discord sepa de tu identidad. Plataformas como Facebook y Twitter, en su politica de privacidad. Discord confirma que si lo vinculas a el mismo, Discord obtendrá datos de tus redes sociales.</p>
|
||||
<h3>Discord contiene un listado de procesos.</h3>
|
||||
<p>Está confirmado que discord tiene un monitor para ver los procesor que que corren en tu sistema operativo. Este spyware es conocido como "Listador de procesos" Se usa mas que nada para grabar tus habitos de uso de programas.</p>
|
||||
<p>Esto ha sido confirmado por el CTO de Discord en un hilo de Reddit<sup><a href="#s2">[2]</a></sup> En el mismo hilo, el CTO admite que es obligatorio este spyware y no puede ser removido. El CTO y un ingeniero de Discord dice que no es spyware, pero no puede ser confirmado.</p>
|
||||
<h3>La mayoria de ingresos de discord viene de vender datos.</h3>
|
||||
<p>Discord esta esclusivamente confiado en la informacion que los usuarios generan. Esto significa que la mayor fuente de ingresos es recolectar datos de usuarios, otras fuentes son secundiaria. Discord tiene 4,2 millones de usuarios en su plataforma<sup><a href="#s3">[3]</a></sup> sin otras inversiones, esto es casi toda el dinero generado por la mineria de datos de sus usuarios, discord tiene $129 millones de dolares en inversion <sup><a href="#s4">[4]</a></sup> desde 2012. Discord tiene 45 millones de usuario, por lo que pueden recolectar MUCHISIMOS datos. El "Principal" medio de llegada de Ingresos de discord es Nitro<sup><a href="#s5">[5]</a></sup> realisticamente, no puede ser la principal fuente de ingresos de discord, especialmente por que Nitro es relativamente reciente.</p>
|
||||
<h3>Discord recibe peticiones de gobierno para tu informacion</h3>
|
||||
<p>Discord ha confirmado de una de sus correspondencia de E-mail <sup><a href="#s6">[6]</a></sup> donde confirma que recibe peticiones del gobierno de informacion, asi que podemos saber que el gobierno tiene toda la informacion que Discord ha recolectado de ti <a href="https://spyware.neocities.org/images/discord%20government%20requests.png">aqui</a> por si el link muere.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Mas cosas:</h4>
|
||||
<ol>
|
||||
<li><a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_don't_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a> <a href="https://archive.is/Q4N9J">[archive.is]</a></li>
|
||||
<li><a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a> <a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a></li>
|
||||
<li><a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a></li>
|
||||
<li><a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a></li>
|
||||
<li><a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a> <a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was created on 11/18/2018<br>
|
||||
This is a translation of the english article. It may become outdated- compare the dates on both articles.
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Referencias:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://discordapp.com/privacy">Discord Privacy Policy</a> <a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a> <a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a> <a href="https://ghostarchive.org/archive/22yke">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a> <a href="https://www.removeddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[removeddit.com]</a> <a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> <a href="https://archive.li/qFcQA">[archive.is]</a> <a href="https://ghostarchive.org/archive/MQBEv?kreymer=true">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://discordapp.com/company">Discord</a> <a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a> <a href="https://ghostarchive.org/archive/30TU8">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://discordapp.com/nitro">Discord Nitro</a> <a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a> <a href="https://ghostarchive.org/archive/xbj7M?kreymer=true">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> <a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://removeddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[removeddit.com]</a> <a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/trU1V">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a> <a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/bK9Ai">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a> <a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/vx3aY">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 11/18/2018</b>
|
||||
<br/>
|
||||
<b>This is a translation of the english article. It may become outdated- compare the dates on both articles.</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,108 +1,60 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Dissenter — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<p>
|
||||
<img src="../images/dissenter_logo.png" alt="Dissenter Logo">
|
||||
<h1>Dissenter</h1>
|
||||
<p>
|
||||
Dissenter is a web browser and plugin released by the social network company Gab.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="orange">High</font></h2>
|
||||
<p>
|
||||
The Dissenter browser is a fork of the <a href="../articles/brave.html">Brave</a> web browser. It phones home to
|
||||
Brave for autoupdates and safebrowsing, which is hosted by Brave. The default search engine is <a href="../articles/duckduckgo.html">DuckDuckGo</a>.
|
||||
The browser has two extensions preinstalled. One extension, "Shields", blocks certain advertisement scripts. The other,
|
||||
"Dissenter" allows you to access the Dissenter social network. This extension phones home to several places whenever you open it,
|
||||
including Google and Twitter. The Dissenter social network also inherently must collect more information about the user's browsing
|
||||
habits than the current alternatives that already exist. It also doesn't help that their privacy policy is basically empty.
|
||||
</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
When the Dissenter Browser is started, it will make several connections to Brave's autoupdate services:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave">
|
||||
<p>
|
||||
Every once in a while, the Browser will send a request to Brave's instance of the Google safebrowsing service:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave">
|
||||
<p>
|
||||
<p>
|
||||
Whenever the Dissenter extension is opened, it will phone home to several companies:
|
||||
</p>
|
||||
<img class="screenshot" src="../images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home">
|
||||
<center>
|
||||
<p>
|
||||
This includes:
|
||||
</p>
|
||||
</center>
|
||||
<ul>
|
||||
<li>Google</li>
|
||||
<li>Twitter</li>
|
||||
<li>Doubleclick (Google owned telemetry company)</li>
|
||||
<li>FontAwesome</li>
|
||||
<li>Cloudflare</li>
|
||||
</ul>
|
||||
<center>
|
||||
<p>
|
||||
This happens every time the extension is opened.
|
||||
</p>
|
||||
</center>
|
||||
<h3>Opt-out telemetry</h3>
|
||||
<p>
|
||||
Dissenter will send crash reports to Gab automatically. This is on by default and you have to opt-out.
|
||||
</p>
|
||||
<p><i>
|
||||
"When Gab crashes, it creates a report that can be sent to us to help us fix whatever caused the problem. This report contains technical information about your computer system which is typically distinctive. You can choose whether to send us these reports. Even if you have chosen to send reports in the past, you can turn off future reports in settings. Crash reports may contain personal information."
|
||||
</i> <sup><a href="#1">[1]</a></sup>.</p>
|
||||
<h3>Dissenter bypasses its own tracker filter</h3>
|
||||
<p>
|
||||
Dissenter comes with its own content blocker called Shields that is meant to block trackers as you browse the web.
|
||||
This content blocker can block requests made by regular websites, but it does not block content that
|
||||
is loaded by the Dissenter extension. The Dissenter extension makes requests to trackers that would have been
|
||||
blocked by its own filter- by it's <b><font color=yellow>own standards</font></b> Dissenter makes connections to
|
||||
tracking websites that are not necessary and not private. The spyware site <code>googleads.g.doubleclick.net</code>
|
||||
is correctly blocked by Shields when a normal website tries to access it, but this connection is not blocked when Dissenter accesses it...
|
||||
This is an interesting double standard when it comes to privacy.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/sheilds_blocking.png">
|
||||
<hr>
|
||||
<h2>Inherent issues with Dissenter</h2>
|
||||
<p>
|
||||
Dissenter has the inherent problem that it associates the web pages you have visited with the discussions you are having or trying to have.
|
||||
If you want to check an article's comments on Dissenter, you have to tell Gab that you visited that article. This gives Gab a very good profile
|
||||
of what sites you visit and what articles you read. Currently, alternatives exist to this model that are already in place. For example, you can
|
||||
create a thread on an Imageboard, Reddit-like website, or other web forum format, which sets an archived link to the article as the topic of discussion.
|
||||
This format is much more private because the parties involved have much less information about what their users did. The news website has no
|
||||
idea who read its article, because the traffic went to the archival service. The forum that you can freely comment on also doesn't know what
|
||||
articles you looked at or what discussions you tried to have. If we only consider privacy, this method is a somewhat better way of achieving this goal.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://dissenter.com/about/privacy-policy">Dissenter Privacy Policy</a>
|
||||
<a href="https://web.archive.org/web/20190516235423/https://dissenter.com/about/privacy-policy">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/A6AgI">[archive.fo]</a>
|
||||
<a href="https://ghostarchive.org/archive/KTY4t?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/17/2021
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/dissenter_logo.png" alt="Dissenter Logo"/>
|
||||
<h1>Dissenter</h1>
|
||||
<p>Dissenter is a web browser and plugin released by the social network company Gab.</p>
|
||||
<h2>Spyware Level: <span class="orange">High</span></h2>
|
||||
<p>The Dissenter browser is a fork of the <a href="../articles/brave.html">Brave</a> web browser. It phones home to Brave for autoupdates and safebrowsing, which is hosted by Brave. The default search engine is <a href="../articles/duckduckgo.html">DuckDuckGo</a>. The browser has two extensions preinstalled. One extension, "Shields", blocks certain advertisement scripts. The other, "Dissenter" allows you to access the Dissenter social network. This extension phones home to several places whenever you open it, including Google and Twitter. The Dissenter social network also inherently must collect more information about the user's browsing habits than the current alternatives that already exist. It also doesn't help that their privacy policy is basically empty.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>When the Dissenter Browser is started, it will make several connections to Brave's autoupdate services:</p>
|
||||
<img class="screenshot" src="../images/dissenter_phone_home_1.png" alt="Dissenter Browser phoning home to Brave"/>
|
||||
<p>Every once in a while, the Browser will send a request to Brave's instance of the Google safebrowsing service:</p>
|
||||
<img class="screenshot" src="../images/dissenter_safebrowsing.png" alt="Dissenter Browser phoning home to Brave"/>
|
||||
<p>Whenever the Dissenter extension is opened, it will phone home to several companies:</p>
|
||||
<img class="screenshot" src="../images/dissenter_ext_ph.png" alt="Dissenter Extension phoning home"/>
|
||||
<p>This includes:</p>
|
||||
<ul>
|
||||
<li>Google</li>
|
||||
<li>Twitter</li>
|
||||
<li>Doubleclick (Google owned telemetry company)</li>
|
||||
<li>FontAwesome</li>
|
||||
<li>Cloudflare</li>
|
||||
</ul>
|
||||
<p>This happens every time the extension is opened.</p>
|
||||
<h3>Opt-out telemetry</h3>
|
||||
<p>Dissenter will send crash reports to Gab automatically. This is on by default and you have to opt-out.</p>
|
||||
<p><i>"When Gab crashes, it creates a report that can be sent to us to help us fix whatever caused the problem. This report contains technical information about your computer system which is typically distinctive. You can choose whether to send us these reports. Even if you have chosen to send reports in the past, you can turn off future reports in settings. Crash reports may contain personal information."</i> <sup><a href="#s1">[1]</a></sup>.</p>
|
||||
<h3>Dissenter bypasses its own tracker filter</h3>
|
||||
<p>Dissenter comes with its own content blocker called Shields that is meant to block trackers as you browse the web. This content blocker can block requests made by regular websites, but it does not block content that is loaded by the Dissenter extension. The Dissenter extension makes requests to trackers that would have been blocked by its own filter- by it's <b><span class="yellow">own standards</span></b> Dissenter makes connections to tracking websites that are not necessary and not private. The spyware site <code>googleads.g.doubleclick.net</code> is correctly blocked by Shields when a normal website tries to access it, but this connection is not blocked when Dissenter accesses it... This is an interesting double standard when it comes to privacy.</p>
|
||||
<img class="screenshot" src="../images/sheilds_blocking.png" alt="Sheilds blocking"/>
|
||||
<h3>Inherent issues with Dissenter</h3>
|
||||
<p>Dissenter has the inherent problem that it associates the web pages you have visited with the discussions you are having or trying to have. If you want to check an article's comments on Dissenter, you have to tell Gab that you visited that article. This gives Gab a very good profile of what sites you visit and what articles you read. Currently, alternatives exist to this model that are already in place. For example, you can create a thread on an Imageboard, Reddit-like website, or other web forum format, which sets an archived link to the article as the topic of discussion. This format is much more private because the parties involved have much less information about what their users did. The news website has no idea who read its article, because the traffic went to the archival service. The forum that you can freely comment on also doesn't know what articles you looked at or what discussions you tried to have. If we only consider privacy, this method is a somewhat better way of achieving this goal.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://dissenter.com/about/privacy-policy">Dissenter Privacy Policy</a> <a href="https://web.archive.org/web/20190516235423/https://dissenter.com/about/privacy-policy">[web.archive.org]</a> <a href="https://archive.fo/A6AgI">[archive.fo]</a> <a href="https://ghostarchive.org/archive/KTY4t?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,104 +1,58 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta
|
||||
http-equiv="Content-type"
|
||||
content="application/xhtml+xml;charset=utf-8"
|
||||
/>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>DuckDuckGo — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<p>
|
||||
<img src="../images/ddg_logo.png" alt="DuckDuckGo logo" />
|
||||
</p>
|
||||
<h1>DuckDuckGo</h1>
|
||||
<center>
|
||||
<p>
|
||||
<a href="../articles/duckduckgo_es.html">[Español]</a><br/><br/>
|
||||
</p>
|
||||
</center>
|
||||
<p>
|
||||
DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck Go, Inc.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Possible Spyware</span></h2>
|
||||
<p>
|
||||
DuckDuckGo is a search engine that claims to protect the privacy of its users.<sup><a href="#1">[1]</a></sup> Since this a centralized service, there is no way to prove that it isn't spyware just by
|
||||
looking at the technology that it uses. There are some red flags that could cause you to doubt that this service is truly private, and so this article will just list them
|
||||
here to help you decide on whether or not to use this service. Ultimately there isn't proof that DuckDuckGo is spyware- but a few reasons to suspect it of being spyware. Even though, it's worth noting that
|
||||
DuckDuckGo <b><span class="lime">offers an onion domain</span></b>... so you don't need to trust it to use it as long as you access it through TOR.
|
||||
</p>
|
||||
<h3>DuckDuckGo is hosted in the USA</h3>
|
||||
<p>
|
||||
Since the US Government has been known to compromise services similar to DuckDuckGo, it's reasonable to fear that it might compromise DuckDuckGo.<sup><a href="#2">[2]</a></sup><sup><a href="#3">[3]</a></sup> We don't know if DuckDuckGo has
|
||||
been compromised by the US Government, but we do know that it is not a difficult task for the US Government to do that.
|
||||
</p>
|
||||
<h3>DuckDuckGo has violated its privacy policy in the past</h3>
|
||||
<p>
|
||||
DuckDuckGo is not consistent with its privacy policy and has directly violated it before.<sup><a href="#2">[2]</a></sup> If a service cannot follow its own privacy policy, then you can't expect it to protect
|
||||
your privacy.
|
||||
</p>
|
||||
<h3>Tracking pixels and other spyware</h3>
|
||||
<p>
|
||||
DuckDuckGo uses clear gifs from the domain <code>improving.duckduckgo.com</code>. This is a tracking technique and can be used to collect analytics about your web browser.
|
||||
Whenever you use DuckDuckGo, several requests will be sent to this domain.<sup><a href="#4">[4]</a></sup> This is of course not the kind of behavior that you would expect from a privacy concerned website, but there it is. Do you trust DuckDuckGo to collect "anonymous" analytics about you?
|
||||
</p>
|
||||
<hr />
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
<a href="https://8ch.net/tech/ddg.html">/tech/ FAQs — DuckDuckGo</a>
|
||||
<a href="https://web.archive.org/web/20180613130204/https://8ch.net/tech/ddg.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a>
|
||||
<a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a><br/>
|
||||
</p>
|
||||
|
||||
<hr />
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://duckduckgo.com/privacy">DuckDuckGo Privacy Policy</a>
|
||||
<a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a>
|
||||
<a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a>
|
||||
<a href="https://archive.is/Pw6og">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/RYN5U?kreymer=true">[ghostarchive.org]</a>
|
||||
|
||||
<br/>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a>
|
||||
<a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a>
|
||||
<a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a>
|
||||
|
||||
<br/>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="/translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
<a name="4">4.</a>
|
||||
<a href="https://help.duckduckgo.com/privacy/atb/">Site Improvements</a>
|
||||
<a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/c2dTU?kreymer=true">[ghostarchive.org]</a>
|
||||
|
||||
<br/>
|
||||
</p>
|
||||
<p>
|
||||
*This is a machine-translated mirror of an article written in German hosted here. Links to the original article can be found on that page.
|
||||
</p>
|
||||
|
||||
<hr />
|
||||
<p><b>
|
||||
This article was last edited on 8/17/2021
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ddg_logo.png" alt="DuckDuckGo logo"/>
|
||||
<h1>DuckDuckGo</h1>
|
||||
<p>DuckDuckGo is a search engine created by Gabriel Weinberg and owned by Duck Duck Go, Inc.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Possible Spyware</span></h2>
|
||||
<p>DuckDuckGo is a search engine that claims to protect the privacy of its users.<sup><a href="#1">[1]</a></sup> Since this a centralized service, there is no way to prove that it isn't spyware just by looking at the technology that it uses. There are some red flags that could cause you to doubt that this service is truly private, and so this article will just list them here to help you decide on whether or not to use this service. Ultimately there isn't proof that DuckDuckGo is spyware- but a few reasons to suspect it of being spyware. Even though, it's worth noting that DuckDuckGo <b><span class="lime">offers an onion domain</span></b>... so you don't need to trust it to use it as long as you access it through TOR.</p>
|
||||
<h3>DuckDuckGo is hosted in the USA</h3>
|
||||
<p>Since the US Government has been known to compromise services similar to DuckDuckGo, it's reasonable to fear that it might compromise DuckDuckGo.<sup><a href="#2">[2]</a></sup><sup><a href="#3">[3]</a></sup> We don't know if DuckDuckGo has been compromised by the US Government, but we do know that it is not a difficult task for the US Government to do that.</p>
|
||||
<h3>DuckDuckGo has violated its privacy policy in the past</h3>
|
||||
<p>DuckDuckGo is not consistent with its privacy policy and has directly violated it before.<sup><a href="#2">[2]</a></sup> If a service cannot follow its own privacy policy, then you can't expect it to protect your privacy.</p>
|
||||
<h3>Tracking pixels and other spyware</h3>
|
||||
<p>DuckDuckGo uses clear gifs from the domain <code>improving.duckduckgo.com</code>. This is a tracking technique and can be used to collect analytics about your web browser. Whenever you use DuckDuckGo, several requests will be sent to this domain.<sup><a href="#4">[4]</a></sup> This is of course not the kind of behavior that you would expect from a privacy concerned website, but there it is. Do you trust DuckDuckGo to collect "anonymous" analytics about you?</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading</h4>
|
||||
<ol>
|
||||
<li><a href="https://8ch.net/tech/ddg.html">/tech/ FAQs — DuckDuckGo</a> <a href="https://web.archive.org/web/20180613130204/https://8ch.net/tech/ddg.html">[web.archive.org]</a> <a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a> <a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://duckduckgo.com/privacy">DuckDuckGo Privacy Policy</a> <a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a> <a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a> <a href="https://archive.is/Pw6og">[archive.is]</a> <a href="https://ghostarchive.org/archive/RYN5U?kreymer=true">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a> <a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a> <a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a></li>
|
||||
<li id="s3"><a href="../translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*</li>
|
||||
<li id="s4"><a href="https://help.duckduckgo.com/privacy/atb/">Site Improvements</a> <a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/c2dTU?kreymer=true">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>
|
||||
This article was last edited on 8/17/2021
|
||||
</b>
|
||||
<br/>
|
||||
<b>
|
||||
This is a machine-translated mirror of an article written in German hosted here. Links to the original article can be found on that page.
|
||||
</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,66 +1,53 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="es" xml:lang="es">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>DuckDuckGo — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/ddg_logo.png" alt="">
|
||||
<h1>DuckDuckGo</h1>
|
||||
<center>
|
||||
<p><a href="../articles/duckduckgo.html">[English]</a><br><br></p>
|
||||
</center>
|
||||
<p>DuckDuckGo es un motor de busqueda creado por Gabriel Weinberg y mantenido or Duck Duck Go, inc</p>
|
||||
<h3>Nivel de spyware: <font color=greenyellow>Posiblemente spyware</font></h3>
|
||||
<p>DuckDuckGo es un motor de busqueda que jura proteger la privacidad de sus usuarios <sup><a href="#1">[1]</a></sup>debido a que es un servicio sentralizado, no es posible saber si es spyware viendo la tecnologia que usa. hay algunos avisos para dudar si es realmente privado. Este artículo es solo para hacerte decidir si usar o no este servicio. Ultimamente no hay prueba de que DuckDuckGo es spyware. Pero hay algunas razones para sospechar de ser spyware, de todas formas, esta bien saber de que DuckDuckGo <b><font color=lime>Ofrece un dominio onion</font></b> asi que no debes dudar en usarlo si estás en TOR</p>
|
||||
<h3>DuckDuckGo está alojado en Estados Unidos</h3>
|
||||
<p>Desde que el gobierno de Estados Unidos manipula servicios similares a DuckDuckGo, Es posible que tambien haya manipulado a DuckDuckgo<sup><a href="#2">[2]</a><a href="#3">[3]</a></sup> Nosotros no sabemos si DuckDuckGo ha sido manipulado por el Gobierno de EEUU, pero si sabemos que es fácil para ellos hacerlo</p>
|
||||
<h3 style="color:red;">DuckDuckGo ha violado su política de privacidad en el pasado</h3>
|
||||
<p>Se sabe que DuckDuckGo no ha cumplido con su política de privacidad en el pasado <sup><a href="#2">[2]</a></sup>Si un servicio no puede seguir su propia política de privacidad, entonces no puedes esperar que protegan tu privacidad</p><h3>Seguimiento de pixeles y otro spyware</h3>
|
||||
<p>DuckDuckGo usa gifs en blanco para el dominio improving.duckduckgo.com esta es una técnica de seguimiento que puede ser usada para recolectar estadísticas de tu navegador. En cualquier caso, si usas DuckDuckGo enviara varias peticiones a ese dominio<sup><a href="#4">[4]</a></sup>Esto no es, por supuesto, el tipo de comportamiento que esperas de un servicio que jura proteger tu privacidad</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Mas</h2>
|
||||
<p>
|
||||
<a href="https://8ch.net/tech/ddg.html">/tech/ FAQs — DuckDuckGo</a>
|
||||
<a href="https://web.archive.org/web/20180613130204/https://8ch.net/tech/ddg.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a>
|
||||
<a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a><br>
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<h2>Referencias</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://duckduckgo.com/privacy">DuckDuckGo Privacy Policy</a>
|
||||
<a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a>
|
||||
<a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a>
|
||||
<a href="https://archive.is/Pw6og">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a>
|
||||
<a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a>
|
||||
<a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a><br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="/translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*<br>
|
||||
|
||||
<a name="4">4.</a>
|
||||
<a href="https://duck.co/help/privacy/atb">Site Improvements</a>
|
||||
<a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was translated on 1/15/2019<br>
|
||||
This translation may become out of date. Compare dates with the english article.
