Full restyling articles Part 2
This commit is contained in:
parent
09095d1cb6
commit
dce0acbc31
|
@ -29,7 +29,7 @@
|
|||
</div>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading</h4>
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>
|
||||
|
|
|
@ -1,21 +1,25 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Google Search — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/google_logo.png" alt="Google logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/google_logo.png" alt="Google logo"/>
|
||||
<h1>Google Search</h1>
|
||||
<p>
|
||||
Google Search is a search engine created and owned by <a href="../articles/google.html">Google</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>
|
||||
Google Search collects your personal information and is heavily integrated with other services that collect your personal information.
|
||||
Google's privacy policy<sup><a href="#1">[1]</a></sup> is written in a way that does not tell you which Google services are
|
||||
Google's privacy policy<sup><a href="#s1">[1]</a></sup> is written in a way that does not tell you which Google services are
|
||||
collecting which types of information, and instead ties all of its services into one privacy policy. So the best that can be done is
|
||||
to assume that by using any of Google's services at all, Google is trying to obtain all of the information detailed.
|
||||
</p>
|
||||
|
@ -27,16 +31,16 @@ your information, so it is really not trying to be very detailed because it woul
|
|||
<h3>Google Search records your searches</h3>
|
||||
<p>
|
||||
Searches made using Google Search are associated with your identity and recorded in Google's servers. From the
|
||||
privacy policy<sup><a href="#1">[1]</a></sup>, Google makes it clear that:
|
||||
privacy policy<sup><a href="#s1">[1]</a></sup>, Google makes it clear that:
|
||||
</p>
|
||||
<p><i>
|
||||
"We collect information about the services that you use and how you use them"
|
||||
</i></p>
|
||||
<p>
|
||||
Where "collect information" is clearly stated<sup><a href="#2">[2]</a></sup> as such:
|
||||
Where "collect information" is clearly stated<sup><a href="#s2">[2]</a></sup> as such:
|
||||
</p>
|
||||
<p><i>
|
||||
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><font color=red>browsing history</font></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
|
||||
"This includes information like your usage data and preferences, Gmail messages, G+ profile, photos, videos, <b><span class="red">browsing history</span></b>, map searches, docs, or other Google-hosted content. Our automated systems analyze this information as it is sent and received and when it is stored.
|
||||
</i></p>
|
||||
<p>
|
||||
Google also confirms again that it stores your searches in its servers, in this quote:
|
||||
|
@ -47,7 +51,7 @@ your information, so it is really not trying to be very detailed because it woul
|
|||
</p>
|
||||
<h3>Google uses your searches to build a profile of your interests, which is sold to advertisers</h3>
|
||||
<p>
|
||||
In this page of Google's privacy policy<sup><a href="#2">[2]</a></sup>, Google confirms that
|
||||
In this page of Google's privacy policy<sup><a href="#s2">[2]</a></sup>, Google confirms that
|
||||
they create profiles of their users interests:
|
||||
</p>
|
||||
<p><i>
|
||||
|
@ -67,38 +71,30 @@ your information, so it is really not trying to be very detailed because it woul
|
|||
It attempts to collect phone numbers, and helps Google attribute the information it collects though all of its services
|
||||
to one user, increasing the accuracy of their internal profile of you.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
<a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a><br>
|
||||
<a href="https://stallman.org/google.html">Reasons not to use Google</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://policies.google.com/privacy">Google Privacy policy</a>
|
||||
<a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a>
|
||||
<a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a>
|
||||
<a href="https://archive.li/U4mQP">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
<a name="2">2.</a>
|
||||
<a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a>
|
||||
<a href="https://archive.li/Hthpb">[archive.li]</a>
|
||||
<a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 12/12/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://www.huffingtonpost.com/nathan-newman/why-googles-spying-on-use_b_3530296.html">Why Google's Spying on User Data Is Worse than the NSA's</a></li>
|
||||
<li><a href="https://stallman.org/google.html">Reasons not to use Google</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://policies.google.com/privacy">Google Privacy policy</a> <a href="https://web.archive.org/web/20181109075525/https://policies.google.com/privacy">[web.archive.org]</a> <a href="http://wayback.vefsafn.is/wayback/20181009135133/https://policies.google.com/privacy">[wayback.vefsafn.is]</a> <a href="https://archive.li/U4mQP">[archive.li]</a> <a href="https://ghostarchive.org/archive/FFRlq?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://policies.google.com/privacy/example/collect-information">Google collect information</a> <a href="https://archive.li/Hthpb">[archive.li]</a> <a href="https://ghostarchive.org/archive/GhRSC?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 12/12/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,41 +1,36 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>GZDoom — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/gzdoom_logo.png" alt="GZDoom Logo"/>
|
||||
<h1>GZDoom</h1>
|
||||
<p>
|
||||
GZDoom is a source port of Doom based on an older source port, ZDoom.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
|
||||
<p>
|
||||
GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#1">[1]</a></sup>.
