Full restyling articles Part 2

This commit is contained in:
codddfeea 2022-04-23 12:25:34 +03:00
parent 09095d1cb6
commit dce0acbc31
19 changed files with 630 additions and 840 deletions

View File

@ -29,7 +29,7 @@
</div> </div>
<div class="footer"> <div class="footer">
<div class="futher"> <div class="futher">
<h4>Further Reading</h4> <h4>Further Reading:</h4>
<ol> <ol>
<li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li> <li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li> <li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>

View File

@ -1,104 +1,100 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Google Search — Spyware Watchdog</title> <title>Google Search — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/google_logo.png" alt="Google logo"> <div class="case">
<h1>Google Search</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>. <img src="../images/google_logo.png" alt="Google logo"/>
</p> <h1>Google Search</h1>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <p>
<p> Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
Google Search collects your personal information and is heavily integrated with other services that collect your personal information. </p>
Google's privacy policy<sup><a href="#1">[1]</a></sup> is written in a way that does not tell you which Google services are <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is <p>
to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed. Google Search collects your personal information and is heavily integrated with other services that collect your personal information.
</p> Google's privacy policy<sup><a href="#s1">[1]</a></sup> is written in a way that does not tell you which Google services are
<p> collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is
It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed.
does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects </p>
your information, so it is really not trying to be very detailed because it would not say anything new. <p>
</p> It's also important to note that this article only exists to provide a basic run-down on Google's spying, and is just here for completeness. It
<h3>Google Search records your searches</h3> does not at all represent the full extent of Google's breaches of privacy, just because it is not really a secret to anyone that Google collects
<p> your information, so it is really not trying to be very detailed because it would not say anything new.
Searches made using Google Search are associated with your identity and recorded in Google's servers. From the </p>
privacy policy<sup><a href="#1">[1]</a></sup>, Google makes it clear that: <h3>Google Search records your searches</h3>
</p> <p>
<p><i> Searches made using Google Search are associated with your identity and recorded in Google's servers. From the
"We collect information about the services that you use and how you use them" privacy policy<sup><a href="#s1">[1]</a></sup>, Google makes it clear that:
</i></p> </p>
<p> <p><i>
Where "collect information" is clearly stated<sup><a href="#2">[2]</a></sup> as such: "We collect information about the services that you use and how you use them"
</p> </i></p>
<p><i> <p>
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><font color=red>browsing history</font></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored. Where "collect information" is clearly stated<sup><a href="#s2">[2]</a></sup> as such:
</i></p> </p>
<p> <p><i>
Google also confirms again that it stores your searches in its servers, in this quote: "This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><span class="red">browsing history</span></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
</p> </i></p>
<p> <p>
<i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs. Google also confirms again that it stores your searches in its servers, in this quote:
This includes: details of how you used our service, such as your search queries."</i> </p>
</p> <p>
<h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3> <i>"When you use our services or view content provided by Google, we automatically collect and store certain information in server logs.
<p> This includes: details of how you used our service, such as your search queries."</i>
In this page of Google's privacy policy<sup><a href="#2">[2]</a></sup>, Google confirms that </p>
they create profiles of their users interests: <h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3>
</p> <p>
<p><i> In this page of Google's privacy policy<sup><a href="#s2">[2]</a></sup>, Google confirms that
"For example, we may use...information in your web history cookies to provide you with more relevant search results." they create profiles of their users interests:
</i></p> </p>
<p> <p><i>
It's important to note that Google <b>does not</b> think that your search history is personal information, as long as it is not attached to your name. "For example, we may use...information in your web history cookies to provide you with more relevant search results."
It does share this information with advertisers, as long as it is "not identifiable": </i></p>
</p> <p>
<p><i> It's important to note that Google <b>does not</b> think that your search history is personal information, as long as it is not attached to your name.
"We may share non-personally identifiable information publicly and with our partners like publishers, advertisers or connected sites. For example, we may share information publicly to show trends about the general use of our services." It does share this information with advertisers, as long as it is "not identifiable":
</i></p> </p>
<h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3> <p><i>
<p> "We may share non-personally identifiable information publicly and with our partners like publishers, advertisers or connected sites. For example, we may share information publicly to show trends about the general use of our services."
Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform </i></p>
exists to collect personal information, and connects its users to other spyware services in the Google ecosystem. <h3>Google Search is integrated into the "Google Accounts" spyware platform.</h3>
It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services <p>
to one user, increasing the accuracy of their internal profile of you. Google search allows you to sign-in using an account made on the Google Accounts spyware platform. This platform
</p> exists to collect personal information, and connects its users to other spyware services in the Google ecosystem.
<hr> It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services
<center> to one user, increasing the accuracy of their internal profile of you.
<h2>Further Reading</h2> </p>
<p> </div>
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br> <hr/>
<a href="https://stallman.org/google.html">Reasons not to use Google</a><br> <div class="footer">
</p> <div class="futher">
<hr> <h4>Further Reading:</h4>
<h2>Sources</h2> <ol>
<p> <li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
<a name="1">1.</a> <li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>
<a href="https://policies.google.com/privacy">Google Privacy policy</a> </ol>
<a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a> </div>
<a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a> <hr/>
<a href="https://archive.li/U4mQP">[archive.li]</a> <div class="sources">
<a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a> <h4>Sources:</h4>
<br> <ol>
<a name="2">2.</a> <li id="s1"><a href="https://policies.google.com/privacy">Google Privacy policy</a> <a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a> <a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a> <a href="https://archive.li/U4mQP">[archive.li]</a> <a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a></li>
<a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a> <li id="s2"><a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a> <a href="https://archive.li/Hthpb">[archive.li]</a> <a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a></li>
<a href="https://archive.li/Hthpb">[archive.li]</a> </ol>
<a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a> </div>
<br> <hr/>
</p> <b>This article was last edited on 12/12/2018</b>
<hr> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p><b> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
This article was last edited on 12/12/2018 <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</b></p> </div>
<p> </div>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,41 +1,36 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>GZDoom — Spyware Watchdog</title> <title>GZDoom — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo"> <div class="case">
<h1>GZDoom</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
GZDoom is a source port of Doom based on an older source port, ZDoom. <img src="../images/gzdoom_logo.png" alt="GZDoom Logo"/>
</p> <h1>GZDoom</h1>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2> <p>GZDoom is a source port of Doom based on an older source port, ZDoom.</p>
<p> <h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#1">[1]</a></sup>. <p>GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#s1">[1]</a></sup>. GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.</p>
GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you </div>
should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future. <hr/>
</p> <div class="footer">
<hr> <div class="sources">
<center> <h4>Sources:</h4>
<h2>Sources</h2> <ol>
<p> <li id="s1"><a href="https://forum.zdoom.org/viewtopic.php?f=49&amp;t=59787">GZStats: A quick rundown</a> <a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&amp;t=59787">[web.archive.org]</a> <a href="https://archive.is/2cTl4">[archive.is]</a></li>
<a name="1">1.</a> </ol>
<a href="https://forum.zdoom.org/viewtopic.php?f=49&t=59787">GZStats: A quick rundown</a> </div>
<a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&t=59787">[web.archive.org]</a> <hr/>
<a href="https://archive.is/2cTl4">[archive.is]</a><br> <b>This article was last edited on 5/30/2018</b>
</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<hr> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<p><b> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
This article was last edited on 5/30/2018 </div>
</b></p> </div>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,28 +1,28 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Hexchat — Spyware Watchdog</title> <title>Hexchat — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"> <div class="case">
<h1>Hexchat</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems. <img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
</p> <h1>Hexchat</h1>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <p>HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.</p>
<p> <h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store. <p>Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store.</p>
</p> </div>
<hr> <hr/>
<center> <div class="footer">
<p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted. <p>All contributions must be licensed under the CC0 license to be accepted.</p>
</p> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a> </div>
<p><a href="../articles/index.html">Back to catalog</a></p> </div>
</center>
</body> </body>
</html> </html>