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="main">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<img src="../images/ddg_logo.png" alt="DuckDuckGo Logo"/>
|
||||
<h1>DuckDuckGo</h1>
|
||||
<p>DuckDuckGo es un motor de busqueda creado por Gabriel Weinberg y mantenido or Duck Duck Go, inc</p>
|
||||
<h3>Nivel de spyware: <span class="greenyellow">Posiblemente spyware</span></h3>
|
||||
<p>DuckDuckGo es un motor de busqueda que jura proteger la privacidad de sus usuarios <sup><a href="#s1">[1]</a></sup>debido a que es un servicio sentralizado, no es posible saber si es spyware viendo la tecnologia que usa. hay algunos avisos para dudar si es realmente privado. Este artículo es solo para hacerte decidir si usar o no este servicio. Ultimamente no hay prueba de que DuckDuckGo es spyware. Pero hay algunas razones para sospechar de ser spyware, de todas formas, esta bien saber de que DuckDuckGo <b><span class="lime">Ofrece un dominio onion</span></b> asi que no debes dudar en usarlo si estás en TOR</p>
|
||||
<h3>DuckDuckGo está alojado en Estados Unidos</h3>
|
||||
<p>Desde que el gobierno de Estados Unidos manipula servicios similares a DuckDuckGo, Es posible que tambien haya manipulado a DuckDuckgo<sup><a href="#s2">[2]</a><a href="#s3">[3]</a></sup> Nosotros no sabemos si DuckDuckGo ha sido manipulado por el Gobierno de EEUU, pero si sabemos que es fácil para ellos hacerlo</p>
|
||||
<h3 style="color:red;">DuckDuckGo ha violado su política de privacidad en el pasado</h3>
|
||||
<p>Se sabe que DuckDuckGo no ha cumplido con su política de privacidad en el pasado <sup><a href="#s2">[2]</a></sup>Si un servicio no puede seguir su propia política de privacidad, entonces no puedes esperar que protegan tu privacidad</p><h3>Seguimiento de pixeles y otro spyware</h3>
|
||||
<p>DuckDuckGo usa gifs en blanco para el dominio improving.duckduckgo.com esta es una técnica de seguimiento que puede ser usada para recolectar estadísticas de tu navegador. En cualquier caso, si usas DuckDuckGo enviara varias peticiones a ese dominio<sup><a href="#s4">[4]</a></sup>Esto no es, por supuesto, el tipo de comportamiento que esperas de un servicio que jura proteger tu privacidad</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Mas</h4>
|
||||
<ol>
|
||||
<li><a href="https://8ch.net/tech/ddg.html">/tech/ FAQs — DuckDuckGo</a> <a href="https://web.archive.org/web/20180613130204/https://8ch.net/tech/ddg.html">[web.archive.org]</a> <a href="http://archive.is/20150624075735/https://8ch.net/tech/ddg.html">[archive.is]</a> <a href="http://www.webcitation.org/6i47Oqe9i">[www.webcitation.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Referencias</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://duckduckgo.com/privacy">DuckDuckGo Privacy Policy</a> <a href="http://www.webcitation.org/6HQhjFsqo">[www.webcitation.org]</a> <a href="http://arquivo.pt/wayback/20150815202623/https://duckduckgo.com//privacy">[arquivo.pt]</a> <a href="https://archive.is/Pw6og">[archive.is]</a></li>
|
||||
<li id="s2"><a href="http://www.alexanderhanff.com/duckduckgone">Still trust DuckDuckGo? (dead link)</a> <a href="https://archive.is/qntuk#selection-227.0-243.124">[archive.is]</a> <a href="http://web.archive.org/web/20160224072914/https://archive.is/qntuk">[web.archive.org]</a></li>
|
||||
<li id="s3"><a href="/translations/duckduckgo_article.html">DuckDuckGo: The mistaken belief of the NSA-safe search engine</a>*</li>
|
||||
<li id="s4"><a href="https://duck.co/help/privacy/atb">Site Improvements</a> <a href="http://web.archive.org/web/20180909162803/https://duck.co/help/privacy/atb">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was translated on 1/15/2019</b>
|
||||
<br/>
|
||||
<b>This translation may become out of date. Compare dates with the english article.</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,67 +1,46 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Internet Explorer — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
|
||||
<h1>Internet Explorer</h1>
|
||||
<p>
|
||||
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
|
||||
</p>
|
||||
<h3>Internet Explorer does not have available source code</h3>
|
||||
<p>
|
||||
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
|
||||
</p>
|
||||
<h3>Internet Explorer is self-updating software</h3>
|
||||
<p>
|
||||
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature because they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
|
||||
</p>
|
||||
<h3>Internet Explorer sends your search history to Microsoft</h3>
|
||||
<p>
|
||||
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it receives is encrypted to protect user privacy and sanitized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statistical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
|
||||
</p>
|
||||
<h3>Internet Explorer can track your location</h3>
|
||||
<p>
|
||||
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
|
||||
</p>
|
||||
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
|
||||
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
|
||||
<a href="https://archive.is/EnsRH">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/rOXJC?kreymer=false">[ghostarchive.org]</a>
|
||||
|
||||
<br></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Internet Explorer — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
|
||||
<h1>Internet Explorer</h1>
|
||||
<p>Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.</p>
|
||||
<h3>Internet Explorer does not have available source code</h3>
|
||||
<p>Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.</p>
|
||||
<h3>Internet Explorer is self-updating software</h3>
|
||||
<p>Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature because they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.</p>
|
||||
<h3>Internet Explorer sends your search history to Microsoft</h3>
|
||||
<p>Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it receives is encrypted to protect user privacy and sanitized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statistical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.</p>
|
||||
<h3>Internet Explorer can track your location</h3>
|
||||
<p>Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.</p>
|
||||
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a> <a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a> <a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a> <a href="https://archive.is/EnsRH">[archive.is]</a> <a href="https://ghostarchive.org/archive/rOXJC?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,40 +1,31 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Falkon — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/falkon_logo.png" alt="falkon Logo">
|
||||
<h1>Falkon</h1>
|
||||
<p>
|
||||
Falkon is a KDE web browser using QtWebEngine rendering engine, previously known as QupZilla.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lightgreen>Probably Not Spyware</font></h2>
|
||||
<p>
|
||||
When another contributor tested this browser on Linux, it made <font color=lime><b>no unsolicited connections.</b></font> When I ran it on Windows, it connected to
|
||||
a domain unrelated to the homepage (DuckDuckGo). But, i'm not sure what it was for, and it wasn't reproduced on Linux. This browser is probably fine, but
|
||||
you should run your own tests and email me about what you found or didn't find.
|
||||
</p>
|
||||
<h3>Phoning Home?</h3>
|
||||
<p>
|
||||
On the first run of Falkon, using the 32-bit Windows version, it connected to these addresses, even though I was on its homepage, which seems to be
|
||||
locally stored because it does not create any requests when I go to it normally. I don't know what these are for.
|
||||
Maybe it's a form of phoning home? The first IP is for the domain: github.map.fastly.net which seems to be part of a CDN.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/falkon_firstrun.png" alt="Is Falkon phoning home?">
|
||||
<hr>
|
||||
<center>
|
||||
<p><b>
|
||||
This article was last edited on 8/24/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/falkon_logo.png" alt="falkon Logo"/>
|
||||
<h1>Falkon</h1>
|
||||
<p>Falkon is a KDE web browser using QtWebEngine rendering engine, previously known as QupZilla.</p>
|
||||
<h2>Spyware Level: <span class="lightgreen">Probably Not Spyware</span></h2>
|
||||
<p>When another contributor tested this browser on Linux, it made <span class="lime"><b>no unsolicited connections.</b></span> When I ran it on Windows, it connected to a domain unrelated to the homepage (DuckDuckGo). But, i'm not sure what it was for, and it wasn't reproduced on Linux. This browser is probably fine, but you should run your own tests and email me about what you found or didn't find.</p>
|
||||
<h3>Phoning Home?</h3>
|
||||
<p>On the first run of Falkon, using the 32-bit Windows version, it connected to these addresses, even though I was on its homepage, which seems to be locally stored because it does not create any requests when I go to it normally. I don't know what these are for. Maybe it's a form of phoning home? The first IP is for the domain: github.map.fastly.net which seems to be part of a CDN.</p>
|
||||
<img class="screenshot" src="../images/falkon_firstrun.png" alt="Is Falkon phoning home?"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<b>This article was last edited on 8/24/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,308 +1,139 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Firefox — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/firefox_logo3.png" alt="Firefox logo">
|
||||
<h1>Mozilla Firefox</h1>
|
||||
<center>
|
||||
<a href="../articles/firefox_es.html">[Español]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Mozilla Firefox is one of the most popular and longest existing
|
||||
browsers. Its developers have earned it a reputation for being a "privacy and security-based browser, respecting the user" — but is it justified, or just marketing? In fact, over the years they have made several anti-privacy (and generally anti-user) decisions, but this article will focus exclusively on spying. Version tested: 52.5.0, with the default settings. Program used for testing requests: Mitmproxy.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=orange>High</font></h2>
|
||||
<p>
|
||||
After following the <a href="../guides/firefox.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
|
||||
</p>
|
||||
<p>It sends a lot of different data very often (some of which could
|
||||
uniquely identify you). All the "services" that it provides, such as
|
||||
its default search engines and Pocket, are anti-privacy. The rating isn't higher
|
||||
because at least you can turn off or modify most of it, though
|
||||
it often requires diving deep into about:config.</p>
|
||||
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
Whenever you start Firefox, it makes this request: <br><img class="screenshot" src="../images/request.png"><br> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><font color=orange>Can be disabled ONLY in about:config</font></b>. But, since you've already started Firefox, it will make this request at least once.
|
||||
</p>
|
||||
|
||||
<h3>Automatic connections to some websites you've visited, including their trackers</h3>
|
||||
<p>
|
||||
Websites you visit most often are added to the New Tab panel. When you then open a new tab, Firefox will sometimes make requests to the sites in there, including some of their trackers. I haven't determined how it works yet. Sometimes it doesn't make the requests at all; other times you end up with hundreds of images, scripts, trackers, etc. loaded simply because you opened a new tab (without visiting any website explicitly).
|
||||
<b><font color=red>Was NOT able to find a way to disable this</font></b>, even in about:config.
|
||||
</p>
|
||||
|
||||
<h3>Firefox tracks users with Google Analytics</h3>
|
||||
<p>
|
||||
Firefox has been integrated with the spyware platform called "Google Analytics"<sup><a href="#1">[1]</a></sup>. Firefox has been confirmed to now send analytics to Google. According to a Firefox developer the spyware in Firefox is "extremely useful to us and we have already weighed the cost/benefit of using tracking." and that Firefox will not remove Google Analytics support entirely. Firefox's position on privacy is made very clear with this quote:
|
||||
</p>
|
||||
<p><i>"Wanted to address your position though:
|
||||
|
||||
We don't give the "data directly to Google". See the discussion here: https://bugzilla.mozilla.org/show_bug.cgi?id=858839. The short version is:
|
||||
|
||||
tl;dr: We now have an option to opt-out of Google doing anything with the data that Google Analytics collections on Mozilla websites. GA tracking is anonymous and at the aggregate level and we use it to improve the experience of our websites.
|
||||
We are collecting aggregate and non-identifiable data in numbers to ensure our development/UX changes are met well. We can respect privacy and still have analytics; in fact Mozilla's aim is for an experience that values user privacy and usability (I'd say Apple also wants UX that fits that mold, as an example). We need some data, anonymized and aggregated, to do this.
|
||||
"</i></p>
|
||||
<p>
|
||||
The best takeaway to this is that Mozilla wants to pretend that including spyware in their program is somehow not a breach of privacy, and that Firefox could possibly be respecting user privacy while simultaneously collecting data on users and sending it to Google. It's strongly suggested reading the GitHub thread and the further anti-privacy statements the Mozilla employee makes while defending the spyware features in Firefox. It's very dangerous to assert that there is somehow a middle ground between respecting user privacy and datamining the user.
|
||||
</p>
|
||||
<h3>"Safe" Browsing?</h3>
|
||||
<p>
|
||||
Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
|
||||
<br><img class="screenshot" src="../images/safe_browsing.png">
|
||||
</p>
|
||||
|
||||
<h3>Firefox Health Report</h3>
|
||||
<p>
|
||||
From the horse's mouth: "For example, FHR sends data to Mozilla on things like: operating system, PC/Mac, number of processors, Firefox version, the number and type of add-ons. The data collected by FHR is tied to a Document ID that corresponds to a browser installation (explained above in question #4) so that the data can be correlated across a limited window of time."<sup><a href="#2">[2]</a></sup> Also, according to Mozilla, new versions of Firefox will also collect telemetry data by default. <b><font color=lime>Can be disabled through the GUI.</font></b>
|
||||
</p>
|
||||
|
||||
<h3>Anti-privacy search engines by default</h3>
|
||||
<p>Old versions of Firefox had Google as the default search engine,
|
||||
which is obviously anti-privacy. For example, from their privacy
|
||||
policy: "When you use our
|
||||
services or view content provided by Google, we automatically collect
|
||||
and store certain information in server logs. This includes: details
|
||||
of how you used our service, such as your search queries.". Then, it
|
||||
was Yahoo, which isn't better: "The Yahoo Search History tool allows
|
||||
you to see what you've searched for in the past. ". So it saves all
|
||||
your searches. And deleting does nothing: "Even if you clear your
|
||||
past searches or turn the Search History tool off, Yahoo still
|
||||
collects and stores search user log data when you use Yahoo Search
|
||||
technology." Firefox 57 is going back to Google again. If they really
|
||||
cared about your privacy, the default search engine would be
|
||||
StartPage (which gives the same results as Google, but anonymized) or
|
||||
DuckDuckGo. <b><font color=lime>Can be changed through the GUI.</font></b>
|
||||
</p>
|
||||
|
||||
|
||||
<h3>Pocket — a privacy nightmare</h3>
|
||||
<p>
|
||||
Firefox has a Pocket button in its navigation bar, which allows you
|
||||
to "save any article, video or page from Firefox" and "View in Pocket
|
||||
on any device, any time." Let's see how it looks in terms of privacy
|
||||
— quoting from Pocket's privacy policy<sup><a href="#3">[3]</a></sup>:
|
||||
|
||||
"In addition to the information that you provide to us when you
|
||||
register for a user account, we collect information about the URLs,
|
||||
titles and content of the web pages and other information you save to
|
||||
Pocket." So everything you conveniently put in "your" Pocket is
|
||||
being stored (of course, otherwise Pocket wouldn't work). "The types
|
||||
of information we collect includes your browser type, device type,
|
||||
device id, time zone, language, and other information related to the
|
||||
manner in which you access the Pocket Technologies. " So anytime you
|
||||
view a file in "your" Pocket, they know everything about the device
|
||||
you used to do it. "We may also use "pixel tags," "web beacons,"
|
||||
"clear GIFs" or similar means (individually or collectively "Pixel
|
||||
Tags") in connection with emails that we send to our users in order
|
||||
to collect usage data." So, they are acting like any old tracking
|
||||
website, even in ways that have nothing to do with their
|
||||
functionality. "We may also share your device ID with third parties
|
||||
in connection with advertising campaigns. " And they work with
|
||||
advertisers too! Describing all of Pocket's
|
||||
violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default. <font color=yellow> <b>Can be disabled in about:config</b></font><sup><a href="#8">[8]</a></sup>
|
||||
</p>
|
||||
<h3>Automatic updates</h3>
|
||||
<p>
|
||||
Not that bad compared to all of the above, I guess — but still
|
||||
installs something without your consent, with possible new privacy
|
||||
nightmares in there. There is no excuse to at least not make "Check for updates, but
|
||||
let me choose whether to install them" the default — it would still
|
||||
give the security benefit, but not take control away from the user.
|
||||
<b><font color=lime>Can be disabled through the GUI.</font></b>
|
||||
</p>
|
||||
|
||||
<h3>Other issues</h3>
|
||||
<p>
|
||||
Firefox also sometimes makes a request to "self-repair.mozilla.org" which looks like this:
|
||||
<br><img class="screenshot" src="../images/self_repair.png">
|
||||
It includes "optimizelyEndUserID" which probably means it
|
||||
<b>uniquely identifies you. </b><b><font color=orange>Can be disabled ONLY in about:config.</font></b><sup><a href="#7">[7]</a></sup><br>
|
||||
It also makes this request every time you open the default home page:
|
||||
<img class="screenshot" src ="../images/request2.png"><br>
|
||||
The number after the Firefox version is, again, <b>uniquely
|
||||
identifying</b><sup><a href="#4">[4]</a></sup><b><font color=orange> Can be disabled ONLY in about:config.</font></b>
|
||||
<br>
|
||||
Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed). <img class="screenshot" src ="../images/blocklist.png"> The request includes a <b>uniquely identifying</b> browser installation ID. <b><font color=orange>Can be disabled ONLY in about:config.</font></b>
|
||||
|
||||
</p>
|
||||
|
||||
<h3>Firefox phones home about almost every single interaction you have with its UI</h3>
|
||||
<p>
|
||||
Firefox will send information about almost every basic operation that you do back to Mozilla. This is tagged with a unique client ID and an ID for your current session, and any relevant information related to this action.
|
||||
<b><font color=red>By default, the following uses of the UI are reported to Mozilla<sup><a href="#5">[5]</a></sup>:</font></b>
|
||||
<ul>
|
||||
<li>Performing a search</li>
|
||||
<li>Clicking a top site item</li>
|
||||
<li>Deleting an item from history</li>
|
||||
<li>Blocking a site</li>
|
||||
<li>Bookmarking a link</li>
|
||||
<li>Removing a bookmark from a link</li>
|
||||
<li>Opening a link in a new window</li>
|
||||
<li>Opening a link in a new private window</li>
|
||||
<li>Opening the new tab preferences pane</li>
|
||||
<li>Closing the new tab preferences pane</li>
|
||||
<li>Acknowledging a section disclaimer</li>
|
||||
<li>Adding or editing a new TopSite</li>
|
||||
<li>Requesting a custom screenshot preview</li>
|
||||
<li>Session end</li>
|
||||
<li>Impression stats</li>
|
||||
<li>Click/block/save_to_pocket ping</li>
|
||||
<li>Addon initialization failure</li>
|
||||
<li>Domain affinity calculation</li>
|
||||
</ul>
|
||||
<p>
|
||||
Essentially, while this feature doesn't broadcast your search history to Mozilla, it proves an incredibly detailed walkthrough of exactly how you use Firefox's user interface. This can be disabled and is an opt-out spyware feature. You can disable it through the GUI as described here:
|
||||
<a href="https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">Share data with Mozilla to help improve Firefox</a>
|
||||
<a href="http://web.archive.org/web/20181002204159/https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">[web.archive.org]</a>
|
||||
<a href="http://archive.fo/gkVeb">[archive.fo]</a>
|
||||
<a href="https://ghostarchive.org/archive/lzNDJ?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<h3>Whitelisting trackers</h3>
|
||||
<p>
|
||||
Mozilla has a feature called "Enhanced Tracking Protection". This feature's claimed goal is to protect the user from being tracked.
|
||||
This would be nice if Mozilla didn't whitelist a massive list of domains<sup><a href="#9">[9]</a></sup>.
|
||||
</p>
|
||||
<h3>Mitigating Firefox Spyware</h3>
|
||||
<p>
|
||||
This review is also accompanied by a page about how to configure Firefox to be more privacy respecting, and links to other projects that have been created to solve this
|
||||
problem. You can read about that <a href="../guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that
|
||||
they should be set too:
|
||||
</p>
|
||||
<table border background="../images/bg.jpg" style="width:800px">
|
||||
<tr>
|
||||
<th>Spyware Feature</th>
|
||||
<th>about:config flag</th>
|
||||
<th>about:config value</th>
|
||||
<th>Source</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Phoning home</td>
|
||||
<td>network.captive-portal-service.enabled</td>
|
||||
<td>False</td>
|
||||
<td><a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a>
|
||||
<a href="https://archive.li/57xdG">[archive.li]</a>
|
||||
<a href="https://web.archive.org/web/20180721175100/https://support.mozilla.org/en-US/questions/1157121">[web.archive.org]</a>
|
||||
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Self-Repair</td>
|
||||
<td>browser.selfsupport.url</td>
|
||||
<td>""</td>
|
||||
<td> <a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a>
|
||||
<a href="https://archive.li/a17cN">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/LJbGO">[ghostarchive.org]</a>
|
||||
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Pocket</td>
|
||||
<td>pocket.enabled</td>
|
||||
<td>False</td>
|
||||
<td> <a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a>
|
||||
<a href="https://archive.li/mWBcp">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/uFyTF">[ghostarchive.org]</a>
|
||||
|
||||
|
||||
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
<a href="https://jojo-website.neocities.org/privacy.html">firefox "about:config" settings</a>
|
||||
<a href="http://web.archive.org/web/20180821224202/https://jojo-website.neocities.org/privacy.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/eyzdE">[archive.is]</a><br>
|
||||
<a href="https://invidious.snopyta.org/watch?v=UqkeZIPLY5M">Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp?</a>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Credits</h2>
|
||||
<p>
|
||||
This article was originally written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Formatting changes and some sections were written by the site maintainer.<br>
|
||||
Other Anonymous contributors have added other sections and various changes to this article, as well.
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://github.com/mozilla/addons-frontend/issues/2785">Google Analytics is used to track users</a>
|
||||
<a href="https://web.archive.org/web/20180511002156/https://github.com/mozilla/addons-frontend/issues/2785">[web.archive.org]</a>
|
||||
<a href="https://archive.li/hF6KB">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/4X56U?kreymer=false">[ghostarchive.org]</a>
|
||||
<a href="https://via.hypothes.is/https://github.com/mozilla/addons-frontend/issues/2785">[via.hypothes.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://blog.mozilla.org/metrics/fhr-faq">FAQ for FHR</a>
|
||||
<a href="https://web.archive.org/web/20180513014211/https://blog.mozilla.org/metrics/fhr-faq/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/search?term=https://blog.mozilla.org/metrics/fhr-faq/">[ghostarchive.org]</a>
|
||||
<a href="https://archive.li/No9Xo">[archive.li]</a><br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="https://getpocket.com/privacy?t=privacypolicy">Pocket Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20180410043925/https://getpocket.com/privacy?t=privacypolicy">[web.archive.org]</a>
|
||||
<a href="https://archive.is/dCa2m">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/69mcK?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="4">4.</a>
|
||||
<a href="https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">Snippets Service Data Collection</a>
|
||||
<a href="https://web.archive.org/web/20180410043926/https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">[web.archive.org]</a>
|
||||
<a href="https://archive.li/JDXjv">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/1Ad5D?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="5">5.</a>
|
||||
<a href="https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">Metrics we collect</a>
|
||||
<a href="https://web.archive.org/web/20180530091900/https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">[web.archive.org]</a>
|
||||
<a href="https://archive.li/aK9Bx">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/ty2Xt?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="6">6.</a>
|
||||
<a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a>
|
||||
<a href="https://archive.li/57xdG">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/vErK3?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="7">7.</a>
|
||||
<a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a>
|
||||
<a href="https://archive.li/a17cN">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/bHz3f?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="8">8.</a>
|
||||
<a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a>
|
||||
<a href="https://archive.li/mWBcp">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/uFyTF">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<a name="9">9.</a>
|
||||
<a href="https://disconnect.me/trackerprotection/unblocked">List of whitelisted trackers</a>
|
||||
<a href="https://web.archive.org/web/20200411051257/https://disconnect.me/trackerprotection/unblocked">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/PLqhJ?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 08/17/2021
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was created on 11/23/2017
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<a href="../articles/index.html">Back to catalog</a><br>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/firefox_logo3.png" alt="Firefox logo"/>
|
||||
<h1>Mozilla Firefox</h1>
|
||||
<p>Mozilla Firefox is one of the most popular and longest existing browsers. Its developers have earned it a reputation for being a "privacy and security-based browser, respecting the user" — but is it justified, or just marketing? In fact, over the years they have made several anti-privacy (and generally anti-user) decisions, but this article will focus exclusively on spying. Version tested: 52.5.0, with the default settings. Program used for testing requests: Mitmproxy.</p>
|
||||
<h2>Spyware Level: <span class="orange">High</span></h2>
|
||||
<p>After following the <a href="../guides/firefox.html">mitigation guide</a>, this software is <span class="lime"><b>Not Spyware</b></span>.</p>
|
||||
<p>It sends a lot of different data very often (some of which could uniquely identify you). All the "services" that it provides, such as its default search engines and Pocket, are anti-privacy. The rating isn't higher because at least you can turn off or modify most of it, though it often requires diving deep into about:config.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>Whenever you start Firefox, it makes this request:</p>
|
||||
<img class="screenshot" src="../images/request.png" alt="Request"/>
|
||||
<p> In fact, it makes it every time you go to a website, and even a few times in a row for a single website. So Firefox "phones home" all the time, without your knowledge. <b><span class="orange">Can be disabled ONLY in about:config</span></b>. But, since you've already started Firefox, it will make this request at least once.</p>
|
||||
<h3>Automatic connections to some websites you've visited, including their trackers</h3>
|
||||
<p>Websites you visit most often are added to the New Tab panel. When you then open a new tab, Firefox will sometimes make requests to the sites in there, including some of their trackers. I haven't determined how it works yet. Sometimes it doesn't make the requests at all; other times you end up with hundreds of images, scripts, trackers, etc. loaded simply because you opened a new tab (without visiting any website explicitly). <b><span class="red">Was NOT able to find a way to disable this</span></b>, even in about:config.