|
||||
GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you
|
||||
should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://forum.zdoom.org/viewtopic.php?f=49&t=59787">GZStats: A quick rundown</a>
|
||||
<a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&t=59787">[web.archive.org]</a>
|
||||
<a href="https://archive.is/2cTl4">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 5/30/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>GZDoom is a source port of Doom based on an older source port, ZDoom.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>GZDoom contains telemetry that it reports back to the developers containing general information about your Operating System, CPU Cores, and OpenGL compatibility.<sup><a href="#s1">[1]</a></sup>. GZDoom's developers do not seem to be very good at handling privacy concerns (After all, if this was privacy-concious, it would be opt-in...) and so if you decide to use this program, you should make sure to compile it with the telemetry disabled, and you should make sure that this is the <i>only</i> spyware in the program- there may be more spyware implemented in the future.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://forum.zdoom.org/viewtopic.php?f=49&t=59787">GZStats: A quick rundown</a> <a href="https://web.archive.org/web/20180325212702/https://forum.zdoom.org/viewtopic.php?f=49&t=59787">[web.archive.org]</a> <a href="https://archive.is/2cTl4">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 5/30/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,28 +1,28 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Hexchat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
|
||||
<h1>Hexchat</h1>
|
||||
<p>
|
||||
HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>HexChat is an IRC client based on XChat, but unlike XChat it's completely free for both Windows and Unix-like systems.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Hexchat is not spyware in and of itself, however you can use it to connect to services that may be spyware. Hexchat is also distributed on spyware platforms such as the Windows Store. If you want to download Hexchat, download it from the <a href="https://hexchat.github.io/index.html">developers' website</a> instead of the Windows Store.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,28 +1,26 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html lang=”en-us”>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="ru" xml:lang="ru">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Hexchat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/hexchat_logo.png" alt="Hexchat Logo"/>
|
||||
<h1>Hexchat</h1>
|
||||
<p>
|
||||
HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем.
|
||||
</p>
|
||||
<h2>Уровень слежки: <font color=lime>Нет</font></h2>
|
||||
<p>
|
||||
Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Обратно в каталог</a></p>
|
||||
</center>
|
||||
<p>HexChat - IRC клиент, основанный на Xchat. В отличие от него, он полностью свободный и для Windows и для Unix-подобных систем.</p>
|
||||
<h2>Уровень слежки: <span class="lime">Нет</span></h2>
|
||||
<p>Hexchat сам по себе не является следящим, однако вы можете подключаться с помощью него к сервисам, которые могут следить за вами. Hexchat также распространяется на следящих платформах, таких как Windows Store. Если вы хотите скачать Hexchat, скачайте его с <a href="https://hexchat.github.io/index.html">сайта разработчика</a>, а не с Windows Store.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -9,9 +9,7 @@
|
|||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/w3c_logo.png" alt="World Wide Web Consortum: The maintainers of the HTTP standard"/>
|
||||
<h1>HyperText Transmission Protocol</h1>
|
||||
|
@ -19,32 +17,26 @@
|
|||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>HTTP is a protocol that is not designed with the privacy of its users in mind. The language used in the HTTP specification explicitly says that the protocol was designed with enabling the datamining of its users in mind, and contains features that are not absolutely necessary for the purpose of the protocol, but allow the protocol compromise user privacy.</p>
|
||||
<h3>"User-Agent" Datamining feature</h3>
|
||||
<p>Section 14.43<sup><a href="#one">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
|
||||
<p>Section 14.43<sup><a href="#s1">[1]</a></sup> of the HTTP specification details the "User-Agent" feature of the protocol that, when implemented, will attach information about your computing enviroment that can be used to track you. The biggest danger of the User-Agent is that there is no way to anonymously opt-out of this- even if you do not provide a user-agent, because almost everyone else does, you will be tracked by the fact that you do <b>not</b> provide that information. There are many strategies to mitigate this, with only varying levels of success, but the problem is that this is the acceptable standard of how HTTP is used and not the forgotten feature that it should be. Not only does the User-Agent feature collect this unncessary information, its purpose is explicitly stated in the protocol specifications to aid in datamining.</p>
|
||||
<p><i>"The User-Agent request-header field contains information about the user agent originating the request. This is for <b>statistical purposes</b>, the tracing of protocol violations, and automated recognition of user agents for the sake of tailoring responses to avoid particular user agent limitations. User agents SHOULD include this field with requests."</i></p>
|
||||