View File

@ -1,28 +1,26 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="ru" xml:lang="ru">
<head> <head>
<link rel="stylesheet" href="../style.css"/>
<meta charset="UTF-8">
<title>Hexchat — Spyware Watchdog</title> <title>Hexchat — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"> <div class="case">
<h1>Hexchat</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем. <img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
</p> <h1>Hexchat</h1>
<h2>Уровень слежки: <font color=lime>Нет</font></h2> <p>HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем.</p>
<p> <h2>Уровень слежки: <span class="lime">Нет</span></h2>
Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store. <p>Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store.</p>
</p> </div>
<hr> <hr/>
<center> <div class="footer">
<p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted. <p>All contributions must be licensed under the CC0 license to be accepted.</p>
</p> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a> </div>
<p><a href="../articles/index.html">Обратно в каталог</a></p> </div>
</center>
</body> </body>
</html> </html>

View File

@ -9,42 +9,34 @@
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<a href="index.html">&larr; Catalog</a> <div class="main">
</div>
<div class="main">
<img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/> <img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/>
<h1>HyperText Transmission Protocol</h1> <h1>HyperText Transmission Protocol</h1>
<p>HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.</p> <p>HTTP is a protocol usually used for transferring HyperText Markup Language documents accross the internet.</p>
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2> <h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
<p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p> <p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p>
<h3>"User-Agent" Datamining feature</h3> <h3>"User-Agent" Datamining feature</h3>
<p>Section 14.43<sup><a href="#one">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p> <p>Section 14.43<sup><a href="#s1">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
<p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p> <p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p>
<h3>Acknowledgement of HTTP's privacy problem</h3> <h3>Acknowledgement of HTTP's privacy problem</h3>
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#two">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p> <p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#s2">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p> <p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
</div> </div>
<hr/> <hr/>
<div class="center"> <div class="footer">
<h2>Sources</h2> <div class="sources">
<p> <h4>Sources:</h4>
<a id="one">1.</a> <ol>
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a> <li id="s1"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a></li>
<a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a> <li id="s2"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a></li>
<a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a> </ol>
</p> </div>
<p>
<a id="two">2.</a>
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a>
<a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a>
<a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a>
</p>
<hr/> <hr/>
<p>This article was created on 5/14/2018</p> <b>This article was created on 5/14/2018</b>
<p>This article was lasted edited on 10/11/2020</p> <br/>
<hr/> <b>This article was lasted edited on 10/11/2020</b>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div> </div>