|
||||
</p>
|
||||
<h3>Firefox tracks users with Google Analytics</h3>
|
||||
<p>Firefox has been integrated with the spyware platform called "Google Analytics"<sup><a href="#s1">[1]</a></sup>. Firefox has been confirmed to now send analytics to Google. According to a Firefox developer the spyware in Firefox is "extremely useful to us and we have already weighed the cost/benefit of using tracking." and that Firefox will not remove Google Analytics support entirely. Firefox's position on privacy is made very clear with this quote:</p>
|
||||
<p><i>"Wanted to address your position though: We don't give the "data directly to Google". See the discussion here: https://bugzilla.mozilla.org/show_bug.cgi?id=858839. The short version is: tl;dr: We now have an option to opt-out of Google doing anything with the data that Google Analytics collections on Mozilla websites. GA tracking is anonymous and at the aggregate level and we use it to improve the experience of our websites. We are collecting aggregate and non-identifiable data in numbers to ensure our development/UX changes are met well. We can respect privacy and still have analytics; in fact Mozilla's aim is for an experience that values user privacy and usability (I'd say Apple also wants UX that fits that mold, as an example). We need some data, anonymized and aggregated, to do this."</i></p>
|
||||
<p>The best takeaway to this is that Mozilla wants to pretend that including spyware in their program is somehow not a breach of privacy, and that Firefox could possibly be respecting user privacy while simultaneously collecting data on users and sending it to Google. It's strongly suggested reading the GitHub thread and the further anti-privacy statements the Mozilla employee makes while defending the spyware features in Firefox. It's very dangerous to assert that there is somehow a middle ground between respecting user privacy and datamining the user.</p>
|
||||
<h3>"Safe" Browsing?</h3>
|
||||
<p>Allegedly used to protect you from "phishing" websites, but in the end, it makes a bunch of requests to Google every 30 minutes (according to Mozilla), including a POST request with your Firefox version and a unique, persistent, hidden cookie. Since whenever the current URL matches an entry in the cached local blacklist a request is made to Google servers, ostensibly to test whether that website is still on the master online blacklist, it allows Google to monitor specific websites transparently to the user by putting the URLs of interest on the local but not the online blacklist. <b><span class="orange">Can be disabled ONLY in about:config</span></b>.</p>
|
||||
<img class="screenshot" src="../images/safe_browsing.png" alt="Safe browsing"/>
|
||||
<h3>Firefox Health Report</h3>
|
||||
<p>From the horse's mouth: "For example, FHR sends data to Mozilla on things like: operating system, PC/Mac, number of processors, Firefox version, the number and type of add-ons. The data collected by FHR is tied to a Document ID that corresponds to a browser installation (explained above in question #4) so that the data can be correlated across a limited window of time."<sup><a href="#s2">[2]</a></sup> Also, according to Mozilla, new versions of Firefox will also collect telemetry data by default. <b><span class="lime">Can be disabled through the GUI.</span></b></p>
|
||||
<h3>Anti-privacy search engines by default</h3>
|
||||
<p>Old versions of Firefox had Google as the default search engine, which is obviously anti-privacy. For example, from their privacy policy: "When you use our services or view content provided by Google, we automatically collect and store certain information in server logs. This includes: details of how you used our service, such as your search queries.". Then, it was Yahoo, which isn't better: "The Yahoo Search History tool allows you to see what you've searched for in the past. ". So it saves all your searches. And deleting does nothing: "Even if you clear your past searches or turn the Search History tool off, Yahoo still collects and stores search user log data when you use Yahoo Search technology." Firefox 57 is going back to Google again. If they really cared about your privacy, the default search engine would be StartPage (which gives the same results as Google, but anonymized) or DuckDuckGo. <b><span class="lime">Can be changed through the GUI.</span></b></p>
|
||||
<h3>Pocket — a privacy nightmare</h3>
|
||||
<p>Firefox has a Pocket button in its navigation bar, which allows you to "save any article, video or page from Firefox" and "View in Pocket on any device, any time." Let's see how it looks in terms of privacy — quoting from Pocket's privacy policy<sup><a href="#s3">[3]</a></sup>: "In addition to the information that you provide to us when you register for a user account, we collect information about the URLs, titles and content of the web pages and other information you save to Pocket." So everything you conveniently put in "your" Pocket is being stored (of course, otherwise Pocket wouldn't work). "The types of information we collect includes your browser type, device type, device id, time zone, language, and other information related to the manner in which you access the Pocket Technologies. " So anytime you view a file in "your" Pocket, they know everything about the device you used to do it. "We may also use "pixel tags," "web beacons," "clear GIFs" or similar means (individually or collectively "Pixel Tags") in connection with emails that we send to our users in order to collect usage data." So, they are acting like any old tracking website, even in ways that have nothing to do with their functionality. "We may also share your device ID with third parties in connection with advertising campaigns. " And they work with advertisers too! Describing all of Pocket's violations would take up this whole article. There are similar services with better privacy policies, but in the end, they still store the things you view in "the cloud". A real privacy-based browser would not be integrated with them by default. <span class="yellow"> <b>Can be disabled in about:config</b></span><sup><a href="#s8">[8]</a></sup></p>
|
||||
<h3>Automatic updates</h3>
|
||||
<p>Not that bad compared to all of the above, I guess — but still installs something without your consent, with possible new privacy nightmares in there. There is no excuse to at least not make "Check for updates, but let me choose whether to install them" the default — it would still give the security benefit, but not take control away from the user. <b><span class="lime">Can be disabled through the GUI.</span></b></p>
|
||||
<h3>Other issues</h3>
|
||||
<p>Firefox also sometimes makes a request to "self-repair.mozilla.org" which looks like this:</p>
|
||||
<img class="screenshot" src="../images/self_repair.png" alt="self-repair.mozilla.org"/>
|
||||
<p>It includes "optimizelyEndUserID" which probably means it <b>uniquely identifies you. </b><b><span class="orange">Can be disabled ONLY in about:config.</span></b><sup><a href="#s7">[7]</a></sup></p>
|
||||
<p>It also makes this request every time you open the default home page:</p>
|
||||
<img class="screenshot" src="../images/request2.png" alt="request2"/>
|
||||
<p>The number after the Firefox version is, again, <b>uniquely identifying</b><sup><a href="#s4">[4]</a></sup><b><span class="orange"> Can be disabled ONLY in about:config.</span></b></p>
|
||||
<p>Firefox has a file with list of blocked addons that it considers "malicious" and it makes a request to update it every day (even if you don't have any addons installed).</p>
|
||||
<img class="screenshot" src ="../images/blocklist.png" alt="Blocklist"/>
|
||||
<p>The request includes a <b>uniquely identifying</b> browser installation ID. <b><span class="orange">Can be disabled ONLY in about:config.</span></b></p>
|
||||
<h3>Firefox phones home about almost every single interaction you have with its UI</h3>
|
||||
<p>Firefox will send information about almost every basic operation that you do back to Mozilla. This is tagged with a unique client ID and an ID for your current session, and any relevant information related to this action. <b><span class="red">By default, the following uses of the UI are reported to Mozilla<sup><a href="#s5">[5]</a></sup>:</span></b></p>
|
||||
<ul>
|
||||
<li>Performing a search</li>
|
||||
<li>Clicking a top site item</li>
|
||||
<li>Deleting an item from history</li>
|
||||
<li>Blocking a site</li>
|
||||
<li>Bookmarking a link</li>
|
||||
<li>Removing a bookmark from a link</li>
|
||||
<li>Opening a link in a new window</li>
|
||||
<li>Opening a link in a new private window</li>
|
||||
<li>Opening the new tab preferences pane</li>
|
||||
<li>Closing the new tab preferences pane</li>
|
||||
<li>Acknowledging a section disclaimer</li>
|
||||
<li>Adding or editing a new TopSite</li>
|
||||
<li>Requesting a custom screenshot preview</li>
|
||||
<li>Session end</li>
|
||||
<li>Impression stats</li>
|
||||
<li>Click/block/save_to_pocket ping</li>
|
||||
<li>Addon initialization failure</li>
|
||||
<li>Domain affinity calculation</li>
|
||||
</ul>
|
||||
<p>Essentially, while this feature doesn't broadcast your search history to Mozilla, it proves an incredibly detailed walkthrough of exactly how you use Firefox's user interface. This can be disabled and is an opt-out spyware feature. You can disable it through the GUI as described here: <a href="https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">Share data with Mozilla to help improve Firefox</a> <a href="http://web.archive.org/web/20181002204159/https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox">[web.archive.org]</a> <a href="http://archive.fo/gkVeb">[archive.fo]</a> <a href="https://ghostarchive.org/archive/lzNDJ?kreymer=false">[ghostarchive.org]</a></p>
|
||||
<h3>Whitelisting trackers</h3>
|
||||
<p>Mozilla has a feature called "Enhanced Tracking Protection". This feature's claimed goal is to protect the user from being tracked. This would be nice if Mozilla didn't whitelist a massive list of domains<sup><a href="#s9">[9]</a></sup>.</p>
|
||||
<h3>Mitigating Firefox Spyware</h3>
|
||||
<p>This review is also accompanied by a page about how to configure Firefox to be more privacy respecting, and links to other projects that have been created to solve this problem. You can read about that <a href="../guides/firefox.html">here.</a> These are some of the flags in about:config mentioned earlier in the article, and the values that they should be set too:</p>
|
||||
<table>
|
||||
<tr>
|
||||
<th>Spyware Feature</th>
|
||||
<th>about:config flag</th>
|
||||
<th>about:config value</th>
|
||||
<th>Source</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Phoning home</td>
|
||||
<td>network.captive-portal-service.enabled</td>
|
||||
<td>False</td>
|
||||
<td><a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a> <a href="https://archive.li/57xdG">[archive.li]</a> <a href="https://web.archive.org/web/20180721175100/https://support.mozilla.org/en-US/questions/1157121">[web.archive.org]</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Self-Repair</td>
|
||||
<td>browser.selfsupport.url</td>
|
||||
<td>""</td>
|
||||
<td><a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a> <a href="https://archive.li/a17cN">[archive.is]</a> <a href="https://ghostarchive.org/archive/LJbGO">[ghostarchive.org]</a></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Pocket</td>
|
||||
<td>pocket.enabled</td>
|
||||
<td>False</td>
|
||||
<td><a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a> <a href="https://archive.li/mWBcp">[archive.is]</a> <a href="https://ghostarchive.org/archive/uFyTF">[ghostarchive.org]</a></td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading</h4>
|
||||
<ol>
|
||||
<li><a href="https://jojo-website.neocities.org/privacy.html">firefox "about:config" settings</a> <a href="http://web.archive.org/web/20180821224202/https://jojo-website.neocities.org/privacy.html">[web.archive.org]</a> <a href="http://archive.is/eyzdE">[archive.is]</a> <a href="https://invidious.snopyta.org/watch?v=UqkeZIPLY5M">Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp?</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://github.com/mozilla/addons-frontend/issues/2785">Google Analytics is used to track users</a> <a href="https://web.archive.org/web/20180511002156/https://github.com/mozilla/addons-frontend/issues/2785">[web.archive.org]</a> <a href="https://archive.li/hF6KB">[archive.li]</a> <a href="https://ghostarchive.org/archive/4X56U?kreymer=false">[ghostarchive.org]</a> <a href="https://via.hypothes.is/https://github.com/mozilla/addons-frontend/issues/2785">[via.hypothes.is]</a></li>
|
||||
<li id="s2"><a href="https://blog.mozilla.org/metrics/fhr-faq">FAQ for FHR</a> <a href="https://web.archive.org/web/20180513014211/https://blog.mozilla.org/metrics/fhr-faq/">[web.archive.org]</a> <a href="https://ghostarchive.org/search?term=https://blog.mozilla.org/metrics/fhr-faq/">[ghostarchive.org]</a> <a href="https://archive.li/No9Xo">[archive.li]</a></li>
|
||||
<li id="s3"><a href="https://getpocket.com/privacy?t=privacypolicy">Pocket Privacy Policy</a> <a href="http://web.archive.org/web/20180410043925/https://getpocket.com/privacy?t=privacypolicy">[web.archive.org]</a> <a href="https://archive.is/dCa2m">[archive.is]</a> <a href="https://ghostarchive.org/archive/69mcK?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">Snippets Service Data Collection</a> <a href="https://web.archive.org/web/20180410043926/https://abouthome-snippets-service.readthedocs.io/en/latest/data_collection.html">[web.archive.org]</a> <a href="https://archive.li/JDXjv">[archive.li]</a> <a href="https://ghostarchive.org/archive/1Ad5D?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">Metrics we collect</a> <a href="https://web.archive.org/web/20180530091900/https://github.com/mozilla/activity-stream/blob/master/docs/v2-system-addon/data_events.md">[web.archive.org]</a> <a href="https://archive.li/aK9Bx">[archive.li]</a> <a href="https://ghostarchive.org/archive/ty2Xt?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://support.mozilla.org/en-US/questions/1157121">Turn off captive portal</a> <a href="https://archive.li/57xdG">[archive.is]</a> <a href="https://ghostarchive.org/archive/vErK3?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://support.mozilla.org/en-US/questions/1067502">How can I stop firefox from constantly connecting to self-repair.mozillia.org</a> <a href="https://archive.li/a17cN">[archive.is]</a> <a href="https://ghostarchive.org/archive/bHz3f?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://help.getpocket.com/article/1025-disabling-pocket-in-firefox#firefox">Disable Pocket in Firefox</a> <a href="https://archive.li/mWBcp">[archive.is]</a> <a href="https://ghostarchive.org/archive/uFyTF">[ghostarchive.org]</a></li>
|
||||
<li id="s9"><a href="https://disconnect.me/trackerprotection/unblocked">List of whitelisted trackers</a> <a href="https://web.archive.org/web/20200411051257/https://disconnect.me/trackerprotection/unblocked">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/PLqhJ?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 08/17/2021</b>
|
||||
<br/>
|
||||
<b>This article was created on 11/23/2017</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,17 +1,14 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/firefox_logo3.png" alt="Firefox logo">
|
||||
<h1>Mozilla Firefox</h1>
|
||||
<center>
|
||||
<a href="../articles/firefox.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
|
||||
</p>
|
||||
|
@ -200,12 +197,12 @@ Una mejor forma de entender esto es que Mozilla quiere pretender que incluir spy
|
|||
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Créditos</h2>
|
||||
<p>
|
||||
Este artículo fue escrito originalmente por <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Algunos cambios de formato y secciones fueron escritos por el mantenedor del sitio.<br>
|
||||
Otros colaboradores anónimos han añadido secciones y varios cambios a este artículo, también.<br>
|
||||
El artículo fue traducido al español por un colaborador anónimo.
|
||||
<h2>Créditos</h2>
|
||||
<p>
|
||||
Este artículo fue escrito originalmente por <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Algunos cambios de formato y secciones fueron escritos por el mantenedor del sitio.<br>
|
||||
Otros colaboradores anónimos han añadido secciones y varios cambios a este artículo, también.<br>
|
||||
El artículo fue traducido al español por un colaborador anónimo.
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Referencias</h2>
|
||||
|
|
|
@ -1,57 +1,46 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Google — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/google_logo.png" alt="Google logo">
|
||||
<h1>Google</h1>
|
||||
<p>
|
||||
Google is an advertising company that produces and researches a huge amount of spyware products and services that permeate
|
||||
the internet almost entirely. It is almost impossible for the naive user to use the internet without running into Google
|
||||
spyware, as they have deployed products on almost every level of the user's interaction with the internet infrastructure.
|
||||
</p>
|
||||
<h2>Technology</h2>
|
||||
<p>
|
||||
The following articles on this website have been written about technology created by Google:
|
||||
</p>
|
||||
<center>
|
||||
<p>
|
||||
<a href="../articles/chrome.html">Google Chrome</a><br>
|
||||
<a href="../articles/google_search.html">Google Search</a><br>
|
||||
<a href="../articles/youtube.html">YouTube</a><br>
|
||||
</p>
|
||||
</center>
|
||||
<h2>Privacy Statements and Policies</h2>
|
||||
<p>
|
||||
The following documents are an incomplete list of policies Google uses for its various products and
|
||||
services when concerning user privacy.
|
||||
</p>
|
||||
<center>
|
||||
<p>
|
||||
<a href="https://policies.google.com/privacy">Google Privacy policy</a>
|
||||
<a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]/a>
|
||||
<a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a>
|
||||
<a href="https://archive.li/U4mQP">[archive.li]</a><br>
|
||||
</p>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br>
|
||||
<a href="https://stallman.org/google.html">Reasons not to use Google</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 11/9/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/google_logo.png" alt="Google logo"/>
|
||||
<h1>Google</h1>
|
||||
<p>Google is an advertising company that produces and researches a huge amount of spyware products and services that permeate the internet almost entirely. It is almost impossible for the naive user to use the internet without running into Google spyware, as they have deployed products on almost every level of the user's interaction with the internet infrastructure.</p>
|
||||
<h2>Technology</h2>
|
||||
<p>The following articles on this website have been written about technology created by Google:</p>
|
||||
<ul>
|
||||
<li><a href="../articles/chrome.html">Google Chrome</a></li>
|
||||
<li><a href="../articles/google_search.html">Google Search</a></li>
|
||||
<li><a href="../articles/youtube.html">YouTube</a></li>
|
||||
</ul>
|
||||
<h2>Privacy Statements and Policies</h2>
|
||||
<p>The following documents are an incomplete list of policies Google uses for its various products and services when concerning user privacy.</p>
|
||||
<ul>
|
||||
<li><a href="https://policies.google.com/privacy">Google Privacy policy</a> <a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a> <a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a> <a href="https://archive.li/U4mQP">[archive.li]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 11/9/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,110 +1,100 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Google Search — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/google_logo.png" alt="Google logo">
|
||||
<h1>Google Search</h1>
|
||||
<center>
|
||||
<p>
|
||||
<a href="../articles/google_search_es.html">[Español]</a>
|
||||
<a href="../articles/google_search_tr.html">[Türk]</a><br><br>
|
||||
</p>
|
||||
</center>
|
||||
<p>
|
||||
Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Google Search collects your personal information and is heavily integrated with other services that collect your personal information.
|
||||
Google's privacy policy<sup><a href="#1">[1]</a></sup> is written in a way that does not tell you which Google services are
|
||||
collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is
|
||||
to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed.
|
||||
</p>
|
||||
<p>
|
||||
It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It
|
||||
does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects
|
||||
your information, so it is really not trying to be very detailed because it would not say anything new.
|
||||
</p>
|
||||
<h3>Google Search records your searches</h3>
|
||||
<p>
|
||||
Searches made using Google Search are associated with your identity and recorded in Google's servers. From the
|
||||
privacy policy<sup><a href="#1">[1]</a></sup>, Google makes it clear that:
|
||||
</p>
|
||||
<p><i>
|
||||
"We collect information about the services that you use and how you use them"
|
||||
</i></p>
|
||||
<p>
|
||||
Where "collect information" is clearly stated<sup><a href="#2">[2]</a></sup> as such:
|
||||
</p>
|
||||
<p><i>
|
||||
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><font color=red>browsing history</font></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
|
||||
</i></p>
|
||||
<p>
|
||||
Google also confirms again that it stores your searches in its servers, in this quote:
|
||||
</p>
|
||||
<p>
|
||||
<i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs.
|
||||
This includes: details of how you used our service, such as your search queries."</i>
|
||||
</p>
|
||||
<h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3>
|
||||
<p>
|
||||
In this page of Google's privacy policy<sup><a href="#2">[2]</a></sup>, Google confirms that
|
||||
they create profiles of their users interests:
|
||||
</p>
|
||||
<p><i>
|
||||
"For example, we may use...information in your web history cookies to provide you with more relevant search results."
|
||||
</i></p>
|
||||
<p>
|
||||
It's important to note that Google <b>does not</b> think that your search history is personal information, as long as it is not attached to your name.
|
||||
It does share this information with advertisers, as long as it is "not identifiable":
|
||||
</p>
|
||||
<p><i>
|
||||
"We may share non-personally identifiable information publicly and with our partners – like publishers, advertisers or connected sites. For example, we may share information publicly to show trends about the general use of our services."
|
||||
</i></p>
|
||||
<h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3>
|
||||
<p>
|
||||
Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform
|
||||
exists to collect personal information, and connects its users to other spyware services in the Google ecosystem.
|
||||
It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services
|
||||
to one user, increasing the accuracy of their internal profile of you.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br>
|
||||
<a href="https://stallman.org/google.html">Reasons not to use Google</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://policies.google.com/privacy">Google Privacy policy</a>
|
||||
<a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a>
|
||||
<a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a>
|
||||
<a href="https://archive.li/U4mQP">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a>
|
||||
<a href="https://archive.li/Hthpb">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 12/12/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/google_logo.png" alt="Google logo"/>
|
||||
<h1>Google Search</h1>
|
||||
<p>
|
||||
Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Google Search collects your personal information and is heavily integrated with other services that collect your personal information.
|
||||
Google's privacy policy<sup><a href="#s1">[1]</a></sup> is written in a way that does not tell you which Google services are
|
||||
collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is
|
||||
to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed.
|
||||
</p>
|
||||
<p>
|
||||
It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It
|
||||
does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects
|
||||
your information, so it is really not trying to be very detailed because it would not say anything new.
|
||||
</p>
|
||||
<h3>Google Search records your searches</h3>
|
||||
<p>
|
||||
Searches made using Google Search are associated with your identity and recorded in Google's servers. From the
|
||||
privacy policy<sup><a href="#s1">[1]</a></sup>, Google makes it clear that:
|
||||
</p>
|
||||
<p><i>
|
||||
"We collect information about the services that you use and how you use them"
|
||||
</i></p>
|
||||
<p>
|
||||
Where "collect information" is clearly stated<sup><a href="#s2">[2]</a></sup> as such:
|
||||
</p>
|
||||
<p><i>
|
||||
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><span class="red">browsing history</span></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
|
||||
</i></p>
|
||||
<p>
|
||||
Google also confirms again that it stores your searches in its servers, in this quote:
|
||||
</p>
|
||||
<p>
|
||||
<i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs.
|
||||
This includes: details of how you used our service, such as your search queries."</i>
|
||||
</p>
|
||||
<h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3>
|
||||
<p>
|
||||
In this page of Google's privacy policy<sup><a href="#s2">[2]</a></sup>, Google confirms that
|
||||
they create profiles of their users interests:
|
||||
</p>
|
||||
<p><i>
|
||||
"For example, we may use...information in your web history cookies to provide you with more relevant search results."
|
||||
</i></p>
|
||||
<p>
|
||||
It's important to note that Google <b>does not</b> think that your search history is personal information, as long as it is not attached to your name.
|
||||
It does share this information with advertisers, as long as it is "not identifiable":
|
||||
</p>
|
||||
<p><i>
|
||||
"We may share non-personally identifiable information publicly and with our partners – like publishers, advertisers or connected sites. For example, we may share information publicly to show trends about the general use of our services."
|
||||
</i></p>
|
||||
<h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3>
|
||||
<p>
|
||||
Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform
|
||||
exists to collect personal information, and connects its users to other spyware services in the Google ecosystem.
|
||||
It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services
|
||||
to one user, increasing the accuracy of their internal profile of you.
|
||||
</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://policies.google.com/privacy">Google Privacy policy</a> <a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a> <a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a> <a href="https://archive.li/U4mQP">[archive.li]</a> <a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a> <a href="https://archive.li/Hthpb">[archive.li]</a> <a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 12/12/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,20 +1,14 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Google Search — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/google_logo.png">
|
||||
<h1>Buscador de Google</h1>
|
||||
<center>
|
||||
<p>
|
||||
<a href="../articles/google_search.html">[English]</a>
|
||||
<a href="../articles/google_search_tr.html">[Türk]</a><br><br>
|
||||
</p>
|
||||
</center>
|
||||
<p>El buscador de Google es un motor de busqueda creado y mantenido por Google</p>
|
||||
<h2>Nivel de spyware<font color="red"> EXTREMADAMENTE ALTO</font></h2>
|
||||
<p> El buscador de Google recolecta tu información personal y está altamente integrado con otros servicios que también recolectan tu información personal. En la política de privacidad de Google<sup><a href="#1">[1]</a></sup> está escrita de mandera que no dice que tipos de información recolectam por lo que miente. Así que lo mejor que puedes hacer, es afirmar que cada vez que usas un servicio de Google es saber que está haciendo lo posible para obtener toda tu información.</p>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Google Search — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
@ -10,10 +10,6 @@
|
|||
<p>
|
||||
<img src="../images/google_logo.png" alt="Google logo">
|
||||
<h1>Google Arama</h1>
|
||||
<center>
|
||||
<a href="../articles/google_search.html">[English]</a>
|
||||
<a href="../articles/google_search_es.html">[Español]</a><br><br>
|
||||
</center>
|
||||
</p>
|
||||
<p><a href="../articles/google.html">Google</a> Arama tarafından oluşturulan ve yönetilen bir arama motorudur.
|
||||
</p>
|
||||
|
|
|
@ -1,41 +1,36 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>GZDoom — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo">
|
||||
<h1>GZDoom</h1>
|
||||
<p>
|
||||
GZDoom is a source port of Doom based on an older source port, ZDoom.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
|
||||
<p>
|
||||
GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#1">[1]</a></sup>.
|
||||
GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you
|
||||
should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://forum.zdoom.org/viewtopic.php?f=49&t=59787">GZStats: A quick rundown</a>
|
||||
<a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&t=59787">[web.archive.org]</a>
|
||||
<a href="https://archive.is/2cTl4">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 5/30/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo"/>
|
||||
<h1>GZDoom</h1>
|
||||
<p>GZDoom is a source port of Doom based on an older source port, ZDoom.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#s1">[1]</a></sup>. GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://forum.zdoom.org/viewtopic.php?f=49&t=59787">GZStats: A quick rundown</a> <a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&t=59787">[web.archive.org]</a> <a href="https://archive.is/2cTl4">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 5/30/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,31 +1,28 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Hexchat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo">
|
||||
<h1>Hexchat</h1>
|
||||
<center>
|
||||
<a href="../articles/hexchat_ru.html">[Русский]</a>
|
||||
</center>
|
||||
<p>
|
||||
HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
|
||||
<h1>Hexchat</h1>
|
||||
<p>HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,31 +1,26 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="ru" xml:lang="ru">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<title>Hexchat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo">
|
||||
<h1>Hexchat</h1>
|
||||
<center>
|
||||
<a href="../articles/hexchat.html">[English]</a>
|
||||
</center>
|
||||
<p>
|
||||
HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем.
|
||||
</p>
|
||||
<h2>Уровень слежки: <font color=lime>Нет</font></h2>
|
||||
<p>
|
||||
Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Обратно в каталог</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
|
||||
<h1>Hexchat</h1>
|
||||
<p>HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем.</p>
|
||||
<h2>Уровень слежки: <span class="lime">Нет</span></h2>
|
||||
<p>Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,55 +1,45 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/http.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>HTTP - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="main">
|
||||
<img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/>
|
||||
<h1>HyperText Transmission Protocol</h1>
|
||||
<p>HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p>
|
||||
<h3>"User-Agent" Datamining feature</h3>
|
||||
<p>Section 14.43<sup><a href="#one">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
|
||||
<p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p>
|
||||
<h3>Acknowledgement of HTTP's privacy problem</h3>
|
||||
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#two">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
|
||||
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
|
||||
</div>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a id="one">1.</a>
|
||||
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a>
|
||||
<a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a>
|
||||
<a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 5/14/2018</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>HTTP - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/>
|
||||
<h1>HyperText Transmission Protocol</h1>
|
||||
<p>HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p>
|
||||
<h3>"User-Agent" Datamining feature</h3>
|
||||
<p>Section 14.43<sup><a href="#s1">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
|
||||
<p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p>
|
||||
<h3>Acknowledgement of HTTP's privacy problem</h3>
|
||||
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#s2">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
|
||||
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 5/14/2018</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/11/2020</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,48 +1,38 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>GNU IceCat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo">
|
||||
<h1>GNU IceCat</h1>
|
||||
<center>
|
||||
<a href="../articles/icecat_es.html">[Español]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a>
|
||||
</p>
|
||||
<h3>IceCat's privacy features</h3>
|
||||
<center>
|
||||
<p>
|
||||
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>
|
||||
</p>
|
||||
</center>
|
||||
<p>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</p>
|
||||
<p>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</p>
|
||||
<p>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</p>
|
||||
<p>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</p>
|
||||
<p>
|
||||
As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">
|
||||
GNUzilla — News: IceCat 60.2.0 Pre-release</a>
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p><b>
|
||||
This article was last edited on 9/18/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo"/>
|
||||
<h1>GNU IceCat</h1>
|
||||
<p>GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <span class="lime"><b>no unsolicited connections</b></span> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a></p>
|
||||
<h3>IceCat's privacy features</h3>
|
||||
<p>From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:</p>
|
||||
<ul>
|
||||
<li>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</li>
|
||||
<li>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</li>
|
||||
<li>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</li>
|
||||
<li>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</li>
|
||||
</ul>
|
||||
<p>As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">GNUzilla — News: IceCat 60.2.0 Pre-release</a></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<b>This article was last edited on 9/18/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Outdated GNU IceCat — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,17 +1,14 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>GNU IceCat — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo">
|
||||
<h1>GNU IceCat</h1>
|
||||
<center>
|
||||
<a href="../articles/icecat.html">[English]</a><br><br></p>
|
||||
</center>
|
||||
<p>
|
||||
GNU IceCat es un navegador web, derivado de <a href="../articles/firefox.html">Firefox</a>.
|
||||
</p>
|
||||
|
|
|
@ -1,19 +1,14 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”it”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>GNU IceCat — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo">
|
||||
<h1>GNU IceCat</h1>
|
||||
<center>
|
||||
<a href="../articles/icecat_es.html">[Español]</a>
|
||||
<a href="../articles/icecat.html">[English]</a>
|
||||
<br><br>
|
||||
</center>
|
||||
<p>
|
||||
GNU IceCat è un navigatore web, derviato de <a href="../articles/firefox.html">Firefox [English]</a>.