<h3>Acknowledgement of HTTP's privacy problem</h3>
|
||||
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#two">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
|
||||
<p>In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1<sup><a href="#s2">[2]</a></sup> of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.</p>
|
||||
<p>At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a id="one">1.</a>
|
||||
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a>
|
||||
<a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a>
|
||||
<a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012081518/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/yf0cL?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">Section 15 of the HTTP/1.1 Specification</a> <a href="https://web.archive.org/web/20201012082013/https://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/btcfc?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>This article was created on 5/14/2018</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<b>This article was created on 5/14/2018</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/11/2020</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
|
|
|
@ -1,45 +1,38 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>GNU IceCat — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/icecat_logo.png" alt="icecat Logo"/>
|
||||
<h1>GNU IceCat</h1>
|
||||
<p>
|
||||
GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <font color=lime><b>no unsolicited connections</b></font> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a>
|
||||
</p>
|
||||
<p>GNU IceCat is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>GNU IceCat is a fork of Firefox that is more private and secure than Firefox and it contains several privacy-protecting features. IceCat 60 makes <span class="lime"><b>no unsolicited connections</b></span> when you run it. Previous versions had privacy problems, but version 60 doesn't have these problems. You can read about the previous version here: <a href="../articles/icecat59.html">IceCat 59 Review</a></p>
|
||||
<h3>IceCat's privacy features</h3>
|
||||
<center>
|
||||
<p>
|
||||
From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>
|
||||
</p>
|
||||
</center>
|
||||
<p>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</p>
|
||||
<p>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</p>
|
||||
<p>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</p>
|
||||
<p>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</p>
|
||||
<p>
|
||||
As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">
|
||||
GNUzilla — News: IceCat 60.2.0 Pre-release</a>
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<p><b>
|
||||
This article was last edited on 9/18/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>From <a href="https://www.gnu.org/software/gnuzilla/">gnu.org</a>:</p>
|
||||
<ul>
|
||||
<li>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.</li>
|
||||
<li>Https-Everywhere: Extension that encrypts your communications with many major websites, making your browsing more secure.</li>
|
||||
<li>AboutIceCat: Adds a custom "about:icecat" homepage with links to information about the free software and privacy features in IceCat, and checkboxes to enable and disable the ones more prone to break websites.</li>
|
||||
<li>Fingerprinting countermeasures: Fingerprinting is a series of techniques allowing to uniquely identify a browser based on specific characteristics of that particular instance (like what fonts are available in that machine). Unlike cookies the user cannot opt-out of being tracked this way, so the browser has to avoid giving away that kind of hints.</li>
|
||||
</ul>
|
||||
<p>As of writing this the information on gnu.org is a little outdated. Read this for the most up to date look at it: <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9240">GNUzilla — News: IceCat 60.2.0 Pre-release</a></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<b>This article was last edited on 9/18/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -9,9 +9,7 @@
|
|||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="../index.html">← Home</a>
|
||||
</div>
|
||||
<div class="nav"><a href="../index.html">← Home</a></div>
|
||||
<div class="center">
|
||||
<h1>Spyware Watchdog Article Catalog</h1>
|
||||
<p>All of the articles on this website are available here!</p>
|
||||
|
|
|
@ -1,28 +1,23 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Instagram — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/ig_logo.png" alt="Instagram logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/ig_logo.png" alt="Instagram logo"/>
|
||||
<h1>Instagram</h1>
|
||||
<p>
|
||||
Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the
|
||||
service it provides.</p>
|
||||
|
||||
<p>Instagram, developed by <a href="https://en.wikipedia.org/wiki/Facebook">Facebook</a> is designed to be a free smartphone app that allows users to post pictures and videos to a feed, much like any micro-blogging platform. It is popular among teenagers and millennials. In fact businesses are now getting into the Instagram scene and creating their own Instagram profiles.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Instagram is spyware because it identifies you with EXIF data, and demands direct access to excessive amounts of personal information that has nothing to do with the service it provides.</p>
|
||||
<h3>It Logs Your GPS Locations from EXIF Data In Your Photos</h3>
|
||||
<p>
|
||||
Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data).