View File

@ -1,45 +1,38 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>GNU IceCat — Spyware Watchdog</title> <title>GNU IceCat — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/icecat_logo.png" alt="icecat Logo"> <div class="case">
<h1>GNU IceCat</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>. <img src="../images/icecat_logo.png" alt="icecat Logo"/>
</p> <h1>GNU IceCat</h1>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <p>GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.</p>
<p> <h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a> <p>GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <span class="lime"><b>no unsolicited connections</b></span> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a></p>
</p> <h3>IceCat's privacy features</h3>
<h3>IceCat's privacy features</h3> <p>From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:</p>
<center> <ul>
<p> <li>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</li>
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a> <li>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</li>
</p> <li>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</li>
</center> <li>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</li>
<p>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</p> </ul>
<p>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</p> <p>As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">GNUzilla — News: IceCat 60.2.0 Pre-release</a></p>
<p>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</p> </div>
<p>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</p> <hr/>
<p> <div class="footer">
As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240"> <b>This article was last edited on 9/18/2018</b>
GNUzilla — News: IceCat 60.2.0 Pre-release</a> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
</p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<hr> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<center> </div>
<p><b> </div>
This article was last edited on 9/18/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -9,45 +9,43 @@
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"> <div class="nav"><a href="../index.html">&larr; Home</a></div>
<a href="../index.html">&larr; Home</a>
</div>
<div class="center"> <div class="center">
<h1>Spyware Watchdog Article Catalog</h1> <h1>Spyware Watchdog Article Catalog</h1>
<p>All of the articles on this website are available here!</p> <p>All of the articles on this website are available here!</p>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p> <p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
</div> </div>
<div class="directory-list"> <div class="directory-list">
<h2>Web Browsers</h2> <h2>Web Browsers</h2>
<ul> <ul>
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li> <li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li> <li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a> <a href="../articles/chrome_ptbr.html">[Português (Brasil)]</a></li> <li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a> <a href="../articles/chrome_ptbr.html">[Português (Brasil)]</a></li>
<li><a href="../articles/dissenter.html">Dissenter</a></li> <li><a href="../articles/dissenter.html">Dissenter</a></li>
<li><a href="../articles/explorer.html">Internet Explorer</a></li> <li><a href="../articles/explorer.html">Internet Explorer</a></li>
<li><a href="../articles/falkon.html">Falkon</a></li> <li><a href="../articles/falkon.html">Falkon</a></li>
<li><a href="../articles/firefox.html">Mozilla Firefox</a> <a href="../articles/firefox_es.html">[Español]</a> <a href="../guides/firefox.html">[Mitigation Guide]</a> <a href="../guides/firefox_es.html">[Guía de Mitigación]</a> </li> <li><a href="../articles/firefox.html">Mozilla Firefox</a> <a href="../articles/firefox_es.html">[Español]</a> <a href="../guides/firefox.html">[Mitigation Guide]</a> <a href="../guides/firefox_es.html">[Guía de Mitigación]</a> </li>
<li><a href="../articles/icecat.html">GNU IceCat</a> <a href="../articles/icecat_es.html">[Español]</a> <a href="../articles/icecat_it.html">[Italiano]</a></li> <li><a href="../articles/icecat.html">GNU IceCat</a> <a href="../articles/icecat_es.html">[Español]</a> <a href="../articles/icecat_it.html">[Italiano]</a></li>
<li><a href="../articles/iridium.html">Iridium Browser</a> <a href="../guides/iridium.html">[Mitigation Guide]</a></li> <li><a href="../articles/iridium.html">Iridium Browser</a> <a href="../guides/iridium.html">[Mitigation Guide]</a></li>
<li><a href="../articles/librewolf.html">Librewolf</a></li> <li><a href="../articles/librewolf.html">Librewolf</a></li>
<li><a href="../articles/lynx.html">Lynx</a> <a href="lynx_pl.html">[Polski]</a> <a href="lynx_ru.html">[Русский]</a></li> <li><a href="../articles/lynx.html">Lynx</a> <a href="lynx_pl.html">[Polski]</a> <a href="lynx_ru.html">[Русский]</a></li>
<li><a href="../articles/netsurf.html">NetSurf</a> <a href="../articles/netsurf_pl.html">[Polski]</a> <a href="../guides/netsurf.html">[Mitigation Guide]</a> <a href="../guides/netsurf_pl.html">[Poradnik Mitygacji]</a></li> <li><a href="../articles/netsurf.html">NetSurf</a> <a href="../articles/netsurf_pl.html">[Polski]</a> <a href="../guides/netsurf.html">[Mitigation Guide]</a> <a href="../guides/netsurf_pl.html">[Poradnik Mitygacji]</a></li>
<li><a href="../articles/opera.html">Opera</a></li> <li><a href="../articles/opera.html">Opera</a></li>
<li><a href="../articles/otter.html">Otter Browser</a></li> <li><a href="../articles/otter.html">Otter Browser</a></li>
<li><a href="../articles/palemoon.html">Pale Moon</a> <a href="../articles/palemoon_es.html">[Español]</a> <a href="../guides/palemoon.html">[Mitigation Guide]</a> <a href="../guides/palemoon_es.html">[Guía de Mitigación]</a></li> <li><a href="../articles/palemoon.html">Pale Moon</a> <a href="../articles/palemoon_es.html">[Español]</a> <a href="../guides/palemoon.html">[Mitigation Guide]</a> <a href="../guides/palemoon_es.html">[Guía de Mitigación]</a></li>
<li><a href="../articles/qutebrowser.html">Qutebrowser</a> <a href="../articles/qutebrowser_ru.html">[Русский]</a></li> <li><a href="../articles/qutebrowser.html">Qutebrowser</a> <a href="../articles/qutebrowser_ru.html">[Русский]</a></li>
<li><a href="../articles/seamonkey.html">SeaMonkey</a> <a href="../guides/seamonkey.html">[Mitigation Guide]</a></li> <li><a href="../articles/seamonkey.html">SeaMonkey</a> <a href="../guides/seamonkey.html">[Mitigation Guide]</a></li>
<li><a href="../articles/slimjet.html">Slimjet</a> <a href="slimjet_pl.html">[Polski]</a></li> <li><a href="../articles/slimjet.html">Slimjet</a> <a href="slimjet_pl.html">[Polski]</a></li>
<li><a href="../articles/sphere.html">Sphere Browser</a></li> <li><a href="../articles/sphere.html">Sphere Browser</a></li>
<li><a href="../articles/iron.html">SRWare Iron</a> <a href="iron_pl.html">[Polski]</a></li> <li><a href="../articles/iron.html">SRWare Iron</a> <a href="iron_pl.html">[Polski]</a></li>
<li><a href="../articles/surf.html">Surf</a> <a href="surf_fr.html">[Francais]</a> <a href="surf_pl.html">[Polski]</a> <a href="surf_ru.html">[Русский]</a></li> <li><a href="../articles/surf.html">Surf</a> <a href="surf_fr.html">[Francais]</a> <a href="surf_pl.html">[Polski]</a> <a href="surf_ru.html">[Русский]</a></li>
<li><a href="../articles/tbb.html">Tor Browser</a> <a href="../guides/tbb.html">[Mitigation Guide]</a></li> <li><a href="../articles/tbb.html">Tor Browser</a> <a href="../guides/tbb.html">[Mitigation Guide]</a></li>
<li><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></li> <li><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></li>
<li><a href="../articles/vivaldi.html">Vivaldi</a></li> <li><a href="../articles/vivaldi.html">Vivaldi</a></li>
<li><a href="../articles/waterfox_classic.html">Waterfox Classic</a></li> <li><a href="../articles/waterfox_classic.html">Waterfox Classic</a></li>
<li><a href="../articles/webbrowser.html">Web Browser</a></li> <li><a href="../articles/webbrowser.html">Web Browser</a></li>
<li><a href="../articles/webdiscover.html">WebDiscover</a></li> <li><a href="../articles/webdiscover.html">WebDiscover</a></li>
</ul> </ul>
</div> </div>
<div class="directory-list"> <div class="directory-list">
<h2>Online Content Platforms</h2> <h2>Online Content Platforms</h2>