|
||||
</p>
|
||||
|
|
|
@ -1,118 +1,114 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/index.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Catalog - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="../index.html">← Home</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<h1>Spyware Watchdog Article Catalog</h1>
|
||||
<p>All of the articles on this website are available here!</p>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Web Browsers</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
|
||||
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a></li>
|
||||
<li><a href="../articles/dissenter.html">Dissenter</a></li>
|
||||
<li><a href="../articles/explorer.html">Internet Explorer</a></li>
|
||||
<li><a href="../articles/falkon.html">Falkon</a></li>
|
||||
<li><a href="../articles/firefox.html">Mozilla Firefox</a> <a href="../articles/firefox_es.html">[Español]</a> <a href="../guides/firefox.html">[Mitigation Guide]</a> <a href="../guides/firefox_es.html">[Guía de Mitigación]</a> </li>
|
||||
<li><a href="../articles/icecat.html">GNU IceCat</a> <a href="../articles/icecat_es.html">[Español]</a> <a href="../articles/icecat_it.html">[Italiano]</a></li>
|
||||
<li><a href="../articles/iridium.html">Iridium Browser</a> <a href="../guides/iridium.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/librewolf.html">Librewolf</a></li>
|
||||
<li><a href="../articles/lynx.html">Lynx</a> <a href="lynx_pl.html">[Polski]</a> <a href="lynx_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/netsurf.html">NetSurf</a> <a href="../articles/netsurf_pl.html">[Polski]</a> <a href="../guides/netsurf.html">[Mitigation Guide]</a> <a href="../guides/netsurf_pl.html">[Poradnik Mitygacji]</a></li>
|
||||
<li><a href="../articles/opera.html">Opera</a></li>
|
||||
<li><a href="../articles/otter.html">Otter Browser</a></li>
|
||||
<li><a href="../articles/palemoon.html">Pale Moon</a> <a href="../articles/palemoon_es.html">[Español]</a> <a href="../guides/palemoon.html">[Mitigation Guide]</a> <a href="../guides/palemoon_es.html">[Guía de Mitigación]</a></li>
|
||||
<li><a href="../articles/qutebrowser.html">Qutebrowser</a> <a href="../articles/qutebrowser_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/seamonkey.html">SeaMonkey</a> <a href="../guides/seamonkey.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/slimjet.html">Slimjet</a> <a href="slimjet_pl.html">[Polski]</a></li>
|
||||
<li><a href="../articles/sphere.html">Sphere Browser</a></li>
|
||||
<li><a href="../articles/iron.html">SRWare Iron</a> <a href="iron_pl.html">[Polski]</a></li>
|
||||
<li><a href="../articles/surf.html">Surf</a> <a href="surf_fr.html">[Francais]</a> <a href="surf_pl.html">[Polski]</a> <a href="surf_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/tbb.html">Tor Browser</a> <a href="../guides/tbb.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></li>
|
||||
<li><a href="../articles/vivaldi.html">Vivaldi</a></li>
|
||||
<li><a href="../articles/waterfox_classic.html">Waterfox Classic</a></li>
|
||||
<li><a href="../articles/webbrowser.html">Web Browser</a></li>
|
||||
<li><a href="../articles/webdiscover.html">WebDiscover</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Online Content Platforms</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/snapchat.html">Snapchat</a></li>
|
||||
<li><a href="../articles/instagram.html">Instagram</a> <a href="../articles/instagram_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/youtube.html">YouTube</a> <a href="../articles/youtube_es.html">[Español]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Messaging Clients/Services</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/discord.html">Discord</a> <a href="../articles/discord_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/thunderbird.html">Mozilla Thunderbird</a></li>
|
||||
<li><a href="../articles/hexchat.html">Hexchat</a> <a href="../articles/hexchat_ru.html">[Русский]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Search Engines</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/google_search.html">Google Search</a> <a href="../articles/google_search_es.html">[Español]</a> <a href="../articles/google_search_tr.html">[Türk]</a></li>
|
||||
<li><a href="../articles/bing.html">Bing</a></li>
|
||||
<li><a href="../articles/yahoo.html">Yahoo</a></li>
|
||||
<li><a href="../articles/duckduckgo.html">DuckDuckGo</a> <a href="../articles/duckduckgo_es.html">[Español]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Video Games</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/redshell.html">Red Shell</a></li>
|
||||
<li><a href="../articles/unity.html">Unity</a></li>
|
||||
<li><a href="../articles/razer.html">Razer</a> <a href="../articles/razer_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/ksp.html">Kerbal Space Program</a></li>
|
||||
<li><a href="../articles/gzdoom.html">GZDoom</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Media Players</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/clementine.html">Clementine</a></li>
|
||||
<li><a href="../articles/realplayer.html">RealPlayer</a></li>
|
||||
<li><a href="../articles/itunes.html">iTunes</a></li>
|
||||
<li><a href="../articles/vlc.html">VLC Media Player</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Misc Software</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/ccleaner.html">CCleaner</a></li>
|
||||
<li><a href="../articles/bleachbit.html">BleachBit</a></li>
|
||||
<li><a href="../articles/poweriso.html">PowerISO</a></li>
|
||||
<li><a href="../articles/cdex.html">CDex</a></li>
|
||||
<li><a href="../articles/paint.net.html">Paint.NET</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Not Spyware but Has Privacy Issues</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/telegram.html">Telegram</a></li>
|
||||
<li><a href="../articles/http.html">HyperText Transmission Protocol</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Catalog - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="../index.html">← Home</a></div>
|
||||
<div class="center">
|
||||
<h1>Spyware Watchdog Article Catalog</h1>
|
||||
<p>All of the articles on this website are available here!</p>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Web Browsers</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
|
||||
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a> <a href="../articles/chrome_ptbr.html">[Português (Brasil)]</a></li>
|
||||
<li><a href="../articles/dissenter.html">Dissenter</a></li>
|
||||
<li><a href="../articles/explorer.html">Internet Explorer</a></li>
|
||||
<li><a href="../articles/falkon.html">Falkon</a></li>
|
||||
<li><a href="../articles/firefox.html">Mozilla Firefox</a> <a href="../articles/firefox_es.html">[Español]</a> <a href="../guides/firefox.html">[Mitigation Guide]</a> <a href="../guides/firefox_es.html">[Guía de Mitigación]</a> </li>
|
||||
<li><a href="../articles/icecat.html">GNU IceCat</a> <a href="../articles/icecat_es.html">[Español]</a> <a href="../articles/icecat_it.html">[Italiano]</a></li>
|
||||
<li><a href="../articles/iridium.html">Iridium Browser</a> <a href="../guides/iridium.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/librewolf.html">Librewolf</a></li>
|
||||
<li><a href="../articles/lynx.html">Lynx</a> <a href="lynx_pl.html">[Polski]</a> <a href="lynx_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/netsurf.html">NetSurf</a> <a href="../articles/netsurf_pl.html">[Polski]</a> <a href="../guides/netsurf.html">[Mitigation Guide]</a> <a href="../guides/netsurf_pl.html">[Poradnik Mitygacji]</a></li>
|
||||
<li><a href="../articles/opera.html">Opera</a></li>
|
||||
<li><a href="../articles/otter.html">Otter Browser</a></li>
|
||||
<li><a href="../articles/palemoon.html">Pale Moon</a> <a href="../articles/palemoon_es.html">[Español]</a> <a href="../guides/palemoon.html">[Mitigation Guide]</a> <a href="../guides/palemoon_es.html">[Guía de Mitigación]</a></li>
|
||||
<li><a href="../articles/qutebrowser.html">Qutebrowser</a> <a href="../articles/qutebrowser_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/seamonkey.html">SeaMonkey</a> <a href="../guides/seamonkey.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/slimjet.html">Slimjet</a> <a href="slimjet_pl.html">[Polski]</a></li>
|
||||
<li><a href="../articles/sphere.html">Sphere Browser</a></li>
|
||||
<li><a href="../articles/iron.html">SRWare Iron</a> <a href="iron_pl.html">[Polski]</a></li>
|
||||
<li><a href="../articles/surf.html">Surf</a> <a href="surf_fr.html">[Francais]</a> <a href="surf_pl.html">[Polski]</a> <a href="surf_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/tbb.html">Tor Browser</a> <a href="../guides/tbb.html">[Mitigation Guide]</a></li>
|
||||
<li><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></li>
|
||||
<li><a href="../articles/vivaldi.html">Vivaldi</a></li>
|
||||
<li><a href="../articles/waterfox_classic.html">Waterfox Classic</a></li>
|
||||
<li><a href="../articles/webbrowser.html">Web Browser</a></li>
|
||||
<li><a href="../articles/webdiscover.html">WebDiscover</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Online Content Platforms</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/snapchat.html">Snapchat</a></li>
|
||||
<li><a href="../articles/instagram.html">Instagram</a> <a href="../articles/instagram_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/youtube.html">YouTube</a> <a href="../articles/youtube_es.html">[Español]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Messaging Clients/Services</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/discord.html">Discord</a> <a href="../articles/discord_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/thunderbird.html">Mozilla Thunderbird</a></li>
|
||||
<li><a href="../articles/hexchat.html">Hexchat</a> <a href="../articles/hexchat_ru.html">[Русский]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Search Engines</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/google_search.html">Google Search</a> <a href="../articles/google_search_es.html">[Español]</a> <a href="../articles/google_search_tr.html">[Türk]</a></li>
|
||||
<li><a href="../articles/bing.html">Bing</a></li>
|
||||
<li><a href="../articles/yahoo.html">Yahoo</a></li>
|
||||
<li><a href="../articles/duckduckgo.html">DuckDuckGo</a> <a href="../articles/duckduckgo_es.html">[Español]</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Video Games</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li>
|
||||
<li><a href="../articles/redshell.html">Red Shell</a></li>
|
||||
<li><a href="../articles/unity.html">Unity</a></li>
|
||||
<li><a href="../articles/razer.html">Razer</a> <a href="../articles/razer_es.html">[Español]</a></li>
|
||||
<li><a href="../articles/ksp.html">Kerbal Space Program</a></li>
|
||||
<li><a href="../articles/gzdoom.html">GZDoom</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Media Players</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/clementine.html">Clementine</a></li>
|
||||
<li><a href="../articles/realplayer.html">RealPlayer</a></li>
|
||||
<li><a href="../articles/itunes.html">iTunes</a></li>
|
||||
<li><a href="../articles/vlc.html">VLC Media Player</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Misc Software</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/ccleaner.html">CCleaner</a></li>
|
||||
<li><a href="../articles/bleachbit.html">BleachBit</a></li>
|
||||
<li><a href="../articles/poweriso.html">PowerISO</a></li>
|
||||
<li><a href="../articles/cdex.html">CDex</a></li>
|
||||
<li><a href="../articles/paint.net.html">Paint.NET</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="directory-list">
|
||||
<h2>Not Spyware but Has Privacy Issues</h2>
|
||||
<ul>
|
||||
<li><a href="../articles/telegram.html">Telegram</a></li>
|
||||
<li><a href="../articles/http.html">HyperText Transmission Protocol</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,107 +1,64 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Instagram — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/ig_logo.png" alt="Instagram logo">
|
||||
<h1>Instagram</h1>
|
||||
<p>
|
||||
Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the
|
||||
service it provides.</p>
|
||||
|
||||
<h3>It Logs Your GPS Locations from EXIF Data In Your Photos</h3>
|
||||
<p>
|
||||
Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data).
|
||||
</p>
|
||||
|
||||
<h3>It Demands Too Many Permissions and Punishes The User for Denying It Permissions</h3>
|
||||
<p>Instagram is pretty demanding when it comes to permissions. When I tested the app on my spare Android Phone, it wanted access to:</p>
|
||||
<ul>
|
||||
<li>Phone owner's full name</li>
|
||||
<li>Phone Contacts</li>
|
||||
<li>Phone calendar</li>
|
||||
<li>Send and receive SMS Messages (Which may cost money)</li>
|
||||
<li>All files on phone and files on MicroSD card</li>
|
||||
<li>Phone camera</li>
|
||||
<li>Phone microphone</li>
|
||||
<li>Identifying device information: IMEI number, carrier, SIM status, phone number</li>
|
||||
<li>Control phone vibrator motor</li>
|
||||
</ul>
|
||||
<p>Denying the app access to: <i>the phone owners full name, contacts stored on the phone, the phones calendar, permission to send and receive SMS messages, and identifying device information</i> resulted in annoying nags containing some excuse as to why they would like access to said permission.</p>
|
||||
<p>However, if you deny it access to: <i>All files on the phone and MicroSD card, phone camera, phone microphone, and phone vibrator motor</i>, the app will punish the user by disabling various features in the app that will most likely operate just fine with that permission denied.</p>
|
||||
|
||||
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
|
||||
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you provide none of the above. This is obviously a method Instagram to uniquely identify you.</p>
|
||||
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see what's new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
|
||||
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot">
|
||||
|
||||
<h3>It Broadcasts What You Do In The App To Other Users</h3>
|
||||
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
|
||||
|
||||
<h3>It Might Spy in On Your Conversations</h3>
|
||||
<p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p>
|
||||
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
|
||||
<p>
|
||||
<a name="1">1</a>
|
||||
<a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a>
|
||||
<a href="https://archive.is/pHY8J">[archive.is]</a>
|
||||
<a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
|
||||
<a name="2">2</a>
|
||||
<a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a>
|
||||
<a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a>
|
||||
<a href="https://archive.fo/9nxU8">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
|
||||
<a name="3">3</a>
|
||||
<a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a>
|
||||
<a href="https://archive.fo/bvtic">[archive.is]</a>
|
||||
<a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
<a name="4">4</a>
|
||||
<a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a>
|
||||
<a href="https://archive.is/Utdc2">[archive.is]</a>
|
||||
<a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
|
||||
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 2/24/2019
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ig_logo.png" alt="Instagram logo"/>
|
||||
<h1>Instagram</h1>
|
||||
<p>Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the service it provides.</p>
|
||||
<h3>It Logs Your GPS Locations from EXIF Data In Your Photos</h3>
|
||||
<p>Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#s1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data).</p>
|
||||
<h3>It Demands Too Many Permissions and Punishes The User for Denying It Permissions</h3>
|
||||
<p>Instagram is pretty demanding when it comes to permissions. When I tested the app on my spare Android Phone, it wanted access to:</p>
|
||||
<ul>
|
||||
<li>Phone owner's full name</li>
|
||||
<li>Phone Contacts</li>
|
||||
<li>Phone calendar</li>
|
||||
<li>Send and receive SMS Messages (Which may cost money)</li>
|
||||
<li>All files on phone and files on MicroSD card</li>
|
||||
<li>Phone camera</li>
|
||||
<li>Phone microphone</li>
|
||||
<li>Identifying device information: IMEI number, carrier, SIM status, phone number</li>
|
||||
<li>Control phone vibrator motor</li>
|
||||
</ul>
|
||||
<p>Denying the app access to: <i>the phone owners full name, contacts stored on the phone, the phones calendar, permission to send and receive SMS messages, and identifying device information</i> resulted in annoying nags containing some excuse as to why they would like access to said permission.</p>
|
||||
<p>However, if you deny it access to: <i>All files on the phone and MicroSD card, phone camera, phone microphone, and phone vibrator motor</i>, the app will punish the user by disabling various features in the app that will most likely operate just fine with that permission denied.</p>
|
||||
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
|
||||
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you provide none of the above. This is obviously a method Instagram to uniquely identify you.</p>
|
||||
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see what's new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
|
||||
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot"/>
|
||||
<h3>It Broadcasts What You Do In The App To Other Users</h3>
|
||||
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#s3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
|
||||
<h3>It Might Spy in On Your Conversations</h3>
|
||||
<p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#s4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a> <a href="https://archive.is/pHY8J">[archive.is]</a> <a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a> <a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a> <a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a> <a href="https://archive.fo/9nxU8">[archive.is]</a> <a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a> <a href="https://archive.fo/bvtic">[archive.is]</a> <a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a> <a href="https://archive.is/Utdc2">[archive.is]</a> <a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 2/24/2019</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Instagram — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Iridium Browser — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -2,23 +2,20 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>SRWare Iron — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>SRWare Iron — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
|
||||
<h1>SRWare Iron</h1>
|
||||
<center>
|
||||
<a href="iron_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
|
||||
</p>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
|
||||
<h1>SRWare Iron</h1>
|
||||
<p>
|
||||
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
|
||||
|
@ -155,18 +152,18 @@
|
|||
(why else would he take the time to integrate these things into his browser? We can only speculate.)
|
||||
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future — Overview</a>
|
||||
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qMNlG">[archive.is]</a><br>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<li id="s2">
|
||||
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future — Frequently asked questions</a>
|
||||
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/TXJbh">[archive.is]</a>
|
||||
|
@ -179,17 +176,17 @@
|
|||
<br>
|
||||
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 11/20/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 11/20/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -2,23 +2,20 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>SRWare Iron — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>SRWare Iron — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
|
||||
<h1>SRWare Iron</h1>
|
||||
<center>
|
||||
<a href="iron.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
SRWare Iron jest darmową przeglądarką internetową i implementacją Chromium stworzoną przez SRWare z Niemiec.
|
||||
</p>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
|
||||
<h1>SRWare Iron</h1>
|
||||
<p>
|
||||
SRWare Iron jest darmową przeglądarką internetową i implementacją Chromium stworzoną przez SRWare z Niemiec.
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="red">Ekstermalnie Wysoki</span></h2>
|
||||
<p>
|
||||
SRWare Iron uważa się za przestrzegającą prywatność przeglądarkę internetową będącą alternatywą dla
|
||||
|
@ -157,18 +154,18 @@
|
|||
czas na integrowanie tego wszystkiego z jego przeglądarką? Możemy tylko spekulować.)
|
||||
W końcu jest całkiem jasne że ta przeglądarka to ogromny przekręt i nie powinno się jej używać.
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future — Overview</a>
|
||||
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qMNlG">[archive.is]</a><br>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<li id="s2">
|
||||
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future — Frequently asked questions</a>
|
||||
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/TXJbh">[archive.is]</a><br>
|
||||
|
@ -177,17 +174,17 @@
|
|||
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
|
||||
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 11/20/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 11/20/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -1,92 +1,54 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<title>iTunes — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/itunes_logo.png" alt="itunes logo">
|
||||
<h1>iTunes</h1>
|
||||
<p>
|
||||
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.
|
||||
</p>
|
||||
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
||||
<p>
|
||||
iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app.
|
||||
This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Mailing address</li>
|
||||
<li>Phone Number</li>
|
||||
<li>E-Mail address</li>
|
||||
<li>Credit card information</li>
|
||||
</ul>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>
|
||||
Whenever you open iTunes, these two requests are immediately made:
|
||||
</p>
|
||||
<img src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests">
|
||||
<p>
|
||||
<a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that iTunes will connect too.
|
||||
So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is
|
||||
connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p><i>
|
||||
"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."
|
||||
</i></p>
|
||||
<p>
|
||||
So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.
|
||||
</p>
|
||||
<h3>Apple sells your personal information</h3>
|
||||
<p>
|
||||
Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>:
|
||||
</P>
|
||||
<p><i>
|
||||
"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."
|
||||
</i></p>
|
||||
<p>
|
||||
So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a>
|
||||
<a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a>
|
||||
<a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a>
|
||||
<a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a>
|
||||
<a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a>
|
||||
<a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a>
|
||||
<a href="https://archive.is/KdMGe">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a>
|
||||
<a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a>
|
||||
<a href="https://archive.is/KNtlQ">[archive.is]</a><br>
|
||||
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 5/12/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="main">
|
||||
<img src="../images/itunes_logo.png" alt="itunes logo"/>
|
||||
<h1>iTunes</h1>
|
||||
<p>iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.</p>
|
||||
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
||||
<p>iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. This spyware platform collects the following information from you<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Mailing address</li>
|
||||
<li>Phone Number</li>
|
||||
<li>E-Mail address</li>
|
||||
<li>Credit card information</li>
|
||||
</ul>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>Whenever you open iTunes, these two requests are immediately made:</p>
|
||||
<img class="screenshot" src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests"/>
|
||||
<p><a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#s2">[2]</a></sup> is a list of all of the domains that iTunes will connect too. So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."</i></p>
|
||||
<p>So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.</p>
|
||||
<h3>Apple sells your personal information</h3>
|
||||
<p>Apple is very up-front about this in its privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."</i></p>
|
||||
<p>So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a> <a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a> <a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a> <a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a> <a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a> <a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a> <a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a> <a href="https://archive.is/KdMGe">[archive.is]</a></li>
|
||||
<li id="s2"><a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a> <a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a> <a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a> <a href="https://archive.is/KNtlQ">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 5/12/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,184 +1,103 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Kerbal Space Program — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/ksp_logo.png" alt="Kerbal Space Program Logo">
|
||||
<h1>Kerbal Space Program</h1>
|
||||
<p>
|
||||
Kerbal Space Program is a space flight simulation video game developed and published by Squad, and currently owned by Take-Two Interactive.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Kerbal Space program is a spyware program that mines large amounts of personal information of its users<sup><a href="#1">[1]</a></sup><sup><a href="#2">[2]</a></sup>,
|
||||
to use for its own advertising, and to sell to other advertisers. On its face, it is a video game, but it is loaded with a huge amount of spyware that makes it completely unusable from a privacy standpoint.
|
||||
If you MUST use this program, run it in a VM with no internet connection. KSP collects so much information, that it has managed to catapult itself into the highest ranks of
|
||||
this website and can only be described as a uniquely malicious datamining platform. KSP at one point was integrated with the <a href="../articles/redshell.html">Redshell</a> spyware platform.<sup><a href="#1">[3]</a></sup><sup>
|
||||
</p>
|
||||
|
||||
<h3>Kerbal Space Program collects vast amounts of personal information</h3>
|
||||
|
||||
<p>
|
||||
KSP collects or attempts to collect or reserves the right to collect the following information about its users<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
|
||||
<ul>
|
||||
<li>First and/or last name</li>
|
||||
<li>E-mail address</li>
|
||||
<li>Phone number</li>
|
||||
<li>Photo</li>
|
||||
<li>Mailing address</li>
|
||||
<li>Geolocation (physical location)</li>
|
||||
<li>Payment information</li>
|
||||
<li>Age</li>
|
||||
<li>Gender</li>
|
||||
<li>Date of birth</li>
|
||||
<li>Zip code</li>
|
||||
<li>Hardware configuration</li>
|
||||
<li>Console ID</li>
|
||||
<li>Software products played</li>
|
||||
<li>Purchases</li>
|
||||
<li>IP address</li>
|
||||
<li>Systems you have played on</li>
|
||||
<li>Other Information from integrated services</li>
|
||||
<li>Other Information from social media</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Anyone who is familiar with privacy violating software can notice that compared to most spyware out there, this is a MASSIVE amount of personal information that is being collected.
|
||||
It's further clarified that not only does this program collect all of your information, but it uses this information to build a unique profile of you by correlating that information
|
||||
together.
|
||||
</p>
|
||||
|
||||
<h3>Kerbal Space Program is integrated with other spyware platforms</h3>
|
||||
|
||||
<p>
|
||||
KSP is integrated with social networking websites such as Facebook<sup><a href="#1">[1]</a></sup>, which allows it to collect a lot of personal information about you from any sort of social media profile that you
|
||||
have on that website. If you're wondering how it could collect your date of birth, gender and photo if the program doesn't explicitly ask you, this is probably how it does it.
|
||||
When you give KSP access to your Facebook account by logging in through spyware platforms such as Facebook, it collects as much information from your profile as it possibly can. This includes:
|
||||
</p>
|
||||
|
||||
<ul>
|
||||
<li>Your profile picture</li>
|
||||
<li>Your friends list</li>
|
||||
<li>Your name</li>
|
||||
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
As well as all other information that KSP claims it collects in the previous section. As you can see, this feature is a way for KSP to collect huge amounts of your personal information,
|
||||
which it does not show and restraint in collecting.
|
||||
</p>
|
||||
<p>
|
||||
Not only is KSP integrated with Facebook's spyware platform, but it is also integrated with other spyware platforms as well:
|
||||
</p>
|
||||
<p><i>
|
||||
"When you use a third-party authentication service or link your Company account with a third-party account, you will be asked to provide account information associated with that third-party account. Certain membership information may be transferred automatically to the Company when you register to join an Online Service from a third-party gaming network system or link your Online Service membership with a third-party service, such as your friends list on that gaming network or social network service."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p><i>
|
||||
"When you use Facebook Connect, OpenID or another multisite ID to log in to an Online Service, those ID services will authenticate your identity and provide you the option to share certain personal information with us to pre-populate our sign up form. Depending on your account settings, multisite IDs may also provide other information to us. Please check the terms of those services before using them to log into an Online Service."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p><i>
|
||||
"If you use, purchase, or register for an Online Service through a third-party service such as a gaming console's network service, an internet based gaming service, or a social network website, or request that we associate a Company account with a third-party service account, then limited user account personal information may be transferred to the Company as part of the registration process and we may be able to collect information about your use of the Online Services."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
|
||||
<h3>Kerbal Space Program allows advertisers to collect personal information separately</h3>
|
||||
|
||||
<p>
|
||||
In addition to tracking its users, KSP allows advertisers to track its users as well<sup><a href="#1">[1]</a></sup>. These advertisers are:
|
||||
</p>
|
||||
|
||||
<ul>
|
||||
<li>DoubleClick</li>
|
||||
<li>Facebook</li>
|
||||
<li>Google</li>
|
||||
<li>Conversant</li>
|
||||
<li>Nielsen/Netratings</li>
|
||||
<li>Omniture</li>
|
||||
<li>Yahoo</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Which of course, all have their own separate privacy policies about how they handle your information. So, not only is KSP tracking you, but a huge amount of advertisers are
|
||||
also tracking you when you use their services.
|
||||
</p>
|
||||
|
||||
<h3>Kerbal Space Program sells your information to advertisers</h3>
|
||||
|
||||
<p>
|
||||
KSP's privacy policy uses more vague language here, but it's clear that your information is being sold to advertisers. See the following quotes:
|
||||
</p>
|
||||
|
||||
<p><i>
|
||||
"In the event we offer services or promotions where your personal information is separately collected and used according to the privacy policy of a third party, we will inform you of that at the time of collection and you may elect not to participate in the service or promotion."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
|
||||
<p><i>
|
||||
"In addition, we may share aggregate and other information regarding Online Service usage statistics and user demographics with third parties."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
|
||||
<p>
|
||||
Is "other information" personal information? There isn't any transparency here, so we cant know, but its clear that KSP uses its massive datamining platform to collaborate with other datamining platforms.