|
||||
</p>
|
||||
|
||||
<p>Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stored in photos. This is setting that one can easily turn off. However, many users don't even realize their phone is doing so. Instagram takes advantage of that. It will scan through all of the user's photos and look for this EXIF Data<sup><a href="#s1">[1]</a></sup>. When it does, it logs the GPS Coordinates into a database. This database shows exactly where the user has been and what pictures they have taken. The only way to turn this off is to turn off EXIF tags on your camera (You should turn it off due to the numerous privacy issues that emerge from EXIF data).</p>
|
||||
<h3>It Demands Too Many Permissions and Punishes The User for Denying It Permissions</h3>
|
||||
<p>Instagram is pretty demanding when it comes to permissions. When I tested the app on my spare Android Phone, it wanted access to:</p>
|
||||
<ul>
|
||||
|
@ -38,70 +33,32 @@ Whenever a user takes a picture on a modern smartphone, GPS Coordinates are stor
|
|||
</ul>
|
||||
<p>Denying the app access to: <i>the phone owners full name, contacts stored on the phone, the phones calendar, permission to send and receive SMS messages, and identifying device information</i> resulted in annoying nags containing some excuse as to why they would like access to said permission.</p>
|
||||
<p>However, if you deny it access to: <i>All files on the phone and MicroSD card, phone camera, phone microphone, and phone vibrator motor</i>, the app will punish the user by disabling various features in the app that will most likely operate just fine with that permission denied.</p>
|
||||
|
||||
<h3>You Must Provide a Telephone Number or Email Address to Sign Up</h3>
|
||||
<p>In order to sign up for the app, you must provide either a telephone number or an email address. You will not be allowed to create an account if you provide none of the above. This is obviously a method Instagram to uniquely identify you.</p>
|
||||
<p>If you provided Instagram with a cellular telephone number and uninstalled the app, you will get constant nags to "see what's new on Instagram". Fortunately these nags will go away after about a month, and can be blocked by simply blocking the number</p>
|
||||
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot">
|
||||
|
||||
<img class="screenshot" src="../images/ig_sshot.png" alt="screenshot"/>
|
||||
<h3>It Broadcasts What You Do In The App To Other Users</h3>
|
||||
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
|
||||
|
||||
<p>Introduced in January 2018, Instagram sports a new spyware feature that broadcasts what you are doing in the app to anyone that DMs you in the app<sup><a href="#s3">[3]</a></sup>. But, it goes further, it reportedly also broadcasts what comments you read and what photos you like in the app. On microblogging platforms like Instagram, the majority of users like their actions to be private. A lot of users have complained about this feature and they stated that the feature is here to stay. Also, there is no way to disable this feature either.</p>
|
||||
<h3>It Might Spy in On Your Conversations</h3>
|
||||
<p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p>
|
||||
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
|
||||
<p>
|
||||
<a name="1">1</a>
|
||||
<a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a>
|
||||
<a href="https://archive.is/pHY8J">[archive.is]</a>
|
||||
<a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
|
||||
<a name="2">2</a>
|
||||
<a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a>
|
||||
<a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a>
|
||||
<a href="https://archive.fo/9nxU8">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
|
||||
<a name="3">3</a>
|
||||
<a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a>
|
||||
<a href="https://archive.fo/bvtic">[archive.is]</a>
|
||||
<a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
|
||||
|
||||
<a name="4">4</a>
|
||||
<a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a>
|
||||
<a href="https://archive.is/Utdc2">[archive.is]</a>
|
||||
<a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a>
|
||||
<a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
|
||||
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 2/24/2019
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>In September 2017 users started reporting ads appearing on their Instagram feed that they spoke to another person about and never once looked it up online. While Instagram is known to use super cookies (cookies that can hop to different computers on a network and use certain techniques to avoid being deleted), this is next level. A person conducted a test where on a hike they randomly mentioned a projector<sup><a href="#s4">[4]</a></sup>. Before this hike they showed no interest in projectors. Then they gave Instagram about 15 hours and when the person checked their feed the next morning, there was an ad for a projector. Sadly, this is overwhelming proof that Instagram is indeed listening in. Of course, when questioned by various news outlets, Instagram said they never did this, despite their being overwhelming evidence that they are indeed tapping users microphones.