View File

@ -1,107 +1,64 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Instagram — Spyware Watchdog</title> <title>Instagram — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <div class="case">
<img src="../images/ig_logo.png" alt="Instagram logo"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<h1>Instagram</h1> <div class="main">
<p> <img src="../images/ig_logo.png" alt="Instagram logo"/>
Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles. <h1>Instagram</h1>
</p> <p>Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p> <p>Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the service it provides.</p>
Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the <h3>It Logs Your GPS Locations from EXIF Data In Your Photos</h3>
service it provides.</p> <p>Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#s1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data).</p>
<h3>It Demands Too Many Permissions and Punishes The User for Denying It Permissions</h3>
<h3>It Logs Your GPS Locations from EXIF Data In Your Photos</h3> <p>Instagram is pretty demanding when it comes to permissions. When I tested the app on my spare Android Phone, it wanted access to:</p>
<p> <ul>
Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data). <li>Phone owner's full name</li>
</p> <li>Phone Contacts</li>
<li>Phone calendar</li>
<h3>It Demands Too Many Permissions and Punishes The User for Denying It Permissions</h3> <li>Send and receive SMS Messages (Which may cost money)</li>
<p>Instagram is pretty demanding when it comes to permissions. When I tested the app on my spare Android Phone, it wanted access to:</p> <li>All files on phone and files on MicroSD card</li>
<ul> <li>Phone camera</li>
<li>Phone owner's full name</li> <li>Phone microphone</li>
<li>Phone Contacts</li> <li>Identifying device information: IMEI number, carrier, SIM status, phone number</li>
<li>Phone calendar</li> <li>Control phone vibrator motor</li>
<li>Send and receive SMS Messages (Which may cost money)</li> </ul>
<li>All files on phone and files on MicroSD card</li> <p>Denying the app access to: <i>the phone owners full name, contacts stored on the phone, the phones calendar, permission to send and receive SMS messages, and identifying device information</i> resulted in annoying nags containing some excuse as to why they would like access to said permission.</p>
<li>Phone camera</li> <p>However, if you deny it access to: <i>All files on the phone and MicroSD card, phone camera, phone microphone, and phone vibrator motor</i>, the app will punish the user by disabling various features in the app that will most likely operate just fine with that permission denied.</p>
<li>Phone microphone</li> <h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
<li>Identifying device information: IMEI number, carrier, SIM status, phone number</li> <p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you provide none of the above. This is obviously a method Instagram to uniquely identify you.</p>
<li>Control phone vibrator motor</li> <p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see what's new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
</ul> <img class="screenshot" src="../images/ig_sshot.png" alt="screenshot"/>
<p>Denying the app access to: <i>the phone owners full name, contacts stored on the phone, the phones calendar, permission to send and receive SMS messages, and identifying device information</i> resulted in annoying nags containing some excuse as to why they would like access to said permission.</p> <h3>It Broadcasts What You Do In The App To Other Users</h3>
<p>However, if you deny it access to: <i>All files on the phone and MicroSD card, phone camera, phone microphone, and phone vibrator motor</i>, the app will punish the user by disabling various features in the app that will most likely operate just fine with that permission denied.</p> <p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#s3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
<h3>It Might Spy in On Your Conversations</h3>
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3> <p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#s4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p>
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you provide none of the above. This is obviously a method Instagram to uniquely identify you.</p> </div>
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see what's new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p> <hr/>
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot"> <div class="footer">
<div class="sources">
<h3>It Broadcasts What You Do In The App To Other Users</h3> <h4>Sources:</h4>
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p> <ol>
<li id="s1"><a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a> <a href="https://archive.is/pHY8J">[archive.is]</a> <a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a> <a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a></li>
<h3>It Might Spy in On Your Conversations</h3> <li id="s2"><a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a> <a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a> <a href="https://archive.fo/9nxU8">[archive.is]</a> <a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a></li>
<p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p> <li id="s3"><a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a> <a href="https://archive.fo/bvtic">[archive.is]</a> <a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a></li>
<li id="s4"><a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a> <a href="https://archive.is/Utdc2">[archive.is]</a> <a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a></li>
</ol>
<hr> </div>
<center> <hr/>
<h2>Sources</h2> <b>This article was last edited on 2/24/2019</b>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a name="1">1</a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a> </div>
<a href="https://archive.is/pHY8J">[archive.is]</a> </div>
<a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a>
<a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a>
<br>
<a name="2">2</a>
<a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a>
<a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a>
<a href="https://archive.fo/9nxU8">[archive.is]</a>
<a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a>
<br>
<a name="3">3</a>
<a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a>
<a href="https://archive.fo/bvtic">[archive.is]</a>
<a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a>
<a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a>
<br>
<a name="4">4</a>
<a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a>
<a href="https://archive.is/Utdc2">[archive.is]</a>
<a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a>
<a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a>
<br>
</p>
<hr>
<p><b>
This article was last edited on 2/24/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -9,24 +9,28 @@
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<a href="index.html">&larr; Catalog</a> <div class="main">
</div>
<div class="center">
<img src="../images/lynx_logo.png" alt="Lynx Logo"/> <img src="../images/lynx_logo.png" alt="Lynx Logo"/>
<h1>Lynx</h1> <h1>Lynx</h1>
<p>Lynx is a text browser for the World Wide Web.</p> <p>Lynx is a text browser for the World Wide Web.</p>
<h2>Spyware Level: <span class="green">Not Spyware</span></h2> <h2>Spyware Level: <span class="green">Not Spyware</span></h2>
<p>Lynx <span class="green">makes no unsolicited requests at all.</span></p> <p>Lynx <span class="green">makes no unsolicited requests at all.</span></p>
<p>It is also fully libre software under the GPLv2 license.</p> <p>It is also fully libre software under the GPLv2 license.</p>
</div>
<hr/>
<div class="footer">
<div class="futher">
<h4>Further Reading</h4>
<ol>
<li><a href="https://lynx.browser.org/">lynx.browser.org</a></li>
</ol>
</div>
<hr/> <hr/>
<h4>Further Reading</h4> <b>This article was created on 4/6/2020</b>
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p> <br/>
<hr/> <b>This article was lasted edited on 10/7/2020</b>
<p>This article was created on 4/6/2020</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>This article was lasted edited on 10/7/2020</p>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div> </div>