|
||||
</p>
|
||||
|
||||
<h3>Kerbal Space Program uses your personal information for its own advertising</h3>
|
||||
|
||||
<p>
|
||||
It's clearly stated in the privacy policy<sup><a href="#1">[1]</a></sup> that this information is used to target users for promotions, and to analyse for marketing purposes:
|
||||
</p>
|
||||
|
||||
<p><i>
|
||||
"The Company uses this information to send you promotional materials. [...] We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
|
||||
<h3>Kerbal Space Program does not make its source code available</h3>
|
||||
|
||||
<p>
|
||||
Its impossible to discern the level and scope of privacy violations done by this software beyond what they tell us in the privacy policy. The source code could potentially be hiding
|
||||
more spyware, but nobody can audit it, and nobody can go into the source code and disable all of the spyware. If KSP had nothing to hide, you would be able to build the game from its
|
||||
source code.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h3>Further Reading</h3>
|
||||
|
||||
<a href="https://www.youtube.com/watch?v=WCLbUD_aubQ">Kerbal Space Program's New EULA Makes it Spyware </a><br>
|
||||
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.take2games.com/privacy/">TAKE-TWO INTERACTIVE SOFTWARE, Inc. PRIVACY POLICY</a>
|
||||
<a href="http://web.archive.org/web/20180523084938/https://www.take2games.com/privacy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/WvWBD">[archive.is]</a><br>
|
||||
<a href="https://ghostarchive.org/archive/LsdEf">[ghostarchive.org]</a>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments#comment-3314988">Does KSP v1.4 really have spyware in it?</a>
|
||||
<a href="http://web.archive.org/web/20180530204319/https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments">[web.archive.org]</a><br>
|
||||
<a href="http://ghostarchive.org/search?term=https%3A%2F%2Fforum.kerbalspaceprogram.com%2Findex.php%3F%2Ftopic%2F171850-does-ksp-v14-really-have-spyware-in-it%2F%26page%3D12%26tab%3Dcomments%23comment-3314988">[ghostarchive.org]</a>
|
||||
<a name="3">3.</a>
|
||||
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a>
|
||||
<a href="https://removeddit.com/r/Steam/comments/8pud8b/">[removeddit]</a>
|
||||
<a href="http://archive.is/jwlur">[archive.is]</a>
|
||||
<a href="http://ghostarchive.org/search?https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
<p><b>
|
||||
This article was last updated on 8/17/2021
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ksp_logo.png" alt="Kerbal Space Program Logo"/>
|
||||
<h1>Kerbal Space Program</h1>
|
||||
<p>Kerbal Space Program is a space flight simulation video game developed and published by Squad, and currently owned by Take-Two Interactive.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Kerbal Space program is a spyware program that mines large amounts of personal information of its users<sup><a href="#s1">[1]</a></sup><sup><a href="#s2">[2]</a></sup>, to use for its own advertising, and to sell to other advertisers. On its face, it is a video game, but it is loaded with a huge amount of spyware that makes it completely unusable from a privacy standpoint. If you MUST use this program, run it in a VM with no internet connection. KSP collects so much information, that it has managed to catapult itself into the highest ranks of this website and can only be described as a uniquely malicious datamining platform. KSP at one point was integrated with the <a href="../articles/redshell.html">Redshell</a> spyware platform.<sup><a href="#s3">[3]</a></sup></p>
|
||||
<h3>Kerbal Space Program collects vast amounts of personal information</h3>
|
||||
<p>KSP collects or attempts to collect or reserves the right to collect the following information about its users<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>First and/or last name</li>
|
||||
<li>E-mail address</li>
|
||||
<li>Phone number</li>
|
||||
<li>Photo</li>
|
||||
<li>Mailing address</li>
|
||||
<li>Geolocation (physical location)</li>
|
||||
<li>Payment information</li>
|
||||
<li>Age</li>
|
||||
<li>Gender</li>
|
||||
<li>Date of birth</li>
|
||||
<li>Zip code</li>
|
||||
<li>Hardware configuration</li>
|
||||
<li>Console ID</li>
|
||||
<li>Software products played</li>
|
||||
<li>Purchases</li>
|
||||
<li>IP address</li>
|
||||
<li>Systems you have played on</li>
|
||||
<li>Other Information from integrated services</li>
|
||||
<li>Other Information from social media</li>
|
||||
</ul>
|
||||
<p>Anyone who is familiar with privacy violating software can notice that compared to most spyware out there, this is a MASSIVE amount of personal information that is being collected. It's further clarified that not only does this program collect all of your information, but it uses this information to build a unique profile of you by correlating that information together.</p>
|
||||
<h3>Kerbal Space Program is integrated with other spyware platforms</h3>
|
||||
<p>KSP is integrated with social networking websites such as Facebook<sup><a href="#s1">[1]</a></sup>, which allows it to collect a lot of personal information about you from any sort of social media profile that you have on that website. If you're wondering how it could collect your date of birth, gender and photo if the program doesn't explicitly ask you, this is probably how it does it. When you give KSP access to your Facebook account by logging in through spyware platforms such as Facebook, it collects as much information from your profile as it possibly can. This includes:</p>
|
||||
<ul>
|
||||
<li>Your profile picture</li>
|
||||
<li>Your friends list</li>
|
||||
<li>Your name</li>
|
||||
</ul>
|
||||
<p>As well as all other information that KSP claims it collects in the previous section. As you can see, this feature is a way for KSP to collect huge amounts of your personal information, which it does not show and restraint in collecting.</p>
|
||||
<p>Not only is KSP integrated with Facebook's spyware platform, but it is also integrated with other spyware platforms as well:</p>
|
||||
<p><i>"When you use a third-party authentication service or link your Company account with a third-party account, you will be asked to provide account information associated with that third-party account. Certain membership information may be transferred automatically to the Company when you register to join an Online Service from a third-party gaming network system or link your Online Service membership with a third-party service, such as your friends list on that gaming network or social network service."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p><i>"When you use Facebook Connect, OpenID or another multisite ID to log in to an Online Service, those ID services will authenticate your identity and provide you the option to share certain personal information with us to pre-populate our sign up form. Depending on your account settings, multisite IDs may also provide other information to us. Please check the terms of those services before using them to log into an Online Service."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p><i>"If you use, purchase, or register for an Online Service through a third-party service such as a gaming console's network service, an internet based gaming service, or a social network website, or request that we associate a Company account with a third-party service account, then limited user account personal information may be transferred to the Company as part of the registration process and we may be able to collect information about your use of the Online Services."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<h3>Kerbal Space Program allows advertisers to collect personal information separately</h3>
|
||||
<p>In addition to tracking its users, KSP allows advertisers to track its users as well<sup><a href="#s1">[1]</a></sup>. These advertisers are:</p>
|
||||
<ul>
|
||||
<li>DoubleClick</li>
|
||||
<li>Facebook</li>
|
||||
<li>Google</li>
|
||||
<li>Conversant</li>
|
||||
<li>Nielsen/Netratings</li>
|
||||
<li>Omniture</li>
|
||||
<li>Yahoo</li>
|
||||
</ul>
|
||||
<p>Which of course, all have their own separate privacy policies about how they handle your information. So, not only is KSP tracking you, but a huge amount of advertisers are also tracking you when you use their services.</p>
|
||||
<h3>Kerbal Space Program sells your information to advertisers</h3>
|
||||
<p>KSP's privacy policy uses more vague language here, but it's clear that your information is being sold to advertisers. See the following quotes:</p>
|
||||
<p><i>"In the event we offer services or promotions where your personal information is separately collected and used according to the privacy policy of a third party, we will inform you of that at the time of collection and you may elect not to participate in the service or promotion."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p><i>"In addition, we may share aggregate and other information regarding Online Service usage statistics and user demographics with third parties."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>Is "other information" personal information? There isn't any transparency here, so we cant know, but its clear that KSP uses its massive datamining platform to collaborate with other datamining platforms.</p>
|
||||
<h3>Kerbal Space Program uses your personal information for its own advertising</h3>
|
||||
<p>It's clearly stated in the privacy policy<sup><a href="#s1">[1]</a></sup> that this information is used to target users for promotions, and to analyse for marketing purposes:</p>
|
||||
<p><i>"The Company uses this information to send you promotional materials. [...] We also use your personal and other information for our internal marketing and demographic studies, so we can constantly improve the products and services we provide you and to better meet your needs."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<h3>Kerbal Space Program does not make its source code available</h3>
|
||||
<p>Its impossible to discern the level and scope of privacy violations done by this software beyond what they tell us in the privacy policy. The source code could potentially be hiding more spyware, but nobody can audit it, and nobody can go into the source code and disable all of the spyware. If KSP had nothing to hide, you would be able to build the game from its source code.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.youtube.com/watch?v=WCLbUD_aubQ">Kerbal Space Program's New EULA Makes it Spyware </a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.take2games.com/privacy/">TAKE-TWO INTERACTIVE SOFTWARE, Inc. PRIVACY POLICY</a> <a href="http://web.archive.org/web/20180523084938/https://www.take2games.com/privacy/">[web.archive.org]</a> <a href="http://archive.is/WvWBD">[archive.is]</a> <a href="https://ghostarchive.org/archive/LsdEf">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments#comment-3314988">Does KSP v1.4 really have spyware in it?</a> <a href="http://web.archive.org/web/20180530204319/https://forum.kerbalspaceprogram.com/index.php?/topic/171850-does-ksp-v14-really-have-spyware-in-it/&page=12&tab=comments">[web.archive.org]</a> <a href="http://ghostarchive.org/search?term=https%3A%2F%2Fforum.kerbalspaceprogram.com%2Findex.php%3F%2Ftopic%2F171850-does-ksp-v14-really-have-spyware-in-it%2F%26page%3D12%26tab%3Dcomments%23comment-3314988">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a> <a href="https://removeddit.com/r/Steam/comments/8pud8b/">[removeddit]</a> <a href="http://archive.is/jwlur">[archive.is]</a> <a href="http://ghostarchive.org/search?https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last updated on 8/17/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,15 +1,11 @@
|
|||
<!-- NOTICE!!!! -->
|
||||
|
||||
<!-- BEFORE MAKING A PULL REQUEST OR PUSH PLEASE ALWAYS CHECK WITH THE VALIDATOR -->
|
||||
<!-- http://validator.w3.org/#validate-by-input -->
|
||||
|
||||
<!-- NOTICE!!!! -->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Librewolf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Librewolf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
|
@ -18,15 +14,11 @@
|
|||
<img src="../images/librewolf.svg" alt="Librewolf Logo"/>
|
||||
<h1>Librewolf</h1>
|
||||
<p>Librewolf is a Firefox fork with the primary goals of privacy, security and user freedom.<sup><a href="#s1">[1]</a></sup></p>
|
||||
<br/>
|
||||
<p>Version tested: 95.0.2</p>
|
||||
<p>Version tested: 95.0.2</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<br/>
|
||||
<p>Librewolf makes some calls on startup to <code>f.s.s.m.c.qjz9zk</code> which looks like an obliterated address, and <code>shavar.services.mozilla.com</code> which is intended (however it can be disabled by clearing the URL in <code>browser.safebrowsing.provider.mozilla.updateURL</code>).<sup><a href="#s2">[2]</a></sup> There is also an attempt to check for updates regarding the pre-installed uBlock Origin extension.</p>
|
||||
<br/>
|
||||
<p>This is a big improvement compared to Firefox.</p>
|
||||
<br/>
|
||||
<img class="screenshot" src="../images/librewolfproxychains1.png" alt="Librewolf connections shows via a terminal running proxychains"/>
|
||||
<p>Librewolf makes some calls on startup to <code>f.s.s.m.c.qjz9zk</code> which looks like an obliterated address, and <code>shavar.services.mozilla.com</code> which is intended (however it can be disabled by clearing the URL in <code>browser.safebrowsing.provider.mozilla.updateURL</code>).<sup><a href="#s2">[2]</a></sup> There is also an attempt to check for updates regarding the pre-installed uBlock Origin extension.</p>
|
||||
<p>This is a big improvement compared to Firefox.</p>
|
||||
<img class="screenshot" src="../images/librewolfproxychains1.png" alt="Librewolf connections shows via a terminal running proxychains"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
|
@ -34,19 +26,16 @@
|
|||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://librewolf.net/">Librewolf</a> <a href="http://web.archive.org/web/20220106170403/https://librewolf.net/">[web.archive.org]</a></li>
|
||||
<li id="s2"><a href="https://gitlab.com/librewolf-community/browser/linux/-/issues/271">Automatic connection to shavar.services.mozilla.com - Librewolf Issue #271 - GitLab</a></li>
|
||||
<li id="s2"><a href="https://gitlab.com/librewolf-community/browser/linux/-/issues/271">Automatic connection to shavar.services.mozilla.com - Librewolf Issue #271 - GitLab</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 01/7/2022</b><br/>
|
||||
<b>This article was created on 01/7/2022</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 01/7/2022</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt">
|
||||
<img class="icon" src="../images/cc0.png" alt="CC0 License"/>
|
||||
</a>
|
||||
<!--Dont change-->
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -1,41 +1,39 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/lynx.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<div class="center">
|
||||
<a href="lynx_pl.html">[Polski]</a>
|
||||
<a href="lynx_ru.html">[Русский]</a>
|
||||
</div>
|
||||
<p>Lynx is a text browser for the World Wide Web.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Lynx <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<p>It is also fully libre software under the GPLv2 license.</p>
|
||||
<hr></hr>
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 4/6/2020</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<p>Lynx is a text browser for the World Wide Web.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Lynx <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<p>It is also fully libre software under the GPLv2 license.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading</h4>
|
||||
<ol>
|
||||
<li><a href="https://lynx.browser.org/">lynx.browser.org</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 4/6/2020</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/7/2020</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,41 +1,35 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/lynx.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Katalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<div class="center">
|
||||
<a href="lynx.html">[English]</a>
|
||||
<a href="lynx_ru.html">[Русский]</a>
|
||||
</div>
|
||||
<p>Lynx jest tekstową przeglądarką internetową.</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="green">Brak oprogramowania szpiegowskiego</span></h2>
|
||||
<p>Lynx <span class="green">nie wysyła żadnych niepożądanych żądań.</span></p>
|
||||
<p>Jest także w pełni otwartym oprogramowaniem licencjonowanym na licencji GPLv2.</p>
|
||||
<hr></hr>
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 4/6/2020</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Katalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<p>Lynx jest tekstową przeglądarką internetową.</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="green">Brak oprogramowania szpiegowskiego</span></h2>
|
||||
<p>Lynx <span class="green">nie wysyła żadnych niepożądanych żądań.</span></p>
|
||||
<p>Jest także w pełni otwartym oprogramowaniem licencjonowanym na licencji GPLv2.</p>
|
||||
<hr/>
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<hr/>
|
||||
<p>This article was created on 4/6/2020</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,41 +1,35 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/lynx.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Каталог</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<div class="center">
|
||||
<a href="lynx.html">[English]</a>
|
||||
<a href="lynx_pl.html">[Polski]</a>
|
||||
</div>
|
||||
<p>Lynx - текстовый браузер для Всемирной Паутины.</p>
|
||||
<h2>Уровень слежки: <span class="green">Нет</span></h2>
|
||||
<p>Lynx <span class="green">никогда не делает нежелательных запросов</span>.</p>
|
||||
<p>Это полностью свободное программное обеспечение, лиценизрованное по GPLv2.</p>
|
||||
<hr></hr>
|
||||
<h4>Дополнительная информация</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<hr></hr>
|
||||
<p>Этот перевод был создан 9/7/2021</p>
|
||||
<p>Этот перевод в последний раз был изменён 9/7/2021</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Lynx - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Каталог</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<p>Lynx - текстовый браузер для Всемирной Паутины.</p>
|
||||
<h2>Уровень слежки: <span class="green">Нет</span></h2>
|
||||
<p>Lynx <span class="green">никогда не делает нежелательных запросов</span>.</p>
|
||||
<p>Это полностью свободное программное обеспечение, лиценизрованное по GPLv2.</p>
|
||||
<hr/>
|
||||
<h4>Дополнительная информация</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<hr/>
|
||||
<p>Этот перевод был создан 9/7/2021</p>
|
||||
<p>Этот перевод в последний раз был изменён 9/7/2021</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,44 +1,35 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Netsurf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
|
||||
<h1>Netsurf</h1>
|
||||
<center>
|
||||
<a href="../articles/netsurf_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more" <sup><a href="#1">[1]</a></sup> Version Tested: Netsurf 3.9
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<center>
|
||||
<ol>
|
||||
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a>
|
||||
<a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/RiYFl">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a>
|
||||
|
||||
</br>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Netsurf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
|
||||
<h1>Netsurf</h1>
|
||||
<p>From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more".<sup><a href="#s1">[1]</a></sup> Version Tested: Netsurf 3.9.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a> <a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,40 +1,37 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Netsurf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/netsurf.png" alt="Obrazy są w folderze ../images"/>
|
||||
<h1>Netsurf</h1>
|
||||
<center>
|
||||
<a href="../articles/netsurf.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Z ich strony internetowej: "NetSurf jest wieloplatformową przeglądarką internetową dla RISC OS, platform podobnych do UNIX-owych (w tym Linux), Mac OS X i innych" <sup><a href="#1">[1]</a></sup> Wersja testowana: Netsurf 3.9
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="yellowgreen">Niski</span></h2>
|
||||
<p>Po uruchomieniu Netsurf zwraca się z prośbą o otrzymanie ikony domyślnej wyszukiwarki, którą jest Google. Zostało to przetestowane za pomocą mitmproxy. Poza tym, nie ma żadnych niepożądanych żądań. Po zastosowaniu się do <a href="../guides/netsurf_pl.html">poradnika mitygacji</a>, to oprogramowanie <span class="green">nie jest oprogramowaniem szpiegowskim</span>.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Źródła</h4>
|
||||
<center>
|
||||
<ol>
|
||||
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a></br>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Netsurf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/netsurf.png" alt="Obrazy są w folderze ../images"/>
|
||||
<h1>Netsurf</h1>
|
||||
<p>
|
||||
Z ich strony internetowej: "NetSurf jest wieloplatformową przeglądarką internetową dla RISC OS, platform podobnych do UNIX-owych (w tym Linux), Mac OS X i innych" <sup><a href="#1">[1]</a></sup> Wersja testowana: Netsurf 3.9
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="yellowgreen">Niski</span></h2>
|
||||
<p>Po uruchomieniu Netsurf zwraca się z prośbą o otrzymanie ikony domyślnej wyszukiwarki, którą jest Google. Zostało to przetestowane za pomocą mitmproxy. Poza tym, nie ma żadnych niepożądanych żądań. Po zastosowaniu się do <a href="../guides/netsurf_pl.html">poradnika mitygacji</a>, to oprogramowanie <span class="green">nie jest oprogramowaniem szpiegowskim</span>.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Źródła</h4>
|
||||
<center>
|
||||
<ol>
|
||||
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a></br>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Opera — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
@ -10,7 +10,7 @@
|
|||
<img src="../images/opera_logo.png" alt="Opera logo">
|
||||
<h1>Opera</h1>
|
||||
<p>
|
||||
A web browser made by Opera Software, using the Blink engine. Has some interesting features like mouse gestures, a built-in ad blocker and VPN. It is the sixth most popular browser. But how does it look like in terms of privacy?
|
||||
A web browser made by Opera Software, using the Blink engine. Has some interesting features like mouse gestures, a built-in ad blocker and VPN. It is the sixth most popular browser. But how does it look like in terms of privacy?
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
|
@ -19,55 +19,55 @@
|
|||
|
||||
<h3>Geolocation</h3>
|
||||
|
||||
<p>The first request Opera makes is the geolocation request: <img class="screenshot" src="../images/opera_geo.png"> which includes your country and the precise timestamp.</p>
|
||||
<p>The first request Opera makes is the geolocation request: <img class="screenshot" src="../images/opera_geo.png"> which includes your country and the precise timestamp.</p>
|
||||
|
||||
<h3>Homepage request</h3>
|
||||
<h3>Homepage request</h3>
|
||||
|
||||
<p>If this is the first time you run Opera, it makes this request: <img class="screenshot" src="../images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p>
|
||||
<p>If this is the first time you run Opera, it makes this request: <img class="screenshot" src="../images/opera_firstrun.png"> which will redirect you to their homepage. Then, that homepage will make a bunch of other requests, including to google analytics, facebook (if you're logged in, they now know who you are), and even yandex.ru. The yandex request will set a <b>uniquely identifying</b> cookie.</p>
|
||||
|
||||
<h3>Cxense analytics</h3>
|
||||
<h3>Cxense analytics</h3>
|
||||
|
||||
<p>Later, it will make a few requests to cxense.com. What is Cxense?</p>
|
||||
<p>Later, it will make a few requests to cxense.com. What is Cxense?</p>
|
||||
|
||||
<p><i>We are Cxense. We help hundreds of leading publishers and marketers across the globe transform their raw data into their most valuable resource. Built on the premise of 1:1 analytics and communication; allowing you to both gain unprecedented insight about your individual customers, and to action this insight real-time in all your marketing and sales channels. </i></p>
|
||||
<p><i>We are Cxense. We help hundreds of leading publishers and marketers across the globe transform their raw data into their most valuable resource. Built on the premise of 1:1 analytics and communication; allowing you to both gain unprecedented insight about your individual customers, and to action this insight real-time in all your marketing and sales channels. </i></p>
|
||||
|
||||
<p>This request seems to include a <b>unique ID</b></p>
|
||||
<p>This request seems to include a <b>unique ID</b></p>
|
||||
|
||||
<h3>Search engines</h3>
|
||||
<h3>Search engines</h3>
|
||||
|
||||
<p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img class="screenshot" src="../images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="../articles/google.html">Google</a>.</p>
|
||||
<p>Opera will also download a list of search engines, which <font color=red><b>you cannot delete</b></font>, only add new ones (at least from the GUI). Apparently, there are some convoluted methods of deleting the search engines, but I haven't confirmed them. <img class="screenshot" src="../images/opera_partner_content.png"> Of course, the default search engine is the anti-privacy <a href="../articles/google.html">Google</a>.</p>
|
||||
|
||||
<h3>OCSP querying</h3>
|
||||
<h3>OCSP querying</h3>
|
||||
|
||||
<p>Opera will query OCSP servers (ocsp.comodoca.com) to check if SSL certificates expired.
|
||||
<p>Opera will query OCSP servers (ocsp.comodoca.com) to check if SSL certificates expired.
|
||||
|
||||
<h3>Malware / Phishing protection</h3>
|
||||
<p>Anytime you visit a website, Opera will make a request like this: <img class="screenshot" src="../images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p>
|
||||
<h3>Malware / Phishing protection</h3>
|
||||
<p>Anytime you visit a website, Opera will make a request like this: <img class="screenshot" src="../images/opera_sitecheck.png"> to check if it is malicious. So it is literally spying on your whole browsing history. Fortunately, this can be turned off.</p>
|
||||
|
||||
<h3>Other requests</h3>
|
||||
<h3>Other requests</h3>
|
||||
|
||||
<p>Other requests include ones to googletagmanager, google ads specific for your country, more requests to yandex (these include your screen size, encoding, and the page you came from), more geolocation, etc. Together, Opera made 55 unsolicited requests in my first run of it. Analyzing them all would probably take a book.</p>
|
||||
<p>Other requests include ones to googletagmanager, google ads specific for your country, more requests to yandex (these include your screen size, encoding, and the page you came from), more geolocation, etc. Together, Opera made 55 unsolicited requests in my first run of it. Analyzing them all would probably take a book.</p>
|
||||
|
||||
<h3>Facebook integration</h3>
|
||||
<h3>Facebook integration</h3>
|
||||
|
||||
<p>Opera has a Facebook chat button on the sidebar, and Facebook is one of the most anti-privacy organizations out there.</p>
|
||||
<p>Opera has a Facebook chat button on the sidebar, and Facebook is one of the most anti-privacy organizations out there.</p>
|
||||
|
||||
<h3>Opera's "Partners"</h3>
|
||||
<p>Opera has a list of "partners" — those are the websites that are in the Speed Dial by default. If you click on one of them from there, they will know you visited from Opera's Speed Dial. Those requests also include <b>unique user IDs</b>.
|
||||
What happens if you close Opera and run it again? The websites in the Speed Dial will change to the ones from your country! And the same rule about them knowing where you came from applies.</p>
|
||||
<h3>Opera's "Partners"</h3>
|
||||
<p>Opera has a list of "partners" — those are the websites that are in the Speed Dial by default. If you click on one of them from there, they will know you visited from Opera's Speed Dial. Those requests also include <b>unique user IDs</b>.
|
||||
What happens if you close Opera and run it again? The websites in the Speed Dial will change to the ones from your country! And the same rule about them knowing where you came from applies.</p>
|
||||
|
||||
<h3>Opera is closed source</h3>
|
||||
<p>And it will stay that way. <a href="https://archive.is/YMRla">From their FAQ</a> (the message used to be there in 2017, they must have <b>deleted it somewhere in 2018</b>):</p>
|
||||
<h3>Opera is closed source</h3>
|
||||
<p>And it will stay that way. <a href="https://archive.is/YMRla">From their FAQ</a> (the message used to be there in 2017, they must have <b>deleted it somewhere in 2018</b>):</p>
|
||||
|
||||
<p><i>Opera has not officialy open sourced its browser</i>. However, leaks of the Presto web engine Opera used have appeared on the internet.</p>
|
||||
<p><i>Opera has not officialy open sourced its browser</i>. However, leaks of the Presto web engine Opera used have appeared on the internet.</p>
|
||||
|
||||
<p>Even with that however, there could still other spyware might be hiding in there.</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Credits</h2>
|
||||
<p>
|
||||
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Formatting changes were done by the site maintainer.
|
||||
<p>Even with that however, there could still other spyware might be hiding in there.</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Credits</h2>
|
||||
<p>
|
||||
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
||||
Formatting changes were done by the site maintainer.