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.makeuseof.com/tag/ways-instagram-spying-you/">Make Use Of — Ways Instagram Is Spying on You</a> <a href="https://archive.is/pHY8J">[archive.is]</a> <a href="https://web.archive.org/web/20180131084312/https://www.makeuseof.com/tag/ways-instagram-spying-you/">[archive.org]</a> <a href="https://ghostarchive.org/archive/2mC06?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://help.instagram.com/478745558852511/?_fb_noscript=1">Instagram's TOS</a> <a href="https://web.archive.org/*/https://help.instagram.com/478745558852511/?_fb_noscript=1">[archive.org]</a> <a href="https://archive.fo/9nxU8">[archive.is]</a> <a href="https://ghostarchive.org/archive/Efzig?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s3"><a href="https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">HelloGiggles Article on the New DM feature</a> <a href="https://archive.fo/bvtic">[archive.is]</a> <a href="https://web.archive.org/*/https://hellogiggles.com/news/instagram-compromising-privacy-dm-feature/">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/1H30A?kreymer=false">[ghostarchive.org]</a></li>
|
||||
<li id="s4"><a href="https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">Instagram Listens In</a> <a href="https://archive.is/Utdc2">[archive.is]</a> <a href="https://web.archive.org/*/https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023">[web.archive.org]</a> <a href="https://ghostarchive.org/archive/P971C?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 2/24/2019</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
||||
</html>
|
||||
|
|
|
@ -9,24 +9,28 @@
|
|||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/lynx_logo.png" alt="Lynx Logo"/>
|
||||
<h1>Lynx</h1>
|
||||
<p>Lynx is a text browser for the World Wide Web.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>Lynx <span class="green">makes no unsolicited requests at all.</span></p>
|
||||
<p>It is also fully libre software under the GPLv2 license.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading</h4>
|
||||
<p><a href="https://lynx.browser.org/">lynx.browser.org</a></p>
|
||||
<ol>
|
||||
<li><a href="https://lynx.browser.org/">lynx.browser.org</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>This article was created on 4/6/2020</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<b>This article was created on 4/6/2020</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/7/2020</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
|
|
|
@ -1,7 +1,9 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Netsurf — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
|
@ -11,24 +13,16 @@
|
|||
<div class="main">
|
||||
<img src="../images/netsurf.png" alt="Images are in the ../images folder"/>
|
||||
<h1>Netsurf</h1>
|
||||
<p>
|
||||
From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more" <sup><a href="#1">[1]</a></sup> Version Tested: Netsurf 3.9
|
||||
</p>
|
||||
<p>From their website: "NetSurf is a multi-platform web browser for RISC OS, UNIX-like platforms (including Linux), Mac OS X, and more".<sup><a href="#s1">[1]</a></sup> Version Tested: Netsurf 3.9.</p>
|
||||
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
|
||||
<p>Upon launch Netsurf makes a request to get the default search engine's icon, that default search engine is Google. This was tested with mitmproxy. Other than that, there are no unsolicited requests. After following the <a href="../guides/netsurf.html">mitigation guide</a>, this software is <span class="green">not spyware</span>.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<center>
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<a name="1">1.</a><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a>
|
||||
<a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/RiYFl">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a>
|
||||
|
||||
</br>
|
||||
<li id="s1"><a href="https://www.netsurf-browser.org">www.netsurf-browser.org/</a> <a href="https://web.archive.org/web/20200322201240/http://www.netsurf-browser.org/">[web.archive.org]</a> <a href="https://archive.is/RiYFl">[archive.is]</a> <a href="https://ghostarchive.org/VhLP8?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
|
|
|
@ -9,20 +9,21 @@
|
|||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="center">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"/>
|
||||
<h1>Qutebrowser</h1>
|
||||
<p>Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Qutebrowser <span class="lime">makes no unsolicited requests at all</span>. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>This article was created on 5/10/2018</p>
|
||||
<p>This article was lasted edited on 10/7/2020</p>
|
||||
<div class="footer">
|
||||
<b>This article was created on 5/10/2018</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/7/2020</b>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
|
|
|
@ -1,29 +1,25 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Steam — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/steam_logo.png" alt="Steam logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/steam_logo.png" alt="Steam logo"/>
|
||||
<h1>Steam</h1>
|
||||
<p>
|
||||
Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection.