View File

@ -1,41 +1,35 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Netsurf — Spyware Watchdog</title> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<link rel="stylesheet" href="../style.css"/> <title>Netsurf — Spyware Watchdog</title>
</head> <link rel="stylesheet" href="../style.css"/>
<body> </head>
<div class="case"> <body>
<div class="nav"><a href="index.html">&larr; Catalog</a></div> <div class="case">
<div class="main"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/> <div class="main">
<h1>Netsurf</h1> <img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
<p> <h1>Netsurf</h1>
From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more" <sup><a href="#1">[1]</a></sup> Version Tested: Netsurf 3.9 <p>From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more".<sup><a href="#s1">[1]</a></sup> Version Tested: Netsurf 3.9.</p>
</p> <h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2> <p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
<p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
</div>
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources</h4>
<center>
<ol>
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a>
<a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a>
<a href="https://archive.is/RiYFl">[archive.is]</a>
<a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a>
</br>
</ol>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div>
</div> </div>
</body> <hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1"><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a> <a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a></li>
</ol>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div>
</div>
</body>
</html> </html>

View File

@ -9,20 +9,21 @@
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<a href="index.html">&larr; Catalog</a> <div class="main">
</div>
<div class="center">
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/> <img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
<h1>Qutebrowser</h1> <h1>Qutebrowser</h1>
<p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p> <p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p>
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2> <h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
<p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p> <p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p>
</div>
<hr/>
<div class="footer">
<b>This article was created on 5/10/2018</b>
<br/>
<b>This article was lasted edited on 10/7/2020</b>
<hr/> <hr/>
<p>This article was created on 5/10/2018</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>This article was lasted edited on 10/7/2020</p>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div> </div>

