Merge pull request 'add a new section' (#24) from baobab/SpywareWatchdog:master into master
Reviewed-on: https://codeberg.org/TheShadow/SpywareWatchdog/pulls/24
This commit is contained in:
commit
cf7ac969e6
|
@ -0,0 +1,44 @@
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||||
|
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||||
|
<head>
|
||||||
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||||
|
<link rel="icon" href = "../images/favicon.ico"/>
|
||||||
|
<title>HTTP - Spyware Watchdog</title>
|
||||||
|
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div class="case">
|
||||||
|
<div class="nav">
|
||||||
|
<a href="index.html">← Catalog</a>
|
||||||
|
</div>
|
||||||
|
<div class="main">
|
||||||
|
<img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/>
|
||||||
|
<h1>HyperText Transmission Protocol</h1>
|
||||||
|
<p>HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.</p>
|
||||||
|
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||||
|
<p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p>
|
||||||
|
<h3>"User-Agent" Datamining feature</h3>
|
||||||
|
<p>Section 14.43<sup><a href="#one">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
|
||||||
|
<p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p>
|
||||||
|
<h3>Acknowledgement of HTTP's privacy problem</h3>
|
||||||
|
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#two">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
|
||||||
|
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
|
||||||
|
</div>
|
||||||
|
<hr></hr>
|
||||||
|
<div class="center">
|
||||||
|
<h2>Sources</h2>
|
||||||
|
<p><a id="one">1.</a><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a></p>
|
||||||
|
<p><a id="two">2.</a><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a></p>
|
||||||
|
<hr></hr>
|
||||||
|
<p>This article was created on 5/14/2018</p>
|
||||||
|
<p>This article was lasted edited on 10/11/2020</p>
|
||||||
|
<hr></hr>
|
||||||
|
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/TheShadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||||
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
|
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -64,7 +64,6 @@
|
||||||
<a href="../articles/discord.html">Discord</a>
|
<a href="../articles/discord.html">Discord</a>
|
||||||
<a href="../articles/discord_es.html">[Espanol]</a><br></br>
|
<a href="../articles/discord_es.html">[Espanol]</a><br></br>
|
||||||
<a href="../articles/thunderbird.html">Mozilla Thunderbird</a><br></br>
|
<a href="../articles/thunderbird.html">Mozilla Thunderbird</a><br></br>
|
||||||
<a href="../articles/telegram.html">Telegram</a><br></br>
|
|
||||||
<a href="../articles/hexchat.html">Hexchat</a><br></br>
|
<a href="../articles/hexchat.html">Hexchat</a><br></br>
|
||||||
</div>
|
</div>
|
||||||
<hr></hr>
|
<hr></hr>
|
||||||
|
@ -104,6 +103,12 @@
|
||||||
<a href="../articles/cdex.html">CDex</a><br></br>
|
<a href="../articles/cdex.html">CDex</a><br></br>
|
||||||
<a href="../articles/paint.net.html">Paint.NET</a><br></br>
|
<a href="../articles/paint.net.html">Paint.NET</a><br></br>
|
||||||
</div>
|
</div>
|
||||||
|
<hr></hr>
|
||||||
|
<h2>Not Spyware but Has Privacy Issues</h2>
|
||||||
|
<div class="directory-list">
|
||||||
|
<a href="../articles/telegram.html">Telegram</a><br></br>
|
||||||
|
<a href="../articles/http.html">HyperText Transmission Protocol</a><br></br>
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,60 +1,45 @@
|
||||||
<!--Old Style-->
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
<!DOCTYPE HTML>
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
||||||
<html lang=”en-us”>
|
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
<link rel="stylesheet" href="../style.css">
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
<meta charset="UTF-8">
|
<meta name="viewport" content="width=device-width,initial-scale=1"/>
|
||||||
<title>Telegram — Spyware Watchdog</title>
|
<link rel="icon" href = "../images/favicon.ico"/>
|
||||||
</head>
|
<title>Telegram - Spyware Watchdog</title>
|
||||||
<body>
|
<link href="../style.css" rel="stylesheet" type="text/css" media="all"/>
|
||||||
<img src="../images/telegram_logo.png" alt="Telegram Logo">
|
</head>
|
||||||
<h1>Telegram</h1>
|
<body>
|
||||||
<p>
|
<div class="case">
|
||||||
Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.
|
<div class="nav">
|
||||||
</p>
|
<a href="index.html">← Catalog</a>
|
||||||
<h2>Spyware Level: <font color="yellow">Medium</font></h2>
|
</div>
|
||||||
<p>
|
<div class="main">
|
||||||
Telegram has some spyware features in it such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.
|
<img src="../images/telegram_logo.png" alt="Telegram Logo"/>
|
||||||
</p>
|
<h1>Telegram</h1>
|
||||||
<h3>Telephone Number Required</h3>
|
<p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p>
|
||||||
<p>
|
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||||
Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.
|
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.</p>
|
||||||
</p>
|
<h3>Telephone Number Required</h3>
|
||||||
<h3>Centralized communication routing</h3>
|
<p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p>
|
||||||
<p>
|
<h3>Centralized communication routing</h3>
|
||||||
Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy<sup><a href="#1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.
|
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#one">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
|
||||||
</p>
|
<p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p>
|
||||||
<p>
|
<h3>Telegram does not follow its GPLv2 Obligations</h3>
|
||||||
Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because
|
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#two">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
|
||||||
of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.
|
</div>
|
||||||
</p>
|
<hr></hr>
|
||||||
<h3>Telegram does not follow its GPLv2 Obligations</h3>
|
<div class="center">
|
||||||
<p>
|
<h2>Sources</h2>
|
||||||
Telegram clients are advertised as free software, but in practice the source code is not immediately accessible<sup><a href="#2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.
|
<p><a id="one">1.</a><a href="https://telegram.org/privacy">Telegram Privacy Policy</a> <a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a></p>
|
||||||
</p>
|
<p><a id="two">2.</a><a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a> <a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a></p>
|
||||||
<hr>
|
<hr></hr>
|
||||||
<center>
|
<p>This article was created on 2/18/2019</p>
|
||||||
<h2>Sources</h2>
|
<p>This article was lasted edited on 10/11/2020</p>
|
||||||
<p>
|
<hr></hr>
|
||||||
<a name="1">1.</a>
|
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/TheShadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||||
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
<a href="https://web.archive.org/web/20180528161128/https://telegram.org/privacy">[web.archive.org]</a>
|
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
<a href="https://archive.is/Rn64n">[archive.is]</a><br>
|
</div>
|
||||||
|
</div>
|
||||||
<a name="2">2.</a>
|
</body>
|
||||||
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
|
|
||||||
<a href="https://archive.li/2018.05.29-092521/https://github.com/overtake/TelegramSwift/issues/163">[archive.li]</a><br>
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 2/18/2019
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
|
||||||
</html>
|
</html>
|
Loading…
Reference in New Issue