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
|
|
|
@ -1,33 +1,31 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/otter.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Otter Browser - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"/>
|
||||
<h1>Otter Browser</h1>
|
||||
<p>From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Otter Browser <b><span class="lime">makes no unsolicited requests at all.</span></b> It is fully open source. The developers, also, don't plan to include any spyware "features" in the future. This seems like a true privacy-based web browser (at least for now).</p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 11/25/2017</p>
|
||||
<p>This article was lasted edited on 10/5/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Otter Browser - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"/>
|
||||
<h1>Otter Browser</h1>
|
||||
<p>From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Otter Browser <b><span class="lime">makes no unsolicited requests at all.</span></b> It is fully open source. The developers, also, don't plan to include any spyware "features" in the future. This seems like a true privacy-based web browser (at least for now).</p>
|
||||
<hr/>
|
||||
<p>This article was created on 11/25/2017</p>
|
||||
<p>This article was lasted edited on 10/5/2020</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Paint.NET — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,76 +1,49 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Pale Moon — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
|
||||
<h1>Pale Moon</h1>
|
||||
<p>
|
||||
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
|
||||
write this article.
|
||||
</p>
|
||||
<p>
|
||||
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
||||
<p>After following the <a href="../guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
|
||||
</p>
|
||||
<p>
|
||||
Connects to analytics services, and these requests can <b>only be avoided on subsequent runs</b>. Has block lists, search suggestions, and auto-updates.
|
||||
Sends SSL certificates from the sites you visit.
|
||||
</p>
|
||||
<h3>Google Analytics on Homepage</h3>
|
||||
<p>
|
||||
By default, Pale Moon's home page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run.
|
||||
This page connects to Google Analytics, which can fingerprint and track you across the internet.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/pm_analytics.png" alt="Google Analytics requests sent by Pale Moon's default homepage">
|
||||
<h3>Auto-updates</h3>
|
||||
<p>
|
||||
Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config.
|
||||
</p>
|
||||
|
||||
<h3>Search Suggestions</h3>
|
||||
<p>The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar.
|
||||
</p>
|
||||
|
||||
<h3>OCSP querying</h3>
|
||||
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
|
||||
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
|
||||
<h3>Blocking privacy-enhancing addons</h3>
|
||||
<p>
|
||||
Pale Moon by default won't allow you to install the privacy-enhancing addon NoScript, citing this rationale for
|
||||
blocking such an important addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited,
|
||||
NoScript will cause display issues and functional issues."</i><sup><a href="#1">[1]</a></sup>
|
||||
<b><font color=yellow>To disable this blocklist, set <code>extensions.blocklist.enabled</code> to <code>false</code> in about:config.</font></b>
|
||||
</p>
|
||||
|
||||
<center>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
|
||||
<a name="1">1.</a>
|
||||
<a href="https://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a>
|
||||
<a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a>
|
||||
<a href="https://archive.is/EiraE">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/q9Ijt?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was created on 3/19/2019<br>
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/palemoon_logo.png" alt="Pale Moon logo"/>
|
||||
<h1>Pale Moon</h1>
|
||||
<p>Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to write this article.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Medium</span></h2>
|
||||
<p>After following the <a href="../guides/palemoon.html">mitigation guide</a>, this software is <span class="lime"><b>Not Spyware</b></span>.</p>
|
||||
<p>Connects to analytics services, and these requests can <b>only be avoided on subsequent runs</b>. Has block lists, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit.</p>
|
||||
<h3>Google Analytics on Homepage</h3>
|
||||
<p>By default, Pale Moon's home page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. This page connects to Google Analytics, which can fingerprint and track you across the internet.</p>
|
||||
<img class="screenshot" src="../images/pm_analytics.png" alt="Google Analytics requests sent by Pale Moon's default homepage"/>
|
||||
<h3>Auto-updates</h3>
|
||||
<p>Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config.</p>
|
||||
<h3>Search Suggestions</h3>
|
||||
<p>The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar.</p>
|
||||
<h3>OCSP querying</h3>
|
||||
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
<h3>Blocking privacy-enhancing addons</h3>
|
||||
<p>Pale Moon by default won't allow you to install the privacy-enhancing addon NoScript, citing this rationale for blocking such an important addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited, NoScript will cause display issues and functional issues."</i><sup><a href="#s1">[1]</a></sup> <b><span class="yellow">To disable this blocklist, set <code>extensions.blocklist.enabled</code> to <code>false</code> in about:config.</span></b></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a> <a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a> <a href="https://archive.is/EiraE">[archive.is]</a> <a href="https://ghostarchive.org/archive/q9Ijt?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 3/19/2019</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”es-ES”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Pale Moon — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>PowerISO — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,36 +1,32 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/qutebrowser.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Qutebrowser - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
|
||||
<h1>Qutebrowser</h1>
|
||||
<center>
|
||||
<a href="../articles/qutebrowser_ru.html">[Русский]</a><br><br>
|
||||
</center>
|
||||
<p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 5/10/2018</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Qutebrowser - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
|
||||
<h1>Qutebrowser</h1>
|
||||
<p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<b>This article was created on 5/10/2018</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/7/2020</b>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,36 +1,31 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/qutebrowser.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Qutebrowser - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Каталог</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
|
||||
<h1>Qutebrowser</h1>
|
||||
<center>
|
||||
<a href="../articles/qutebrowser.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>Qutebrowser - веб-браузер, ориентированный на управление с клавиатуры, с минимальным графическим интерфейсом. Он основан на Python, PyQt5 и свободном ПО, лицензированном под GPL. Программа протестирована: v1.6.1 для Debian Buster. Mitmproxy было использовано для проверки соединений.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Qutebrowser <span class="lime">никогда не делает нежелательных запросов</span>. Это свободное программное обеспечение. Этот браузер - отличный выбор, и с точки зрения приватности жаловаться здесь не на что (хотя я не знаю как управляться с этим пользовательским интерфейсом...). Пока этот браузер выглядит достойным, чтобы стоять в одном ряду с другими браузерами, уважающими конфиденциальность пользователя.</p>
|
||||
<hr></hr>
|
||||
<p>Этот перевод был создан 9/7/2021</p>
|
||||
<p>Этот перевод в последний раз изменялся 9/7/2021</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Qutebrowser - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Каталог</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
|
||||
<h1>Qutebrowser</h1>
|
||||
<p>Qutebrowser - веб-браузер, ориентированный на управление с клавиатуры, с минимальным графическим интерфейсом. Он основан на Python, PyQt5 и свободном ПО, лицензированном под GPL. Программа протестирована: v1.6.1 для Debian Buster. Mitmproxy было использовано для проверки соединений.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Qutebrowser <span class="lime">никогда не делает нежелательных запросов</span>. Это свободное программное обеспечение. Этот браузер - отличный выбор, и с точки зрения приватности жаловаться здесь не на что (хотя я не знаю как управляться с этим пользовательским интерфейсом...). Пока этот браузер выглядит достойным, чтобы стоять в одном ряду с другими браузерами, уважающими конфиденциальность пользователя.</p>
|
||||
<hr/>
|
||||
<p>Этот перевод был создан 9/7/2021</p>
|
||||
<p>Этот перевод в последний раз изменялся 9/7/2021</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,70 +1,56 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Razer — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/razer_logo.png">
|
||||
<h1>Razer</h1>
|
||||
<center>
|
||||
<p><a href="../articles/razer.html">Spanish Article</a></p>
|
||||
</center>
|
||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||
|
||||
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
||||
|
||||
<h3>Data collection</h3>
|
||||
<p>Razer confirms that they collect this data:</p>
|
||||
<ul>
|
||||
|
||||
<li>E-mail</li>
|
||||
<li>Full name</li>
|
||||
<li>Contact info</li>
|
||||
<li>Info you send when you contact them (texts and such)</li>
|
||||
<li>The time you use their services and products</li>
|
||||
<li>Info you send via polls</li>
|
||||
<li>IP, geolocation, OS and browser version</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
||||
Razer FORCES you to create an account to use YOUR products.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/theevidence.png">
|
||||
<p>
|
||||
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
||||
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
||||
else's PC, and Razer knows who has that (your) info.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further reading</h2>
|
||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
||||
<hr>
|
||||
<h2>Credit</h2>
|
||||
<p>This article was written by:
|
||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>References</h2>
|
||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was translated on 3/10/2019<br>
|
||||
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
||||
</b></p>
|
||||
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/razer_logo.png" alt="Razer Logo"/>
|
||||
<h1>Razer</h1>
|
||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||
<h2>Spyware level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<h3>Data collection</h3>
|
||||
<p>Razer confirms that they collect this data:</p>
|
||||
<ul>
|
||||
<li>E-mail</li>
|
||||
<li>Full name</li>
|
||||
<li>Contact info</li>
|
||||
<li>Info you send when you contact them (texts and such)</li>
|
||||
<li>The time you use their services and products</li>
|
||||
<li>Info you send via polls</li>
|
||||
<li>IP, geolocation, OS and browser version</li>
|
||||
</ul>
|
||||
<p>Razer also admits<sup><a href="#s1">[1]</a><a href="#s2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data. Razer FORCES you to create an account to use YOUR products.</p>
|
||||
<img class="screenshot" src="../images/theevidence.png" alt="screenshot"/>
|
||||
<p>Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody else's PC, and Razer knows who has that (your) info.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further reading:</h4>
|
||||
<ol>
|
||||
<li><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a></li>
|
||||
<li id="s2"><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was translated on 3/10/2019</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,17 +1,14 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang="en-us">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Razer — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/razer_logo.png">
|
||||
<h1>Razer</h1>
|
||||
<center>
|
||||
<p><a href="../articles/razer_en.html">English Translation</a></p>
|
||||
</center>
|
||||
<p>Razer es una compañía que hace programas y hardware para videojugadores</p>
|
||||
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
|
||||
<h3>Información que recolecta</h3>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>RealPlayer — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,90 +1,62 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<title>Redshell — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/redshell_logo.png" alt="redshell Logo">
|
||||
<h1>Redshell</h1>
|
||||
<p>
|
||||
Redshell is a spyware platform that is integrated into many video games.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers
|
||||
to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints
|
||||
any computers it is attached too and phones home. It also collects information about how a player has been interacting
|
||||
with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are
|
||||
avoided entirely.
|
||||
</p>
|
||||
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
||||
<p>
|
||||
Redshell has confirmed that it collects the following information<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Operating System</li>
|
||||
<li>Installed Browsers</li>
|
||||
<li>Available Fonts</li>
|
||||
<li>Screen Resolution</li>
|
||||
<li>IP Address</li>
|
||||
<li>Timezone</li>
|
||||
<li>System Language</li>
|
||||
<li>Game-Specific UUID</li>
|
||||
</ul>
|
||||
<p>
|
||||
This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well
|
||||
as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by
|
||||
scanning your computer for installed programs and collecting various demographic information about the user. It's very clear
|
||||
that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how
|
||||
innocent this data is.
|
||||
<p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with
|
||||
personal information in a way peculiar to that program.
|
||||
</p>
|
||||
<h3>Sharing Information with third parties</h3>
|
||||
<p>
|
||||
Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p><i>
|
||||
"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||
</i></p>
|
||||
<p>
|
||||
Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being
|
||||
given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product,
|
||||
Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the
|
||||
information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
|
||||
will not sell the information that they collect through Redshell to third parties.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h3>Further Reading</h3>
|
||||
<p>
|
||||
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a>
|
||||
<a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a>
|
||||
<a href="http://archive.is/jwlur">[archive.is]</a>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a>
|
||||
<a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 7/16/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/redshell_logo.png" alt="redshell Logo"/>
|
||||
<h1>Redshell</h1>
|
||||
<p>Redshell is a spyware platform that is integrated into many video games.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints any computers it is attached too and phones home. It also collects information about how a player has been interacting with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are avoided entirely.</p>
|
||||
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
||||
<p>Redshell has confirmed that it collects the following information<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>Operating System</li>
|
||||
<li>Installed Browsers</li>
|
||||
<li>Available Fonts</li>
|
||||
<li>Screen Resolution</li>
|
||||
<li>IP Address</li>
|
||||
<li>Timezone</li>
|
||||
<li>System Language</li>
|
||||
<li>Game-Specific UUID</li>
|
||||
</ul>
|
||||
<p>This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by scanning your computer for installed programs and collecting various demographic information about the user. It's very clear that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how innocent this data is.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with personal information in a way peculiar to that program.</p>
|
||||
<h3>Sharing Information with third parties</h3>
|
||||
<p>Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||
</i></p>
|
||||
<p>Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or will not sell the information that they collect through Redshell to third parties.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a> <a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a> <a href="http://archive.is/jwlur">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a> <a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 7/16/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,42 +1,40 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/seamonkey.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>SeaMonkey - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="main">
|
||||
<img src="../images/seamonkey/SeaMonkey.svg" alt="SeaMonkey Logo"/>
|
||||
<h1>SeaMonkey</h1>
|
||||
<p>SeaMonkey is a web browser, email client, news reader, HTML editor and an IRC client.<sup><a href="#two">[2]</a></sup></p>
|
||||
<h2>Spyware Level: <span class="yellow">Medium</span></h2>
|
||||
<p>SeaMonkey makes about 35 requests on first start, with a connection to Google SafeBrowsing recurring about every 30 minutes, though it can be <a href="../guides/seamonkey.html">disabled</a>.</p>
|
||||
<img class="screenshot" src="../images/seamonkey/seamonkey.png" alt="SeaMonkey Requests in Mitmproxy"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<h4>Sources:</h4>
|
||||
<p><a id="one">1.</a>
|
||||
<a href="https://commons.wikimedia.org/wiki/File:SeaMonkey.svg">SeaMonkey Logo (WikiMedia)</a></p>
|
||||
<p><a id="two">2.</a>
|
||||
<a href="https://www.seamonkey-project.org/about">https://www.seamonkey-project.org/about</a><a href="http://web.archive.org/web/20201130073628/https://www.seamonkey-project.org/about">[web.archive.org]</a></p>
|
||||
<hr></hr>
|
||||
<b>This article was created on 1/17/2021</b><br/>
|
||||
<b>This article was last edited on 5/3/2021</b>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>SeaMonkey - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/seamonkey/SeaMonkey.svg" alt="SeaMonkey Logo"/>
|
||||
<h1>SeaMonkey</h1>
|
||||
<p>SeaMonkey is a web browser, email client, news reader, HTML editor and an IRC client.<sup><a href="#s2">[2]</a></sup></p>
|
||||
<h2>Spyware Level: <span class="yellow">Medium</span></h2>
|
||||
<p>SeaMonkey makes about 35 requests on first start, with a connection to Google SafeBrowsing recurring about every 30 minutes, though it can be <a href="../guides/seamonkey.html">disabled</a>.</p>
|
||||
<img class="screenshot" src="../images/seamonkey/seamonkey.png" alt="SeaMonkey Requests in Mitmproxy"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://commons.wikimedia.org/wiki/File:SeaMonkey.svg">SeaMonkey Logo (WikiMedia)</a></li>
|
||||
<li id="s2"><a href="https://www.seamonkey-project.org/about">https://www.seamonkey-project.org/about</a><a href="http://web.archive.org/web/20201130073628/https://www.seamonkey-project.org/about">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 1/17/2021</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 5/3/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -3,25 +3,22 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Slimjet — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Slimjet — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
|
||||
<h1>Slimjet</h1>
|
||||
<center>
|
||||
<a href="slimjet_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
|
||||
<h1>Slimjet</h1>
|
||||
<p>
|
||||
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#s1">[1]</a></sup>. However, this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
|
||||
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
|
||||
</p>
|
||||
|
@ -74,18 +71,18 @@
|
|||
<p>
|
||||
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
|
||||
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/67qZa">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<li id="s2">
|
||||
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
|
||||
</li>
|
||||
|
@ -94,17 +91,17 @@
|
|||
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/fHly1">[archive.is]</a><br>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 8/4/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 8/4/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -3,25 +3,22 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Slimjet — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Slimjet — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
|
||||
<h1>Slimjet</h1>
|
||||
<center>
|
||||
<a href="slimjet.html">[English]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
|
||||
<h1>Slimjet</h1>
|
||||
<p>
|
||||
Slimjet jest klonem przeglądarki internetowej SlimBrowser od FlashPeak która wykorzystuje kod źródłowy Chromium.
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="red">Ekstermalnie Wysoki</span></h2>
|
||||
<p>
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="red">Ekstermalnie Wysoki</span></h2>
|
||||
<p>
|
||||
Na swojej stronie internetowej Slimjet twierdzi że jest bardzo zaangażowana w dbanie o prywatność użytkownika i blokuje śledzenie Google, w przeciwieństwie do Google Chrome<sup><a href="#s1">[1]</a></sup>. Jednak, to twierdzenie jest <b><font color=red>nieprawdziwe</font></b>. Slimjet stale wysyła informacje do Google i łączy się z ich
|
||||
usługami. Slimjet twierdzi że obawia się o prywatność ale ostatecznie zachowuje prawie wszystkie funkcje szpiegowskie znalezione w Google Chrome, jak również dodatkowe śledzenie dodane przez FlashPoint. W ten sposób, Slimjet udaje się zaimplementować całe oprogramowanie szpiegowskie które można znaleźć w przeglądarkach takich jak Google Chrome, z wyjątkiem tego że zamiast do jednej firmy która posiada te informacje, jest ono podzielone na kilka firm...
|
||||
</p>
|
||||
|
@ -75,18 +72,18 @@
|
|||
<p>
|
||||
Oczywiście można powiedzieć że każdy rodzaj usługi synchronizującej historię wyszukiwania "w chmurze" to koszmar prywatności. Teraz zarówno Google jak i Slimjet mają dostęp do twojej historii przeglądania...
|
||||
</p>
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
</div>
|
||||
<hr>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
|
||||
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/67qZa">[archive.is]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<li id="s2">
|
||||
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
|
||||
</li>
|
||||
|
@ -95,17 +92,17 @@
|
|||
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/fHly1">[archive.is]</a><br>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 8/4/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</ol>
|
||||
</div>
|
||||
<hr>
|
||||
<b>This article was last edited on 8/4/2018</b>
|
||||
<!--Dont change-->
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<!--Dont change-->
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Snapchat — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Sphere Browser — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,116 +1,74 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Steam — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/steam_logo.png" alt="Steam logo">
|
||||
<h1>Steam</h1>
|
||||
<p>
|
||||
Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection.
|
||||
</p>
|
||||
<h3>Steam's source code is unavailable</h3>
|
||||
<p>
|
||||
Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.
|
||||
</p>
|
||||
<h3>Steam collects and shares huge amounts of sensitive user information</h3>
|
||||
<p>
|
||||
In Steam's privacy policy<sup><a href="#1">[1]</a></sup>, Steam details that it collects the following user information:
|
||||
</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Address</li>
|
||||
<li>Credit Card Number(s)</li>
|
||||
<li>e-mail</li>
|
||||
<li>Age</li>
|
||||
<li>IP Address</li>
|
||||
<li>Device Unique ID</li>
|
||||
<li>Chat logs</li>
|
||||
<li>Forum posts</li>
|
||||
<li>Voice Chat Recordings</li>
|
||||
<li>Hardware Enumeration</li>
|
||||
</ul>
|
||||
<p>
|
||||
Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.
|
||||
</p>
|
||||
<h3>Steam has been and may still be recording your internet history</h3>
|
||||
<p>
|
||||
It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not.
|
||||
</p>
|
||||
<h3>Steam records and publicly broadcasts your program usage habits</h3>
|
||||
<p>
|
||||
Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature.
|
||||
</p>
|
||||
<h3>Steam attempts to collect your telephone number</h3>
|
||||
<p>
|
||||
Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.
|
||||
</p>
|
||||
<h3>Steam "phones home" and requires and internet connection</h3>
|
||||
<p>
|
||||
Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.
|
||||
</p>
|
||||
<h3>Steam is self-updating software</h3>
|
||||
<p>
|
||||
Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
|
||||
<a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a>
|
||||
<a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a>
|
||||
<a href="http://archive.is/baCzK">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
<a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a>
|
||||
<a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/UpQU5">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
|
||||
<a name="1">1.</a>
|
||||
<a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a>
|
||||
<a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a>
|
||||
<a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a>
|
||||
<a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a>
|
||||
<br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a>
|
||||
<a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/rc37E">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a>
|
||||
<a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/06hx7">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/3/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/steam_logo.png" alt="Steam logo"/>
|
||||
<h1>Steam</h1>
|
||||
<p>Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection.</p>
|
||||
<h3>Steam's source code is unavailable</h3>
|
||||
<p>Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.</p>
|
||||
<h3>Steam collects and shares huge amounts of sensitive user information</h3>
|
||||
<p>In Steam's privacy policy<sup><a href="#s1">[1]</a></sup>, Steam details that it collects the following user information:</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Address</li>
|
||||
<li>Credit Card Number(s)</li>
|
||||
<li>e-mail</li>
|
||||
<li>Age</li>
|
||||
<li>IP Address</li>
|
||||
<li>Device Unique ID</li>
|
||||
<li>Chat logs</li>
|
||||
<li>Forum posts</li>
|
||||
<li>Voice Chat Recordings</li>
|
||||
<li>Hardware Enumeration</li>
|
||||
</ul>
|
||||
<p>Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.</p>
|
||||
<h3>Steam has been and may still be recording your internet history</h3>
|
||||
<p>It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#s2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#s3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not.</p>
|
||||
<h3>Steam records and publicly broadcasts your program usage habits</h3>
|
||||
<p>Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature.</p>
|
||||
<h3>Steam attempts to collect your telephone number</h3>
|
||||
<p>Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.</p>
|
||||
<h3>Steam "phones home" and requires and internet connection</h3>
|
||||
<p>Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.</p>
|
||||
<h3>Steam is self-updating software</h3>
|
||||
<p>Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a> <a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a> <a href="http://archive.is/baCzK">[archive.is]</a></li>
|
||||
<li><a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a> <a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a> <a href="http://archive.is/UpQU5">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a> <a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a> <a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a> <a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a> <a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a></li>
|
||||
<li id="s2"><a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a> <a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a> <a href="https://archive.is/rc37E">[archive.is]</a></li>
|
||||
<li id="s3"><a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a> <a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a> <a href="https://archive.li/06hx7">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/3/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Steam — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,47 +1,35 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<center>
|
||||
<a href="../articles/surf_fr.html">[Français]</a>
|
||||
<a href="../articles/surf_pl.html">[Polski]</a>
|
||||
<a href="../articles/surf_ru.html">[Русский]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">makes no unsolicited requests at all.</span></b>
|
||||
It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.
|
||||
</p>
|
||||
<p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a>
|
||||
<a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<p>From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#s1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Surf <b><span class="green">makes no unsolicited requests at all</span></b>. It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.</p>
|
||||
<p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,44 +1,39 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalogue</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<center>
|
||||
<a href="../articles/surf.html">[English]</a>
|
||||
<a href="../articles/surf_pl.html">[Polski]</a>
|
||||
<a href="../articles/surf_ru.html">[Русский]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
D'apres le site de Suckless: "surf est un navigateur simple basé sur WebKit2/GTK+. Il peut afficher des sites web et suivre des liens."<sup><a href="#1">[1]</a></sup> Testé: version 2.0 pour Linux. Mitmproxy a été utilisé pour vérifier les connections.
|
||||
</p>
|
||||
<h2>Niveau: <span class="green">Pas un Spyware</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">ne fait aucune requete non-solicitée.</span></b>
|
||||
C'est aussi un logiciel libre sous la license Expat. Il a été testé en meme temps que tabbed, un logiciel développé pour les utilisateurs de surf qui ajoute le support pour des onglets0. D'un point de vue vie privée, Surf est un navigateur parfait.
|
||||
</p>
|
||||
<p>Surf a besoin de Proxychains pour se connecter a Tor car il ne supporte que les proxys HTTP (au lieu de SOCKS pour Tor).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalogue</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<p>
|
||||
D'apres le site de Suckless: "surf est un navigateur simple basé sur WebKit2/GTK+. Il peut afficher des sites web et suivre des liens."<sup><a href="#1">[1]</a></sup> Testé: version 2.0 pour Linux. Mitmproxy a été utilisé pour vérifier les connections.
|
||||
</p>
|
||||
<h2>Niveau: <span class="green">Pas un Spyware</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">ne fait aucune requete non-solicitée.</span></b>
|
||||
C'est aussi un logiciel libre sous la license Expat. Il a été testé en meme temps que tabbed, un logiciel développé pour les utilisateurs de surf qui ajoute le support pour des onglets0. D'un point de vue vie privée, Surf est un navigateur parfait.
|
||||
</p>
|
||||
<p>Surf a besoin de Proxychains pour se connecter a Tor car il ne supporte que les proxys HTTP (au lieu de SOCKS pour Tor).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,46 +1,41 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<center>
|
||||
<a href="../articles/surf.html">[English]</a>
|
||||
<a href="../articles/surf_fr.html">[Français]</a>
|
||||
<a href="../articles/surf_ru.html">[Русский]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
Z ich strony internetowej: "surf" to prosta przeglądarka internetowa oparta na WebKit2/GTK+. Jest ona w stanie wyświetlać strony internetowe i podążać za linkami."<sup><a href="#1">[1]</a></sup> Program przetestowany: v2.0 dla Linuksa. Do sprawdzania połączeń użyto Mitmproxy.