View File

@ -1,116 +1,74 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Steam — Spyware Watchdog</title> <title>Steam — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/steam_logo.png" alt="Steam logo"> <div class="case">
<h1>Steam</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve. <img src="../images/steam_logo.png" alt="Steam logo"/>
</p> <h1>Steam</h1>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <p>Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.</p>
<p> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection. <p>This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection.</p>
</p> <h3>Steam's source code is unavailable</h3>
<h3>Steam's source code is unavailable</h3> <p>Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.</p>
<p> <h3>Steam collects and shares huge amounts of sensitive user information</h3>
Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has. <p>In Steam's privacy policy<sup><a href="#s1">[1]</a></sup>, Steam details that it collects the following user information:</p>
</p> <ul>
<h3>Steam collects and shares huge amounts of sensitive user information</h3> <li>Name</li>
<p> <li>Address</li>
In Steam's privacy policy<sup><a href="#1">[1]</a></sup>, Steam details that it collects the following user information: <li>Credit Card Number(s)</li>
</p> <li>e-mail</li>
<ul> <li>Age</li>
<li>Name</li> <li>IP Address</li>
<li>Address</li> <li>Device Unique ID</li>
<li>Credit Card Number(s)</li> <li>Chat logs</li>
<li>e-mail</li> <li>Forum posts</li>
<li>Age</li> <li>Voice Chat Recordings</li>
<li>IP Address</li> <li>Hardware Enumeration</li>
<li>Device Unique ID</li> </ul>
<li>Chat logs</li> <p>Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.</p>
<li>Forum posts</li> <h3>Steam has been and may still be recording your internet history</h3>
<li>Voice Chat Recordings</li> <p>It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#s2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#s3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not.</p>
<li>Hardware Enumeration</li> <h3>Steam records and publicly broadcasts your program usage habits</h3>
</ul> <p>Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature.</p>
<p> <h3>Steam attempts to collect your telephone number</h3>
Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well. <p>Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.</p>
</p> <h3>Steam "phones home" and requires and internet connection</h3>
<h3>Steam has been and may still be recording your internet history</h3> <p>Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.</p>
<p> <h3>Steam is self-updating software</h3>
It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not. <p>Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.</p>
</p> </div>
<h3>Steam records and publicly broadcasts your program usage habits</h3> <hr/>
<p> <div class="footer">
Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature. <div class="futher">
</p> <h4>Further Reading:</h4>
<h3>Steam attempts to collect your telephone number</h3> <ol>
<p> <li><a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a> <a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a> <a href="http://archive.is/baCzK">[archive.is]</a></li>
Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information. <li><a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a> <a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a> <a href="http://archive.is/UpQU5">[archive.is]</a></li>
</p> </ol>
<h3>Steam "phones home" and requires and internet connection</h3> </div>
<p> <hr/>
Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so. <div class="sources">
</p> <h4>Sources:</h4>
<h3>Steam is self-updating software</h3> <ol>
<p> <li id="s1"><a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a> <a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a> <a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a> <a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a> <a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a></li>
Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program. <li id="s2"><a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a> <a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a> <a href="https://archive.is/rc37E">[archive.is]</a></li>
</p> <li id="s3"><a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a> <a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a> <a href="https://archive.li/06hx7">[archive.is]</a></li>
<hr> </ol>
<center> </div>
<h2>Further Reading</h2> <hr/>
<p> <b>This article was last edited on 8/3/2018</b>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<a href="http://archive.is/baCzK">[archive.is]</a> </div>
<br> </div>
<a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a>
<a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a>
<a href="http://archive.is/UpQU5">[archive.is]</a>
<br>
</p>
<hr>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a>
<a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a>
<a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a>
<a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a>
<a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a>
<br>
<a name="2">2.</a>
<a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a>
<a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a>
<a href="https://archive.is/rc37E">[archive.is]</a>
<br>
<a name="3">3.</a>
<a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a>
<a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a>
<a href="https://archive.li/06hx7">[archive.is]</a>
<br>
</p>
<hr>
<p><b>
This article was last edited on 8/3/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,42 +1,35 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Surf — Spyware Watchdog</title> <title>Surf — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/> <link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main"> <div class="main">
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/> <img src="../images/surf_logo.png" alt="Surf Logo"/>
<h1>Surf</h1> <h1>Surf</h1>
<p> <p>From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#s1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.</p>
From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections. <h2>Spyware Level: <span class="green">Not Spyware</span></h2>
</p> <p>Surf <b><span class="green">makes no unsolicited requests at all</span></b>. It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.</p>
<h2>Spyware Level: <span class="green">Not Spyware</span></h2> <p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p>
<p> </div>
Surf <b><span class="green">makes no unsolicited requests at all.</span></b> <hr/>
It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice. <div class="footer">
</p> <div class="sources">
<p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p> <h4>Sources:</h4>
<ol>
<li id="s1"><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></li>
</ol>
</div> </div>
<hr/> <hr/>
<div class="footer"> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<div class="sources"> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<h4>Sources</h4> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<ol> </div>
<center> </div>
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a> </body>
<a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
</center>
</ol>
</div>
<hr/>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div>
</div>
</body>
</html> </html>

View File

@ -9,44 +9,36 @@
</head> </head>
<body> <body>
<div class="case"> <div class="case">
<div class="nav"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<a href="index.html">&larr; Catalog</a> <div class="main">
</div>
<div class="main">
<img src="../images/telegram_logo.png" alt="Telegram Logo"/> <img src="../images/telegram_logo.png" alt="Telegram Logo"/>
<h1>Telegram</h1> <h1>Telegram</h1>
<p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p> <p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p>
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2> <h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.</p> <p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#s1">[1]</a></sup>.</p>
<h3>Telephone Number Required</h3> <h3>Telephone Number Required</h3>
<p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p> <p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p>
<h3>Centralized communication routing</h3> <h3>Centralized communication routing</h3>
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#one">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p> <p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#s1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
<p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p> <p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p>
<h3>Telegram does not follow its GPLv2 Obligations</h3> <h3>Telegram does not follow its GPLv2 Obligations</h3>
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#two">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p> <p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#s2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
</div> </div>
<hr/>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1"><a href="https://telegram.org/privacy">Telegram Privacy Policy</a> <a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a> <a href="https://archive.is/qkfGr">[archive.is]</a> <a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a></li>
<li id="s2"><a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a> <a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a> <a href="https://archive.is/SrX5J">[archive.is]</a> <a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a></li>
</ol>
</div>
<hr/> <hr/>
<div class="center"> <b>This article was created on 2/18/2019</b>
<h2>Sources</h2> <br/>
<p><a id="one">1.</a> <b>This article was lasted edited on 10/11/2020</b>
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
<a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a>
<a href="https://archive.is/qkfGr">[archive.is]</a>
<a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a>
</p>
<p>
<a id="two">2.</a>
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
<a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a>
<a href="https://archive.is/SrX5J">[archive.is]</a>
<a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a>
</p>
<hr/> <hr/>
<p>This article was created on 2/18/2019</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p>This article was lasted edited on 10/11/2020</p>
<hr/>
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</div> </div>