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="green">Brak Oprogramowania Szpiegowskiego</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">nie wysyła żadnych niepożądanych żądań.</span></b>
|
||||
Jest to również w pełni wolne oprogramowanie na licencji expat. Zostało ono przetestowane w połączeniu z tabbed, kolejnym oprogramowaniem stworzonym przez tych samych ludzi do użytku z surf, dodaje wsparcie dla kart. Z punktu widzenia prywatności, ta przeglądarka jest doskonałym wyborem.
|
||||
</p>
|
||||
<p>Surf wymaga serwerów proxychains, aby połączyć się z Tor, ponieważ obsługuje on tylko proxy HTTP, a nie SOCKS (czyli to, czego używa Tor).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Katalog</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<p>
|
||||
Z ich strony internetowej: "surf" to prosta przeglądarka internetowa oparta na WebKit2/GTK+. Jest ona w stanie wyświetlać strony internetowe i podążać za linkami."<sup><a href="#1">[1]</a></sup> Program przetestowany: v2.0 dla Linuksa. Do sprawdzania połączeń użyto Mitmproxy.
|
||||
</p>
|
||||
<h2>Poziom Oprogramowania Szpiegowskiego: <span class="green">Brak Oprogramowania Szpiegowskiego</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">nie wysyła żadnych niepożądanych żądań.</span></b>
|
||||
Jest to również w pełni wolne oprogramowanie na licencji expat. Zostało ono przetestowane w połączeniu z tabbed, kolejnym oprogramowaniem stworzonym przez tych samych ludzi do użytku z surf, dodaje wsparcie dla kart. Z punktu widzenia prywatności, ta przeglądarka jest doskonałym wyborem.
|
||||
</p>
|
||||
<p>Surf wymaga serwerów proxychains, aby połączyć się z Tor, ponieważ obsługuje on tylko proxy HTTP, a nie SOCKS (czyli to, czego używa Tor).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,46 +1,41 @@
|
|||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Каталог</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<center>
|
||||
<a href="../articles/surf.html">[English]</a>
|
||||
<a href="../articles/surf_fr.html">[Français]</a>
|
||||
<a href="../articles/surf_pl.html">[Polski]</a><br><br>
|
||||
</center>
|
||||
<p>
|
||||
По их сайту: "surf - простой веб-браузер, основанный на WebKit2/GTK+. Он может показывать веб-сайты и переходить по ссылкам."<sup><a href="#1">[1]</a></sup> Программа протестирована: v2.0 для Linux. Mitmproxy было использовано для проверки соединений.
|
||||
</p>
|
||||
<h2>Уровень слежки: <span class="green">Нет</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">никогда не делает нежелательных запросов</span>.</b>
|
||||
Это полностью свободное программное обеспечение, лицензированное под MIT. Он был протестирован вместе с tabbed - другая программа, разрабатываемая теми же людьми для использования с surf, она добавляет поддержку вкладок. С точки зрения приватности, этот браузер - отличный выбор.
|
||||
</p>
|
||||
<p>Surf требует proxychains для соединения с Tor, так как он поддерживает только HTPP прокси, не SOCKS (которое использует TOR).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Источники</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Surf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Каталог</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<p>
|
||||
По их сайту: "surf - простой веб-браузер, основанный на WebKit2/GTK+. Он может показывать веб-сайты и переходить по ссылкам."<sup><a href="#1">[1]</a></sup> Программа протестирована: v2.0 для Linux. Mitmproxy было использовано для проверки соединений.
|
||||
</p>
|
||||
<h2>Уровень слежки: <span class="green">Нет</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">никогда не делает нежелательных запросов</span>.</b>
|
||||
Это полностью свободное программное обеспечение, лицензированное под MIT. Он был протестирован вместе с tabbed - другая программа, разрабатываемая теми же людьми для использования с surf, она добавляет поддержку вкладок. С точки зрения приватности, этот браузер - отличный выбор.
|
||||
</p>
|
||||
<p>Surf требует proxychains для соединения с Tor, так как он поддерживает только HTPP прокси, не SOCKS (которое использует TOR).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Источники</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -6,56 +6,56 @@
|
|||
<!-- NOTICE!!!! -->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Tor Browser Bundle — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css" />
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/tor_browser_logo.png" alt="Tor Browser Bundle Logo"/>
|
||||
<h1>Tor Browser Bundle</h1>
|
||||
<p>Version tested: 11.0.3</p>
|
||||
<br/>
|
||||
<p>Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#s1">[1]</a></sup> This article is about the desktop Tor Browser Bundle, which is based on Firefox. Tor itself can be used with any browser.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>The Tor browser is a privacy focused web browser that is used to access the internet through the Tor Network. Connections through the Tor network are much more private than normal connections as you do not have an IP address that is associated with you. While spyware services can tell that you are connecting from the Tor network, their ability to identify and profile you is greatly reduced.</p>
|
||||
<br/>
|
||||
<p>Tor Browser has automatic updates, and sends telemetry, albeit over Tor.</p>
|
||||
<br/>
|
||||
<p>If you go to about:networking, you will see several addresses that are affiliated with Mozilla, even before Tor is connected. You can <a href="../guides/tbb.html">mitigate the spyware</a>, but note that there is a chance that it will be overwritten by future updates.</p>
|
||||
<img class="screenshot" src="../images/tbbaboutnetworking1.png" alt="About Networking in Tor Browser, displaying connections prior to connecting with the Tor Network" />
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.torproject.org/">Tor Browser Official Site</a>
|
||||
<a href="https://web.archive.org/web/20181113230342/https://www.torproject.org/">[web.archive.org]</a>
|
||||
<a href="http://wayback.archive-it.org/all/20181111103241/https://www.torproject.org/">[wayback.archive-it.org]</a>
|
||||
<a href="http://webarchive.loc.gov/all/20170822223331/https://www.torproject.org/">[webarchive.loc.gov]</a>
|
||||
<a href="https://swap.stanford.edu/20141221222101/https://www.torproject.org/">[swap.stanford.edu]</a>
|
||||
<a href="https://arquivo.pt/wayback/20160517095637/http://www.torproject.org/">[arquivo.pt]</a>
|
||||
<a href="http://archive.is/20181011170659/https://www.torproject.org/">[archive.is]</a>
|
||||
<a href="http://wayback.vefsafn.is/wayback/20180915054500/https://www.torproject.org/">[wayback.vefsafn.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/pDSgk?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://gitlab.torproject.org/legacy/trac/-/issues/24351">https://gitlab.torproject.org/legacy/trac/-/issues/24351</a>
|
||||
<a href="https://web.archive.org/web/20200301013104/https://trac.torproject.org/projects/tor/ticket/24351">https://web.archive.org/web/20200301013104/https://trac.torproject.org/projects/tor/ticket/24351</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 1/1/2022</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License" /></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<title>Tor Browser Bundle — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/tor_browser_logo.png" alt="Tor Browser Bundle Logo"/>
|
||||
<h1>Tor Browser Bundle</h1>
|
||||
<p>Version tested: 11.0.3</p>
|
||||
<br/>
|
||||
<p>Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#s1">[1]</a></sup> This article is about the desktop Tor Browser Bundle, which is based on Firefox. Tor itself can be used with any browser.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>The Tor browser is a privacy focused web browser that is used to access the internet through the Tor Network. Connections through the Tor network are much more private than normal connections as you do not have an IP address that is associated with you. While spyware services can tell that you are connecting from the Tor network, their ability to identify and profile you is greatly reduced.</p>
|
||||
<br/>
|
||||
<p>Tor Browser has automatic updates, and sends telemetry, albeit over Tor.</p>
|
||||
<br/>
|
||||
<p>If you go to about:networking, you will see several addresses that are affiliated with Mozilla, even before Tor is connected. You can <a href="../guides/tbb.html">mitigate the spyware</a>, but note that there is a chance that it will be overwritten by future updates.</p>
|
||||
<img class="screenshot" src="../images/tbbaboutnetworking1.png" alt="About Networking in Tor Browser, displaying connections prior to connecting with the Tor Network"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.torproject.org/">Tor Browser Official Site</a>
|
||||
<a href="https://web.archive.org/web/20181113230342/https://www.torproject.org/">[web.archive.org]</a>
|
||||
<a href="http://wayback.archive-it.org/all/20181111103241/https://www.torproject.org/">[wayback.archive-it.org]</a>
|
||||
<a href="http://webarchive.loc.gov/all/20170822223331/https://www.torproject.org/">[webarchive.loc.gov]</a>
|
||||
<a href="https://swap.stanford.edu/20141221222101/https://www.torproject.org/">[swap.stanford.edu]</a>
|
||||
<a href="https://arquivo.pt/wayback/20160517095637/http://www.torproject.org/">[arquivo.pt]</a>
|
||||
<a href="http://archive.is/20181011170659/https://www.torproject.org/">[archive.is]</a>
|
||||
<a href="http://wayback.vefsafn.is/wayback/20180915054500/https://www.torproject.org/">[wayback.vefsafn.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/pDSgk?kreymer=false">[ghostarchive.org]</a>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="https://gitlab.torproject.org/legacy/trac/-/issues/24351">https://gitlab.torproject.org/legacy/trac/-/issues/24351</a>
|
||||
<a href="https://web.archive.org/web/20200301013104/https://trac.torproject.org/projects/tor/ticket/24351">https://web.archive.org/web/20200301013104/https://trac.torproject.org/projects/tor/ticket/24351</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 1/1/2022</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,57 +1,47 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/telegram.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Telegram - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="main">
|
||||
<img src="../images/telegram_logo.png" alt="Telegram Logo"/>
|
||||
<h1>Telegram</h1>
|
||||
<p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.</p>
|
||||
<h3>Telephone Number Required</h3>
|
||||
<p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p>
|
||||
<h3>Centralized communication routing</h3>
|
||||
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#one">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
|
||||
<p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p>
|
||||
<h3>Telegram does not follow its GPLv2 Obligations</h3>
|
||||
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#two">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
|
||||
</div>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p><a id="one">1.</a>
|
||||
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
|
||||
<a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qkfGr">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
|
||||
<a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a>
|
||||
<a href="https://archive.is/SrX5J">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 2/18/2019</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Telegram - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/telegram_logo.png" alt="Telegram Logo"/>
|
||||
<h1>Telegram</h1>
|
||||
<p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#s1">[1]</a></sup>.</p>
|
||||
<h3>Telephone Number Required</h3>
|
||||
<p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p>
|
||||
<h3>Centralized communication routing</h3>
|
||||
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#s1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
|
||||
<p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p>
|
||||
<h3>Telegram does not follow its GPLv2 Obligations</h3>
|
||||
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#s2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://telegram.org/privacy">Telegram Privacy Policy</a> <a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a> <a href="https://archive.is/qkfGr">[archive.is]</a> <a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a> <a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a> <a href="https://archive.is/SrX5J">[archive.is]</a> <a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 2/18/2019</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/11/2020</b>
|
||||
<hr/>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,7 +1,7 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Thunderbird — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,47 +1,36 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Ungoogled-Chromium — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
|
||||
<h1>Ungoogled-Chromium</h1>
|
||||
<p>
|
||||
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,
|
||||
control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="lime">Not Spyware</font></h2>
|
||||
<p>
|
||||
Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes
|
||||
<b><font color="lime">no unsolicited requests</font></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated
|
||||
browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it.
|
||||
Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are
|
||||
looking for a Chrome-based browser to switch too without taking the time to compile any software.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a>
|
||||
<a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a>
|
||||
<a href="http://archive.is/uLsce">[archive.is]</a><br>
|
||||
<!-- more apporpiate to link to a git/software archive, whichever one that might be -->
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 11/1/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo"/>
|
||||
<h1>Ungoogled-Chromium</h1>
|
||||
<p>Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#s1">[1]</a></sup></p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes <b><span class="lime">no unsolicited requests</span></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it. Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are looking for a Chrome-based browser to switch too without taking the time to compile any software.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a> <a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a> <a href="http://archive.is/uLsce">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 11/1/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Unity — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
|
@ -1,94 +1,59 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Vivaldi — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/vivaldi_logo.png" alt="vivaldi logo">
|
||||
<h1>Vivaldi</h1>
|
||||
<p>
|
||||
Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
||||
<p>
|
||||
Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.
|
||||
</p>
|
||||
<h3>Vivaldi's developers do not respect your privacy</h3>
|
||||
<p>
|
||||
Vivaldi connects to the analytics platform Piwik<sup><a href="#1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page.
|
||||
What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on,
|
||||
are <font color=red><b>not developers you can trust.</b></font> Below is an anti-privacy rant from a moderator on Vivaldi's forums:
|
||||
</p>
|
||||
<p><i>
|
||||
@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#2">[2]</a></sup>
|
||||
</i></p>
|
||||
<h3>Addon updates</h3>
|
||||
<p>
|
||||
<BR>
|
||||
<img class="screenshot" src = "../images/vivaldi_update.png"><BR>
|
||||
These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font>
|
||||
</p>
|
||||
<h3>Google Safe Browsing</h3>
|
||||
<p>
|
||||
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png"><BR>
|
||||
<img class="screenshot" src = "../images/vivaldi_threatlist.png"><BR>
|
||||
Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.
|
||||
</p>
|
||||
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img class="screenshot" src="../images/vivaldi_piwik.png">
|
||||
</p>
|
||||
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by.
|
||||
</p>
|
||||
|
||||
<h3>New tab sites</h3>
|
||||
<p>By default, Vivaldi contains some websites in its new tab page that have a lot of spyware in them, but does not automatically make any connection, and those sites can easily be deleted.</p>
|
||||
|
||||
<h3>Cannot be built from source code</h3>
|
||||
<p>
|
||||
"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#3">[3]</a></sup>
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://matomo.org/download/">Get Matomo</a>
|
||||
<a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/q9hOn">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a>
|
||||
<a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a>
|
||||
<a href="http://archive.li/8Elc9">[archive.li]</a><br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="
|
||||
https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
|
||||
">The Vivaldi source code license and the EULA appear to conflict with each other...</a>
|
||||
<a href="
|
||||
https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
|
||||
">[web.archive.org]</a>
|
||||
<a href="http://archive.li/ZoRUx">[archive.li]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 10/14/2018
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was created on 11/25/2017
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/vivaldi_logo.png" alt="vivaldi logo"/>
|
||||
<h1>Vivaldi</h1>
|
||||
<p>Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Medium</span></h2>
|
||||
<p>Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.</p>
|
||||
<h3>Vivaldi's developers do not respect your privacy</h3>
|
||||
<p>Vivaldi connects to the analytics platform Piwik<sup><a href="#s1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page. What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on, are <span class="red"><b>not developers you can trust.</b></span> Below is an anti-privacy rant from a moderator on Vivaldi's forums:</p>
|
||||
<p><i>@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#s2">[2]</a></sup></i></p>
|
||||
<h3>Addon updates</h3>
|
||||
<img class="screenshot" src = "../images/vivaldi_update.png" alt="Vivaldi Update"/>
|
||||
<p>These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <span class="red">Can't be disabled.</span></p>
|
||||
<h3>Google Safe Browsing</h3>
|
||||
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png" alt="Vivaldi SafeBrowsing"/>
|
||||
<img class="screenshot" src = "../images/vivaldi_threatlist.png" alt="Vivaldi Threatlist"/>
|
||||
<p>Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: </p>
|
||||
<img class="screenshot" src="../images/vivaldi_piwik.png" alt="Vivaldi Piwik"/>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by.</p>
|
||||
<h3>New tab sites</h3>
|
||||
<p>By default, Vivaldi contains some websites in its new tab page that have a lot of spyware in them, but does not automatically make any connection, and those sites can easily be deleted.</p>
|
||||
<h3>Cannot be built from source code</h3>
|
||||
<p>"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#s3">[3]</a></sup></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://matomo.org/download/">Get Matomo</a> <a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a> <a href="http://archive.is/q9hOn">[archive.is]</a></li>
|
||||
<li id="s2"><a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a> <a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a> <a href="http://archive.li/8Elc9">[archive.li]</a></li>
|
||||
<li id="s3"><a href="https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">The Vivaldi source code license and the EULA appear to conflict with each other...</a> <a href="https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">[web.archive.org]</a> <a href="http://archive.li/ZoRUx">[archive.li]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 10/14/2018</b>
|
||||
<br/>
|
||||
<b>This article was created on 11/25/2017</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,50 +1,41 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>VLC — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo">
|
||||
<h1>VLC Media Player</h1>
|
||||
<p>
|
||||
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.
|
||||
</p>
|
||||
<h3>VLC Media Player has been distributed with spyware programs by third parties</h3>
|
||||
<p>
|
||||
While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>.
|
||||
</p>
|
||||
<h3>VLC Media Player contains some opt-in spyware features</h3>
|
||||
<p>
|
||||
VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy">
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a>
|
||||
<a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/80IDC">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 7/30/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo"/>
|
||||
<h1>VLC Media Player</h1>
|
||||
<p>VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.</p>
|
||||
<h3>VLC Media Player has been distributed with spyware programs by third parties</h3>
|
||||
<p>While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#s1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>.</p>
|
||||
<h3>VLC Media Player contains some opt-in spyware features</h3>
|
||||
<p>VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.</p>
|
||||
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a> <a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a> <a href="https://archive.is/80IDC">[archive.is]</a> <a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 7/30/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,118 +1,62 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/waterfox_classic.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Waterfox Classic - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="main">
|
||||
<img src="../images/waterfox_logo.png" alt="Waterfox Logo"/>
|
||||
<h1>Waterfox Classic</h1>
|
||||
<p>Version tested was 2020.10.</p>
|
||||
<p>
|
||||
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
|
||||
Note: This article has a few issues. See <a href="https://codeberg.org/shadow/SpywareWatchdog/issues/117">this</a> for more details.
|
||||
</p>
|
||||
<h2>Spyware Level: <span class="yellow>">Medium</span></h2>
|
||||
<p>
|
||||
Waterfox is a fork of Firefox that claims to be more private and secure
|
||||
than Firefox. However, Waterfox contains telemetry and shares
|
||||
information about you with Mozilla, and has other spyware features.
|
||||
</p>
|
||||
<h3>Waterfox connects to spyware services when it is first run</h3>
|
||||
<p>
|
||||
If you start up Waterfox for the first time, it will make <b><span class="red">55 requests</span></b><sup><a href="#s4">[4]</a></sup> to several spyware platforms, notably
|
||||
Matomo, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
|
||||
well as Waterfox's own update service. You can look at a list of these requests
|
||||
<a href="../images/waterfox_classic_spyware.png">here</a>.
|
||||
</p>
|
||||
<h3>Waterfox is integrated into the "Firefox Accounts" spyware platform</h3>
|
||||
<p>
|
||||
The "Firefox Accounts" platform allows you to sync a lot of sensitive
|
||||
information, such as your internet history, across all of your devices.
|
||||
This is, of course, all being stored on Mozilla's servers.<sup><a href="#s3">[3]</a></sup>
|
||||
This feature
|
||||
is opt-in spyware, but it should still be mentioned.
|
||||
If you don't want your internet history to be uploaded to Mozilla servers,
|
||||
don't use this feature.
|
||||
</p>
|
||||
<h3>Waterfox is self updating software</h3>
|
||||
<p>
|
||||
Self updates are a spyware feature since they are usually ways for the developer of a program to put spyware into their software without presenting it in a prominent way
|
||||
where the user can understand what they are giving up when they download the update.
|
||||
</p>
|
||||
<p>Other known spywares, like Chromium, make use of this method</p>
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>
|
||||
By default Waterfox uses the search engine <a href="../articles/bing.html">Bing</a>.
|
||||
Why would a privacy-based Web Browser offer this search engine by default? The other offered search engines are not much better- we have the option of searching with Google,
|
||||
which also logs your internet searches, and Ecosia, which also logs your internet searches (but it gives them to Bing). The developers attitude towards these search engines is concerning:
|
||||
</p>
|
||||
<p>
|
||||
<i>"Bing is actually quite good for privacy as well (let's not forget Mozilla even suggested them as a more privacy focused search back in 2009)."</i><sup><a href="#s2">[2]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
It's very clear that while the browser advertises itself as very privacy focused, the actual words and actions of the developers aren't consistent with this claim.
|
||||
</p>
|
||||
<hr/>
|
||||
</div>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.waterfox.net/privacy">https://www.waterfox.net/privacy</a>
|
||||
<a href="http://web.archive.org/web/20201228044209/https://www.waterfox.net/privacy">[web.archive.org]</a></li>
|
||||
<li><a href="https://www.waterfox.net/legal/">https://www.waterfox.net/legal</a>
|
||||
<a href="http://web.archive.org/web/20201228044236/https://www.waterfox.net/legal">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1">
|
||||
<a href="https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">What happened to Waterfox's devotion to user privacy?</a>
|
||||
<a href="http://removeddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[removeddit.com]</a>
|
||||
<a href="http://web.archive.org/web/20180329154241/https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/omeK3">[archive.li]</a><br/>
|
||||
</li>
|
||||
<li id="s2">
|
||||
<a href="http://old.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">Waterfox and Ecosia — Privacy Concerns</a>
|
||||
<a href="http://removeddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[removeddit.com]</a>
|
||||
<a href="https://web.archive.org/web/20180201210222/https://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/smDw6">[archive.is]</a><br/>
|
||||
</li>
|
||||
<li id="s3">
|
||||
<a href="https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">Access Mozilla Services with Firefox Account</a>
|
||||
<a href="https://web.archive.org/web/20150322103834/https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">[web.archive.org]</a>
|
||||
<a href="https://archive.li/oDcmj">[archive.li]</a><br/>
|
||||
</li>
|
||||
<li id="s4">
|
||||
<a href="../images/waterfox_classic_spyware.png">All the requests made (mitmproxy)</a>
|
||||
</li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p><b>
|
||||
<b>This article was created prior to 6/2/2018</b><br/>
|
||||
This article was last edited on 2/20/2022
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Waterfox Classic - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/waterfox_logo.png" alt="Waterfox Logo"/>
|
||||
<h1>Waterfox Classic</h1>
|
||||
<p>Version tested was 2020.10.</p>
|
||||
<p>Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>. Note: This article has a few issues. See <a href="https://codeberg.org/shadow/SpywareWatchdog/issues/117">this</a> for more details.</p>
|
||||
<h2>Spyware Level: <span class="yellow>">Medium</span></h2>
|
||||
<p>Waterfox is a fork of Firefox that claims to be more private and secure than Firefox. However, Waterfox contains telemetry and shares information about you with Mozilla, and has other spyware features.</p>
|
||||
<h3>Waterfox connects to spyware services when it is first run</h3>
|
||||
<p>If you start up Waterfox for the first time, it will make <b><span class="red">55 requests</span></b><sup><a href="#s4">[4]</a></sup> to several spyware platforms, notably Matomo, and Mozilla online services like its Geolocation service, and several other Mozilla services, as well as Waterfox's own update service. You can look at a list of these requests <a href="../images/waterfox_classic_spyware.png">here</a>.</p>
|
||||
<h3>Waterfox is integrated into the "Firefox Accounts" spyware platform</h3>
|
||||
<p>The "Firefox Accounts" platform allows you to sync a lot of sensitive information, such as your internet history, across all of your devices. This is, of course, all being stored on Mozilla's servers.<sup><a href="#s3">[3]</a></sup> This feature is opt-in spyware, but it should still be mentioned. If you don't want your internet history to be uploaded to Mozilla servers, don't use this feature.</p>
|
||||
<h3>Waterfox is self updating software</h3>
|
||||
<p>Self updates are a spyware feature since they are usually ways for the developer of a program to put spyware into their software without presenting it in a prominent way where the user can understand what they are giving up when they download the update.</p>
|
||||
<p>Other known spywares, like Chromium, make use of this method</p>
|
||||
<h3>Not spyware related, but worth noting</h3>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>By default Waterfox uses the search engine <a href="../articles/bing.html">Bing</a>. Why would a privacy-based Web Browser offer this search engine by default? The other offered search engines are not much better- we have the option of searching with Google, which also logs your internet searches, and Ecosia, which also logs your internet searches (but it gives them to Bing). The developers attitude towards these search engines is concerning:</p>
|
||||
<p><i>"Bing is actually quite good for privacy as well (let's not forget Mozilla even suggested them as a more privacy focused search back in 2009)."</i><sup><a href="#s2">[2]</a></sup></p>
|
||||
<p>It's very clear that while the browser advertises itself as very privacy focused, the actual words and actions of the developers aren't consistent with this claim.</p>
|
||||
<hr/>
|
||||
</div>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.waterfox.net/privacy">https://www.waterfox.net/privacy</a> <a href="http://web.archive.org/web/20201228044209/https://www.waterfox.net/privacy">[web.archive.org]</a></li>
|
||||
<li><a href="https://www.waterfox.net/legal/">https://www.waterfox.net/legal</a> <a href="http://web.archive.org/web/20201228044236/https://www.waterfox.net/legal">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">What happened to Waterfox's devotion to user privacy?</a> <a href="http://removeddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[removeddit.com]</a> <a href="http://web.archive.org/web/20180329154241/https://www.reddit.com/r/waterfox/comments/880z4b/what_happened_to_waterfoxs_devotion_to_user/">[web.archive.org]</a> <a href="https://archive.li/omeK3">[archive.li]</a></li>
|
||||
<li id="s2"><a href="http://old.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">Waterfox and Ecosia — Privacy Concerns</a> <a href="http://removeddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[removeddit.com]</a> <a href="https://web.archive.org/web/20180201210222/https://www.reddit.com/r/waterfox/comments/7m1pkq/waterfox_and_ecosia_privacy_concerns/">[web.archive.org]</a> <a href="https://archive.is/smDw6">[archive.is]</a></li>
|
||||
<li id="s3"><a href="https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">Access Mozilla Services with Firefox Account</a> <a href="https://web.archive.org/web/20150322103834/https://support.mozilla.org/en-US/kb/access-mozilla-services-firefox-accounts">[web.archive.org]</a> <a href="https://archive.li/oDcmj">[archive.li]</a></li>
|
||||
<li id="s4"><a href="../images/waterfox_classic_spyware.png">All the requests made (mitmproxy)</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created prior to 6/2/2018</b>
|
||||
<br/>
|
||||
<b>This article was last edited on 2/20/2022</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,38 +1,36 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/webbrowser.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>Web Browser - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img width="130" height="145" src="../images/web_browser_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Web Browser</h1>
|
||||
<p>Web Browser is a browser originally based on Pale Moon.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Web Browser <span class="green">makes no unsolicited requests at all.</span> It is also fully open source.<sup><a href="#one">[1]</a></sup> Due to it being based on Pale Moon, it has access to all of the XUL plugins available.</p>
|
||||
</div>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p><a id="one">1.</a><a href="https://git.nuegia.net/webbrowser.git/">Project's homepage</a></p>
|
||||
<hr></hr>
|
||||
<p>This article was created on 4/3/20</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>Web Browser - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<img width="130" height="145" src="../images/web_browser_logo.png" alt="Web Browser Logo"/>
|
||||
<h1>Web Browser</h1>
|
||||
<p>Web Browser is a browser originally based on Pale Moon.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Web Browser <span class="green">makes no unsolicited requests at all.</span> It is also fully open source.<sup><a href="#one">[1]</a></sup> Due to it being based on Pale Moon, it has access to all of the XUL plugins available.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p><a id="one">1.</a><a href="https://git.nuegia.net/webbrowser.git/">Project's homepage</a></p>
|
||||
<hr/>
|
||||