View File

@ -1,47 +1,36 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Ungoogled-Chromium — Spyware Watchdog</title> <title>Ungoogled-Chromium — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<div class="case">
<meta name="viewport" content="width=device-width, initial-scale=1"> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo"> <div class="main">
<h1>Ungoogled-Chromium</h1> <img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo"/>
<p> <h1>Ungoogled-Chromium</h1>
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, <p>Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#s1">[1]</a></sup></p>
control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup> <h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
</p> <p>Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes <b><span class="lime">no unsolicited requests</span></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it. Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are looking for a Chrome-based browser to switch too without taking the time to compile any software.</p>
<h2>Spyware Level: <font color="lime">Not Spyware</font></h2> </div>
<p> <hr/>
Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes <div class="footer">
<b><font color="lime">no unsolicited requests</font></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated <div class="sources">
browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it. <h4>Sources:</h4>
Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are <ol>
looking for a Chrome-based browser to switch too without taking the time to compile any software. <li id="s1"><a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a> <a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a> <a href="http://archive.is/uLsce">[archive.is]</a></li>
</p> </ol>
<hr> </div>
<center> <hr/>
<h2>Sources</h2> <b>This article was last edited on 11/1/2018</b>
<p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<a name="1">1.</a> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a> </div>
<a href="http://archive.is/uLsce">[archive.is]</a><br> </div>
<!-- more apporpiate to link to a git/software archive, whichever one that might be -->
</p>
<hr>
<p><b>
This article was last edited on 11/1/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,94 +1,59 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Vivaldi — Spyware Watchdog</title> <title>Vivaldi — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/vivaldi_logo.png" alt="vivaldi logo"> <div class="case">
<h1>Vivaldi</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy. <img src="../images/vivaldi_logo.png" alt="vivaldi logo"/>
</p> <h1>Vivaldi</h1>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <p>Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.</p>
<p> <h2>Spyware Level: <span class="yellow">Medium</span></h2>
Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users. <p>Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.</p>
</p> <h3>Vivaldi's developers do not respect your privacy</h3>
<h3>Vivaldi's developers do not respect your privacy</h3> <p>Vivaldi connects to the analytics platform Piwik<sup><a href="#s1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page. What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on, are <span class="red"><b>not developers you can trust.</b></span> Below is an anti-privacy rant from a moderator on Vivaldi's forums:</p>
<p> <p><i>@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#s2">[2]</a></sup></i></p>
Vivaldi connects to the analytics platform Piwik<sup><a href="#1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page. <h3>Addon updates</h3>
What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on, <img class="screenshot" src = "../images/vivaldi_update.png" alt="Vivaldi Update"/>
are <font color=red><b>not developers you can trust.</b></font> Below is an anti-privacy rant from a moderator on Vivaldi's forums: <p>These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <span class="red">Can't be disabled.</span></p>
</p> <h3>Google Safe Browsing</h3>
<p><i> <img class="screenshot" src = "../images/vivaldi_safebrowsing.png" alt="Vivaldi SafeBrowsing"/>
@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#2">[2]</a></sup> <img class="screenshot" src = "../images/vivaldi_threatlist.png" alt="Vivaldi Threatlist"/>
</i></p> <p>Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.</p>
<h3>Addon updates</h3> <h3>Phoning home</h3>
<p> <p>From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: </p>
<BR> <img class="screenshot" src="../images/vivaldi_piwik.png" alt="Vivaldi Piwik"/>
<img class="screenshot" src = "../images/vivaldi_update.png"><BR> <h3>Anti-privacy search engine by default</h3>
These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font> <p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by.</p>
</p> <h3>New tab sites</h3>
<h3>Google Safe Browsing</h3> <p>By default, Vivaldi contains some websites in its new tab page that have a lot of spyware in them, but does not automatically make any connection, and those sites can easily be deleted.</p>
<p> <h3>Cannot be built from source code</h3>
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png"><BR> <p>"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#s3">[3]</a></sup></p>
<img class="screenshot" src = "../images/vivaldi_threatlist.png"><BR> </div>
Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu. <hr/>
</p> <div class="footer">
<div class="sources">
<h3>Phoning home</h3> <h4>Sources:</h4>
<p> <ol>
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img class="screenshot" src="../images/vivaldi_piwik.png"> <li id="s1"><a href="https://matomo.org/download/">Get Matomo</a> <a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a> <a href="http://archive.is/q9hOn">[archive.is]</a></li>
</p> <li id="s2"><a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a> <a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a> <a href="http://archive.li/8Elc9">[archive.li]</a></li>
<li id="s3"><a href="https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">The Vivaldi source code license and the EULA appear to conflict with each other...</a> <a href="https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">[web.archive.org]</a> <a href="http://archive.li/ZoRUx">[archive.li]</a></li>
<h3>Anti-privacy search engine by default</h3> </ol>
<p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by. </div>
</p> <hr/>
<b>This article was last edited on 10/14/2018</b>
<h3>New tab sites</h3> <br/>
<p>By default, Vivaldi contains some websites in its new tab page that have a lot of spyware in them, but does not automatically make any connection, and those sites can easily be deleted.</p> <b>This article was created on 11/25/2017</b>
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<h3>Cannot be built from source code</h3> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<p> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#3">[3]</a></sup> </div>
</p> </div>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://matomo.org/download/">Get Matomo</a>
<a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a>
<a href="http://archive.is/q9hOn">[archive.is]</a><br>
<a name="2">2.</a>
<a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a>
<a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a>
<a href="http://archive.li/8Elc9">[archive.li]</a><br>
<a name="3">3.</a>
<a href="
https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
">The Vivaldi source code license and the EULA appear to conflict with each other...</a>
<a href="
https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
">[web.archive.org]</a>
<a href="http://archive.li/ZoRUx">[archive.li]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 10/14/2018
</b></p>
<p><b>
This article was created on 11/25/2017
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,50 +1,41 @@
<!--Old Style--> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>VLC — Spyware Watchdog</title> <title>VLC — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo"> <div class="case">
<h1>VLC Media Player</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. <img src="../images/vlc_logo.png" alt="VLC Media Player Logo"/>
</p> <h1>VLC Media Player</h1>
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2> <p>VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.</p>
<p> <h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy. <p>VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.</p>
</p> <h3>VLC Media Player has been distributed with spyware programs by third parties</h3>
<h3>VLC Media Player has been distributed with spyware programs by third parties</h3> <p>While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#s1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>.</p>
<p> <h3>VLC Media Player contains some opt-in spyware features</h3>
While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>. <p>VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.</p>
</p> <img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy"/>
<h3>VLC Media Player contains some opt-in spyware features</h3> </div>
<p> <hr/>
VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default. <div class="footer">
</p> <div class="sources">
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy"> <h4>Sources:</h4>
<hr> <ol>
<center> <li id="s1"><a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a> <a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a> <a href="https://archive.is/80IDC">[archive.is]</a> <a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a></li>
<h2>Sources</h2> </ol>
<p> </div>
<a name="1">1.</a> <hr/>
<a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a> <b>This article was last edited on 7/30/2018</b>
<a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<a href="https://archive.is/80IDC">[archive.is]</a> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<br> </div>
</p> </div>
<hr>
<p><b>
This article was last edited on 7/30/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>

View File

@ -1,77 +1,51 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"/> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>Yahoo! Search — Spyware Watchdog</title> <title>Yahoo! Search — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head> </head>
<body> <body>
<img src="../images/yahoo_logo.png" alt="Yahoo Logo"> <div class="case">
<h1>Yahoo! Search</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
Yahoo! search is a search engine made by Yahoo. <img src="../images/yahoo_logo.png" alt="Yahoo Logo"/>
</p> <h1>Yahoo! Search</h1>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <p>Yahoo! search is a search engine made by Yahoo.</p>
<p> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your <p>Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)</p>
internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information) <p>It's important to notice that this is <b><span class="red">just scratching the surface</span></b> at the extent of spying that the Oath spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search.</p>
</p> <h3>Integration into the "Yahoo Account" spyware platform and tracking internet history</h3>
<p> <p>Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#s1">[1]</a></sup></p>
It's important to notice that this is <b><font color=red>just scratching the surface</font></b> at the extent of spying that the Oath <p>It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your use of its services, so that you will be tracked through your usage of them, whether you have an account or not.</p>
spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search. <h3>Tracking users</h3>
</p> <p>The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet:</p>
<h3>Integration into the "Yahoo Account" spyware platform and tracking internet history</h3> <p><i>"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#s1">[1]</a></sup></i></p>
<p> <h3>Selling user information to advertisers</h3>
Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search <p>The Oath privacy policy clearly states that the information it collects from you is shared with advertisers:</p>
is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#1">[1]</a></sup> <p><i>"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use."</i><sup><a href="#s1">[1]</a></sup></p>
</p> <p><i> "We also may use the information we have about you for the following purposes: ... <br/>
<p> Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br/>
It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br/>
they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."</i><sup><a href="#s1">[1]</a></sup></p>
use of its services, so that you will be tracked through your usage of them, whether you have an account or not. <p>A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.</p>
</p> </div>
<h3>Tracking users</h3> <hr/>
<p> <div class="footer">
The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet: <div class="sources">
</p> <h4>Sources:</h4>
<p><i> <ol>
"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#1">[1]</a></sup> <li id="s1"><a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a> <a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a> <a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a></li>
</i></p> </ol>
<h3>Selling user information to advertisers</h3> </div>
<p> <hr/>
The Oath privacy policy clearly states that the information it collects from you is shared with advertisers: <b>This article was last edited on 8/3/2018</b>
</p> <p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
<p><i> <p>All contributions must be licensed under the CC0 license to be accepted.</p>
"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use." <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
</i><sup><a href="#1">[1]</a></sup></p> </div>
<p><i> </div>
"We also may use the information we have about you for the following purposes: ... <br>
Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br>
Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br>
Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."
</i><sup><a href="#1">[1]</a></sup></p>
<p>
A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a>
<a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a>
<a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a>
<a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 8/3/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body> </body>
</html> </html>