<p>This article was created on 4/3/20</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,71 +1,69 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<meta http-equiv="onion-location" content="http://spywaredrcdg5krvjnukp3vbdwiqcv3zwbrcg6qh27kiwecm4qyfphid.onion/articles/lynx.html"/>
|
||||
<link rel="icon" href = "../images/favicon.ico"/>
|
||||
<title>WebDiscover - Spyware Watchdog</title>
|
||||
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<img src="../images/webdiscover_logo.png" alt="Webdiscover logo">
|
||||
<h1>WebDiscover</h1>
|
||||
<p>WebDiscover is a web browser made by WebDiscover Media.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>WebDiscover uses the spyware search engine <a href="../articles/yahoo.html">Yahoo</a> as it's default search engine, but on its website it says it uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search engine. It is hard to review since every time I run it, it messes up MITMproxy so I can't see what it's doing. The privacy policy explains that it collects a large amount of personal information from its users, so it is at least not a secret that this browser is spyware. This program acts in a very suspicious way and the privacy policy contains a lot of language in it about the use of the information it collects that elevates it to a <b><span class="red">uniquely bad stance on user privacy and use of user information</span></b>, so I would recommend staying far away from it.</p>
|
||||
<h3>WebDiscover installs itself onto users computers through installer bundling</h3>
|
||||
<p>WebDiscover is mostly installed through other programs as an opt-out. This means that most users did not want to install this browser, and were tricked into doing it by other software's installer programs. For example<sup><a href="#2">[2]</a></sup>: <a href="../images/wd1.jpg">[1]</a> <a href="../images/wd2.jpg">[2]</a> <a href="../images/wd3.jpg">[3]</a> <a href="../images/wd4.jpg">[4]</a> <a href="../images/wd5.jpg">[5]</a> <a href="../images/wd6.jpg">[6]</a> <a href="../images/wd7.jpg">[7]</a> <a href="../images/wd8.jpg">[8]</a> <a href="../images/wd9.jpg">[9]</a> <a href="../images/cdex_bundling.png">[10]</a></p>
|
||||
<h3>WebDiscover collects a large amount of information about its users</h3>
|
||||
<p>According to its privacy policy<sup><a href="#1">[1]</a></sup>, WebDiscover collects the following information about its users as its browser is downloaded and used:</p>
|
||||
<ul>
|
||||
<li>Web Browser type</li>
|
||||
<li>Operating System type and version</li>
|
||||
<li>Domain Name</li>
|
||||
<li>Browser version</li>
|
||||
<li>Browser usage and statistics</li>
|
||||
</ul>
|
||||
<p>Some of this information is typical of the kind of info that is collected by developers who write programs that phone home using the HTTP protocol. However, WebDiscover also collects the following information about its users which is more concerning:</p>
|
||||
<p><i>"We may collect Personal Data and Anonymous Data when you download the Browser. We may also collect Personal Data when you send us information or communications directly. “Personal Data” means data that allows someone to identify or contact you including, without limitation, your name, physical address, electronic mail (email) address, phone number, and credit card information (collectively, your “Personal Data”) for the purposes of recording the transaction when you engage in activities on the Site or through use of the Browser."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>So, WebDiscover will profile your computer, and WebDiscover Media will use every opportunity they get to collect information about you.</p>
|
||||
<h3>WebDiscover sells information about its users</h3>
|
||||
<p>In this quote from the privacy policy:</p>
|
||||
<p><i>"We may share Anonymous Data with selected third parties and business partners..."</i></p>
|
||||
<p>Confirming that the information that WebDiscover collects about you will be sold to advertisers.</p>
|
||||
<h3>WebDiscover uses your personal information in a malicious way</h3>
|
||||
<p>WebDiscover sells your information to advertising companies that will send you junk mail separately from WebDiscover's discretion- it also DOES NOT comply with requests to stop contact, and requires you to separately request each company that it has sold your information to, to stop contacting you. I didn't check if they would comply with those requests or not. The following quotes from the privacy policy should explain this:</p>
|
||||
<p><i>"To opt-out of having future third-party marketing communications sent to you, you will be required to unsubscribe with the applicable third party providers. Despite your request to no longer receive future newsletters or promotional and marketing communications from us, we reserve the right to continue to send you notices of any updates to the Browser, our Software End User License Agreement, and our Privacy Policy."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>WebDiscover also claims that anyone who acts in a way that "damages the reputation" of their company will have all of the personal information that WebDiscover has collected about them disclosed to any party at their discretion.</p>
|
||||
<p><i>"If we determine, in our sole discretion, that you have engaged in conduct which might be considered, unlawful, fraudulent, or which might harm or damage the reputation or standing of WebDiscover Media with either the general public or with a business partner or potential business partner of WebDiscover Media, we reserve the right to release your Personal Information to such persons or third parties as we consider necessary in order to prevent you from causing injury to, or otherwise injuring or interfering, now or in the future, with WebDiscover Media' rights, property or operations or otherwise the rights, property or operations of anyone else who could be harmed by such conduct."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>Which is basically threatening their users that they will use the information they collect to dox anyone who says bad things about their software. This is possibly the most anti-user statement that I have read in a privacy policy.</p>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>When WebDiscover is started, it will begin making requests to <code>ec2-54-191-159-75.us-west-2.compute.amazonaws.com</code></p>
|
||||
<p>This is presumably how it collects a lot of the personal information about its users. This was discovered using Microsoft Network Monitor 3.4.</p>
|
||||
<hr></hr>
|
||||
<div class="center">
|
||||
<h4>Sources</h4>
|
||||
<p><a name="1">1.</a>
|
||||
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/Orpq6">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/8ZIAk?kreymer=false">[ghostarchive.org]</a></p>
|
||||
<p><a name="2">2.</a>
|
||||
<a href="https://www.pcrisk.com/removal-guides/9153-discover-browser-adware">WebDiscover removal instructions</a>
|
||||
<a href="http://archive.is/bE7Qe">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/5FLVA">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<hr></hr>
|
||||
<p>This article was last edited on 8/4/2018</p>
|
||||
<hr></hr>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||
<title>WebDiscover - Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<img src="../images/webdiscover_logo.png" alt="Webdiscover logo">
|
||||
<h1>WebDiscover</h1>
|
||||
<p>WebDiscover is a web browser made by WebDiscover Media.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>WebDiscover uses the spyware search engine <a href="../articles/yahoo.html">Yahoo</a> as it's default search engine, but on its website it says it uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search engine. It is hard to review since every time I run it, it messes up MITMproxy so I can't see what it's doing. The privacy policy explains that it collects a large amount of personal information from its users, so it is at least not a secret that this browser is spyware. This program acts in a very suspicious way and the privacy policy contains a lot of language in it about the use of the information it collects that elevates it to a <b><span class="red">uniquely bad stance on user privacy and use of user information</span></b>, so I would recommend staying far away from it.</p>
|
||||
<h3>WebDiscover installs itself onto users computers through installer bundling</h3>
|
||||
<p>WebDiscover is mostly installed through other programs as an opt-out. This means that most users did not want to install this browser, and were tricked into doing it by other software's installer programs. For example<sup><a href="#2">[2]</a></sup>: <a href="../images/wd1.jpg">[1]</a> <a href="../images/wd2.jpg">[2]</a> <a href="../images/wd3.jpg">[3]</a> <a href="../images/wd4.jpg">[4]</a> <a href="../images/wd5.jpg">[5]</a> <a href="../images/wd6.jpg">[6]</a> <a href="../images/wd7.jpg">[7]</a> <a href="../images/wd8.jpg">[8]</a> <a href="../images/wd9.jpg">[9]</a> <a href="../images/cdex_bundling.png">[10]</a></p>
|
||||
<h3>WebDiscover collects a large amount of information about its users</h3>
|
||||
<p>According to its privacy policy<sup><a href="#1">[1]</a></sup>, WebDiscover collects the following information about its users as its browser is downloaded and used:</p>
|
||||
<ul>
|
||||
<li>Web Browser type</li>
|
||||
<li>Operating System type and version</li>
|
||||
<li>Domain Name</li>
|
||||
<li>Browser version</li>
|
||||
<li>Browser usage and statistics</li>
|
||||
</ul>
|
||||
<p>Some of this information is typical of the kind of info that is collected by developers who write programs that phone home using the HTTP protocol. However, WebDiscover also collects the following information about its users which is more concerning:</p>
|
||||
<p><i>"We may collect Personal Data and Anonymous Data when you download the Browser. We may also collect Personal Data when you send us information or communications directly. “Personal Data” means data that allows someone to identify or contact you including, without limitation, your name, physical address, electronic mail (email) address, phone number, and credit card information (collectively, your “Personal Data”) for the purposes of recording the transaction when you engage in activities on the Site or through use of the Browser."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>So, WebDiscover will profile your computer, and WebDiscover Media will use every opportunity they get to collect information about you.</p>
|
||||
<h3>WebDiscover sells information about its users</h3>
|
||||
<p>In this quote from the privacy policy:</p>
|
||||
<p><i>"We may share Anonymous Data with selected third parties and business partners..."</i></p>
|
||||
<p>Confirming that the information that WebDiscover collects about you will be sold to advertisers.</p>
|
||||
<h3>WebDiscover uses your personal information in a malicious way</h3>
|
||||
<p>WebDiscover sells your information to advertising companies that will send you junk mail separately from WebDiscover's discretion- it also DOES NOT comply with requests to stop contact, and requires you to separately request each company that it has sold your information to, to stop contacting you. I didn't check if they would comply with those requests or not. The following quotes from the privacy policy should explain this:</p>
|
||||
<p><i>"To opt-out of having future third-party marketing communications sent to you, you will be required to unsubscribe with the applicable third party providers. Despite your request to no longer receive future newsletters or promotional and marketing communications from us, we reserve the right to continue to send you notices of any updates to the Browser, our Software End User License Agreement, and our Privacy Policy."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>WebDiscover also claims that anyone who acts in a way that "damages the reputation" of their company will have all of the personal information that WebDiscover has collected about them disclosed to any party at their discretion.</p>
|
||||
<p><i>"If we determine, in our sole discretion, that you have engaged in conduct which might be considered, unlawful, fraudulent, or which might harm or damage the reputation or standing of WebDiscover Media with either the general public or with a business partner or potential business partner of WebDiscover Media, we reserve the right to release your Personal Information to such persons or third parties as we consider necessary in order to prevent you from causing injury to, or otherwise injuring or interfering, now or in the future, with WebDiscover Media' rights, property or operations or otherwise the rights, property or operations of anyone else who could be harmed by such conduct."</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>Which is basically threatening their users that they will use the information they collect to dox anyone who says bad things about their software. This is possibly the most anti-user statement that I have read in a privacy policy.</p>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>When WebDiscover is started, it will begin making requests to <code>ec2-54-191-159-75.us-west-2.compute.amazonaws.com</code></p>
|
||||
<p>This is presumably how it collects a lot of the personal information about its users. This was discovered using Microsoft Network Monitor 3.4.</p>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<h4>Sources</h4>
|
||||
<p><a name="1">1.</a>
|
||||
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
|
||||
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/Orpq6">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/8ZIAk?kreymer=false">[ghostarchive.org]</a></p>
|
||||
<p><a name="2">2.</a>
|
||||
<a href="https://www.pcrisk.com/removal-guides/9153-discover-browser-adware">WebDiscover removal instructions</a>
|
||||
<a href="http://archive.is/bE7Qe">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/5FLVA">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<hr/>
|
||||
<p>This article was last edited on 8/4/2018</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,77 +1,51 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Yahoo! Search — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/yahoo_logo.png" alt="Yahoo Logo">
|
||||
<h1>Yahoo! Search</h1>
|
||||
<p>
|
||||
Yahoo! search is a search engine made by Yahoo.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your
|
||||
internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)
|
||||
</p>
|
||||
<p>
|
||||
It's important to notice that this is <b><font color=red>just scratching the surface</font></b> at the extent of spying that the Oath
|
||||
spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search.
|
||||
</p>
|
||||
<h3>Integration into the "Yahoo Account" spyware platform and tracking internet history</h3>
|
||||
<p>
|
||||
Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search
|
||||
is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that
|
||||
they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your
|
||||
use of its services, so that you will be tracked through your usage of them, whether you have an account or not.
|
||||
</p>
|
||||
<h3>Tracking users</h3>
|
||||
<p>
|
||||
The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet:
|
||||
</p>
|
||||
<p><i>
|
||||
"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#1">[1]</a></sup>
|
||||
</i></p>
|
||||
<h3>Selling user information to advertisers</h3>
|
||||
<p>
|
||||
The Oath privacy policy clearly states that the information it collects from you is shared with advertisers:
|
||||
</p>
|
||||
<p><i>
|
||||
"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p><i>
|
||||
"We also may use the information we have about you for the following purposes: ... <br>
|
||||
Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br>
|
||||
Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br>
|
||||
Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>
|
||||
A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a>
|
||||
<a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a>
|
||||
<a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/3/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/yahoo_logo.png" alt="Yahoo Logo"/>
|
||||
<h1>Yahoo! Search</h1>
|
||||
<p>Yahoo! search is a search engine made by Yahoo.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)</p>
|
||||
<p>It's important to notice that this is <b><span class="red">just scratching the surface</span></b> at the extent of spying that the Oath spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search.</p>
|
||||
<h3>Integration into the "Yahoo Account" spyware platform and tracking internet history</h3>
|
||||
<p>Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your use of its services, so that you will be tracked through your usage of them, whether you have an account or not.</p>
|
||||
<h3>Tracking users</h3>
|
||||
<p>The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet:</p>
|
||||
<p><i>"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#s1">[1]</a></sup></i></p>
|
||||
<h3>Selling user information to advertisers</h3>
|
||||
<p>The Oath privacy policy clearly states that the information it collects from you is shared with advertisers:</p>
|
||||
<p><i>"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p><i> "We also may use the information we have about you for the following purposes: ... <br/>
|
||||
Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br/>
|
||||
Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br/>
|
||||
Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a> <a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a> <a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/3/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,114 +1,56 @@
|
|||
<!DOCTYPE HTML>
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<meta charset="UTF-8">
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>YouTube — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/youtube_logo.png" alt="youtube logo">
|
||||
<h1>YouTube</h1>
|
||||
<p>
|
||||
YouTube is an American video-sharing website headquartered in San Bruno, California. It is owned by <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Google’s business strategy with YouTube relies on tracking user’s device identifiers, location, search history, IP addresses and other personally identifying data to provide to advertisers. Google discloses in their YouTube privacy policy that it collects many types of personal information, including geolocation, unique device identifiers, mobile telephone numbers, and persistent identifiers used to recognize a user over time and across different websites or online services.<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<h3>Integration with Google Tracking</h3>
|
||||
<p>
|
||||
YouTube is integrated with Google’s suite of advertising technologies and services, including AdWords, DoubleClick, and Google Preferred. DoubleClick is “an advertising serving and tracking company that uses web cookies to track browsing behavior online by their IP address to deliver targeted ads. Other DoubleClick ad technologies used to target YouTube users include the Campaign Manager, which helps advertisers “identify, locate and understand your customers, wherever they are.”<sup><a href="#2">[2]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
You can find that Google operates tracking domains active on the YouTube page, “pubads.g.doubleclick.net” and “googleads.g.doubleclick.net” in addition to three cookies requested by *.youtube.com. YouTube serves a particular tracking cookie, “VISITOR_INFO1_LIVE” in order to continue monitoring users that have signed out of their account and to continue serving recommended videos related to that session. Of course, while you are logged in to any Google service, Google can track you with absolute precision. <sup><a href="#3">[3]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
The YouTube app for android additionally uses the Google Firebase Analytics tracker which provides methods for logging events and setting user properties. The full app report finds that the YouTube app employs three trackers and requires 33 permission, 14 of which are considered dangerous such as access to the user’s location and contacts.
|
||||
<sup><a href="#4">[4]</a></sup><sup><a href="#5">[5]</a></sup>
|
||||
</p>
|
||||
<h3>Taking down more private alternatives</h3>
|
||||
<p>
|
||||
For some time, a popular YouTube tracking sanitizer, Hooktube.com was a useful resource for accessing YouTube videos without being subjected to Google’s surveillance techniques in full. Hooktube was also useful for circumventing region blocking. However, Google, not to be stopped in their spying endeavors, served Hooktube’s operators with a cease and desist over their use of the YouTube API. Hooktube was effectively forced to use YouTube’s official embedded player if they wished to continue to operate, nullifying Hooktube as a viable means for privately viewing YouTube content.<sup><a href="#6">[6]</a></sup><sup><a href="#7">[7]</a></sup>
|
||||
</p>
|
||||
<h3>YouTube Requires non-free JavaScript</h3>
|
||||
<p>
|
||||
It is also worth noting that, in order to function, YouTube requires visitors to run non-free JavaScript. As with any proprietary software, these programs can be doing just about anything with almost no way to determine exactly what.<sup><a href="#10">[10]</a></sup> For example, there has been some speculation as to whether YouTube’s compulsory JavaScript might be useful for YouTube to track your device’s unique MAC address. <sup><a href="#8">[8]</a></sup><sup><a href="#9">[9]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
All that said, it would be wise to avoiding using any of Google’s services. If you must access YouTube, we recommend doing so through one of the remaining sanitizers such as Invidious (<a href="https://invidious.io/">https://invidious.io/</a>).
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Credits</h2>
|
||||
<p>
|
||||
This review was written by Alia Sarmor.<br>
|
||||
Formatting changes were done by the site maintainer.
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://policies.google.com/privacy">Google Privacy policy</a>
|
||||
<a href="https://archive.li/U4mQP">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/v">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://www.commercialfreechildhood.org/sites/default/files/devel-generate/tiw/youtubecoppa.pdf">Request to Investigate Google’s YouTube Online Service...</a>
|
||||
<a href="http://web.archive.org/web/20180816062432/https://www.commercialfreechildhood.org/sites/default/files/devel-generate/tiw/youtubecoppa.pdf">[web.archive.org]</a>
|
||||
<br>
|
||||
<a name="3">3.</a>
|
||||
<a href="https://security.stackexchange.com/questions/165842/stop-youtube-tracking-when-signed-out">Stop YouTube tracking when signed out</a>
|
||||
<a href="http://web.archive.org/web/20180910190055/https://security.stackexchange.com/questions/165842/stop-youtube-tracking-when-signed-out">[web.archive.org]</a>
|
||||
<a href="https://archive.fo/ri7xa">[archive.fo]</a>
|
||||
<a href="https://ghostarchive.org/archive/hyLbx">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="4">4.</a>
|
||||
<a href="https://reports.exodus-privacy.eu.org/reports/11758/">Youtube Android App Permissions</a>
|
||||
<a href="http://web.archive.org/web/20180910190242/https://reports.exodus-privacy.eu.org/reports/11758/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/dDPMD">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="5">5.</a>
|
||||
<a href="https://firebase.google.com/docs/reference/android/com/google/firebase/analytics/package-summary">com.google.firebase.analytics </a>
|
||||
<a href="http://web.archive.org/web/20170307052724/https://firebase.google.com/docs/reference/android/com/google/firebase/analytics/package-summary">[web.archive.org]</a>
|
||||
<a href="http://archive.is/N5qvH">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/ve4xC">[ghostarchive.org]</a><br>
|
||||
<a name="6">6.</a>
|
||||
<a href="https://twitter.com/swack/status/1018665375364501506">@swack on Twitter</a>
|
||||
<a href="https://archive.fo/bXAoK">[archive.fo]</a>
|
||||
<a href="https://ghostarchive.org/archive/nAaS8">[ghostarchive.org]</a><br>
|
||||
<a name="7">7.</a>
|
||||
<a href="https://github.com/FreeTubeApp/FreeTube/releases">FreeTube Releases</a>
|
||||
<a href="http://web.archive.org/web/20180724155631/https://github.com/FreeTubeApp/FreeTube/releases">[web.archive.org]</a>
|
||||
<a href="https://via.hypothes.is/https://github.com/FreeTubeApp/FreeTube/releases">[via.hypothes.is]</a>
|
||||
<a href="http://archive.is/Sei5n">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/gWhyz">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="8">8.</a>
|
||||
<a href="https://www.blackhatworld.com/seo/does-youtube-track-our-mac-address.197618/">Does Youtube track our Mac address??</a>
|
||||
<a href="http://web.archive.org/web/20161010063335/http://www.blackhatworld.com:80/seo/does-youtube-track-our-mac-address.197618/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/jct3G">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="9">9.</a>
|
||||
<a href="https://www.stormfront.org/forum/t900258/?postcount=9#post10428507">How does YouTube know what I've been watching?</a>
|
||||
<a href="http://web.archive.org/web/20180910193256/https://www.stormfront.org/forum/t900258/?postcount=9%23post10428507">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/mMcli">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="10">10.</a>
|
||||
<a href="https://www.fsf.org/youtube">Does the FSF use YouTube? </a>
|
||||
<a href="https://web.archive.org/web/20171223035419/http://www.fsf.org/youtube/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/2T8cp?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was created on 9/10/2018<br>
|
||||
This article was last updated on 6/19/2021
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/youtube_logo.png" alt="youtube logo"/>
|
||||
<h1>YouTube</h1>
|
||||
<p>YouTube is an American video-sharing website headquartered in San Bruno, California. It is owned by <a href="../articles/google.html">Google</a>.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Google’s business strategy with YouTube relies on tracking user’s device identifiers, location, search history, IP addresses and other personally identifying data to provide to advertisers. Google discloses in their YouTube privacy policy that it collects many types of personal information, including geolocation, unique device identifiers, mobile telephone numbers, and persistent identifiers used to recognize a user over time and across different websites or online services.<sup><a href="#s1">[1]</a></sup></p>
|
||||
<h3>Integration with Google Tracking</h3>
|
||||
<p>YouTube is integrated with Google’s suite of advertising technologies and services, including AdWords, DoubleClick, and Google Preferred. DoubleClick is “an advertising serving and tracking company that uses web cookies to track browsing behavior online by their IP address to deliver targeted ads. Other DoubleClick ad technologies used to target YouTube users include the Campaign Manager, which helps advertisers “identify, locate and understand your customers, wherever they are.”<sup><a href="#s2">[2]</a></sup></p>
|
||||
<p>You can find that Google operates tracking domains active on the YouTube page, “pubads.g.doubleclick.net” and “googleads.g.doubleclick.net” in addition to three cookies requested by *.youtube.com. YouTube serves a particular tracking cookie, “VISITOR_INFO1_LIVE” in order to continue monitoring users that have signed out of their account and to continue serving recommended videos related to that session. Of course, while you are logged in to any Google service, Google can track you with absolute precision. <sup><a href="#s3">[3]</a></sup></p>
|
||||
<p>The YouTube app for android additionally uses the Google Firebase Analytics tracker which provides methods for logging events and setting user properties. The full app report finds that the YouTube app employs three trackers and requires 33 permission, 14 of which are considered dangerous such as access to the user’s location and contacts.<sup><a href="#s4">[4]</a></sup><sup><a href="#s5">[5]</a></sup></p>
|
||||
<h3>Taking down more private alternatives</h3>
|
||||
<p>For some time, a popular YouTube tracking sanitizer, Hooktube.com was a useful resource for accessing YouTube videos without being subjected to Google’s surveillance techniques in full. Hooktube was also useful for circumventing region blocking. However, Google, not to be stopped in their spying endeavors, served Hooktube’s operators with a cease and desist over their use of the YouTube API. Hooktube was effectively forced to use YouTube’s official embedded player if they wished to continue to operate, nullifying Hooktube as a viable means for privately viewing YouTube content.<sup><a href="#s6">[6]</a></sup><sup><a href="#s7">[7]</a></sup></p>
|
||||
<h3>YouTube Requires non-free JavaScript</h3>
|
||||
<p>It is also worth noting that, in order to function, YouTube requires visitors to run non-free JavaScript. As with any proprietary software, these programs can be doing just about anything with almost no way to determine exactly what.<sup><a href="#s10">[10]</a></sup> For example, there has been some speculation as to whether YouTube’s compulsory JavaScript might be useful for YouTube to track your device’s unique MAC address. <sup><a href="#s8">[8]</a></sup><sup><a href="#s9">[9]</a></sup></p>
|
||||
<p>All that said, it would be wise to avoiding using any of Google’s services. If you must access YouTube, we recommend doing so through one of the remaining sanitizers such as Invidious (<a href="https://invidious.io/">https://invidious.io/</a>).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://policies.google.com/privacy">Google Privacy policy</a> <a href="https://archive.li/U4mQP">[archive.li]</a> <a href="https://ghostarchive.org/archive/v">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://www.commercialfreechildhood.org/sites/default/files/devel-generate/tiw/youtubecoppa.pdf">Request to Investigate Google’s YouTube Online Service...</a> <a href="http://web.archive.org/web/20180816062432/https://www.commercialfreechildhood.org/sites/default/files/devel-generate/tiw/youtubecoppa.pdf">[web.archive.org]</a></li>
|
||||
<li id="s3"><a href="https://security.stackexchange.com/questions/165842/stop-youtube-tracking-when-signed-out">Stop YouTube tracking when signed out</a> <a href="http://web.archive.org/web/20180910190055/https://security.stackexchange.com/questions/165842/stop-youtube-tracking-when-signed-out">[web.archive.org]</a> <a href="https://archive.fo/ri7xa">[archive.fo]</a> <a href="https://ghostarchive.org/archive/hyLbx">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://reports.exodus-privacy.eu.org/reports/11758/">Youtube Android App Permissions</a> <a href="http://web.archive.org/web/20180910190242/https://reports.exodus-privacy.eu.org/reports/11758/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/dDPMD">[ghostarchive.org]</a></li>
|
||||
<li id="s5"><a href="https://firebase.google.com/docs/reference/android/com/google/firebase/analytics/package-summary">com.google.firebase.analytics </a> <a href="http://web.archive.org/web/20170307052724/https://firebase.google.com/docs/reference/android/com/google/firebase/analytics/package-summary">[web.archive.org]</a> <a href="http://archive.is/N5qvH">[archive.is]</a> <a href="https://ghostarchive.org/archive/ve4xC">[ghostarchive.org]</a></li>
|
||||
<li id="s6"><a href="https://twitter.com/swack/status/1018665375364501506">@swack on Twitter</a> <a href="https://archive.fo/bXAoK">[archive.fo]</a> <a href="https://ghostarchive.org/archive/nAaS8">[ghostarchive.org]</a></li>
|
||||
<li id="s7"><a href="https://github.com/FreeTubeApp/FreeTube/releases">FreeTube Releases</a> <a href="http://web.archive.org/web/20180724155631/https://github.com/FreeTubeApp/FreeTube/releases">[web.archive.org]</a> <a href="https://via.hypothes.is/https://github.com/FreeTubeApp/FreeTube/releases">[via.hypothes.is]</a> <a href="http://archive.is/Sei5n">[archive.is]</a> <a href="https://ghostarchive.org/archive/gWhyz">[ghostarchive.org]</a></li>
|
||||
<li id="s8"><a href="https://www.blackhatworld.com/seo/does-youtube-track-our-mac-address.197618/">Does Youtube track our Mac address??</a> <a href="http://web.archive.org/web/20161010063335/http://www.blackhatworld.com:80/seo/does-youtube-track-our-mac-address.197618/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/jct3G">[ghostarchive.org]</a></li>
|
||||
<li id="s9"><a href="https://www.stormfront.org/forum/t900258/?postcount=9#post10428507">How does YouTube know what I've been watching?</a> <a href="http://web.archive.org/web/20180910193256/https://www.stormfront.org/forum/t900258/?postcount=9%23post10428507">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/mMcli">[ghostarchive.org]</a></li>
|
||||
<li id="s10"><a href="https://www.fsf.org/youtube">Does the FSF use YouTube? </a> <a href="https://web.archive.org/web/20171223035419/http://www.fsf.org/youtube/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/2T8cp?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was created on 9/10/2018</b>
|
||||
<br/>
|
||||
<b>This article was last updated on 6/19/2021</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<!DOCTYPE HTML>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css">
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>YouTube — Spyware Watchdog</title>
|
||||
</head>
|
||||
|
|
Loading…
Reference in New Issue