|
||||
</p>
|
||||
<p>Steam is a video game launching service, digital content store, DRM platform, file sharing platform, and Social Network created by Valve.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>This program is spyware because it collects huge amounts of user information, including but not limited to your Home Address, Telephone Number, Credit Card Number, and Internet Search History. Steam also profiles your hardware, communications through Steam's social networking features, and contains a mandatory self-updater. Steam will not work without an internet connection.</p>
|
||||
<h3>Steam's source code is unavailable</h3>
|
||||
<p>
|
||||
Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.
|
||||
</p>
|
||||
<p>Steam cannot be built from an available copy of the source code. This means that it is impossible to prove that Steam is not spyware or does not use certain spyware features that it potentially has.</p>
|
||||
<h3>Steam collects and shares huge amounts of sensitive user information</h3>
|
||||
<p>
|
||||
In Steam's privacy policy<sup><a href="#1">[1]</a></sup>, Steam details that it collects the following user information:
|
||||
</p>
|
||||
<p>In Steam's privacy policy<sup><a href="#s1">[1]</a></sup>, Steam details that it collects the following user information:</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Address</li>
|
||||
|
@ -37,80 +33,42 @@ In Steam's privacy policy<sup><a href="#1">[1]</a></sup>, Steam details that it
|
|||
<li>Voice Chat Recordings</li>
|
||||
<li>Hardware Enumeration</li>
|
||||
</ul>
|
||||
<p>
|
||||
Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.
|
||||
</p>
|
||||
<p>Steam also confirms that it shares this information with third parties. The implications of this are as follows: Steam knows your name, age, where you live, your banking information, and what your e-mail is. Steam shares this information with other companies (at least, to the extent allowed by law). Steam can use your IP Address to track where you are to the nearest county and can use your Device Unique ID provided by the fingerprinting spyware features inside Steam to track your usage habits across devices that you use. Steam also records all of your communications with others through its social networking and instant messaging services, such as all chat logs, voice conversations, and forum posts, and can share all of this information with third parties as well.</p>
|
||||
<h3>Steam has been and may still be recording your internet history</h3>
|
||||
<p>
|
||||
It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not.
|
||||
</p>
|
||||
<p>It was proven that Steam's VAC system records your internet history and uploads it to an official Valve server<sup><a href="#s2">[2]</a></sup>. Valve has subsequently denied<sup><a href="#s3">[3]</a></sup> that they store user's internet history, but it is impossible for Valve to prove that they do not store internet history. What we do know is that Valve does have the ability to spy on a user's internet history, the spyware feature is programmed into Valve's software and the internet history is processed by Valve's servers. It is up to you to decide whether or not you trust Valve when they say that they have turned this feature off or not.</p>
|
||||
<h3>Steam records and publicly broadcasts your program usage habits</h3>
|
||||
<p>
|
||||
Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature.
|
||||
</p>
|
||||
<p>Steam records your program usage habits for all programs launched through Steam's program launching service. This spyware feature is mandatory and has no opt-out. Steam also uses its social network features such as the user profile and friends list to broadcast a users program usage habits publicly. This spyware feature can be partially disabled by setting your profile to private, but it cannot be opted-out of if you are using the "friends" social networking feature.</p>
|
||||
<h3>Steam attempts to collect your telephone number</h3>
|
||||
<p>
|
||||
Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.
|
||||
</p>
|
||||
<p>Steam has the spyware feature which allows you to "opt-in" to certain features of the Steam service by providing Steam your telephone number. This is done through a pop-up that cannot be turned off. This spyware feature is currently not required, but is being encouraged by Steam. Steam in fact will lock out certain features and privileges to users who want to protect their privacy- for example, access to the "steam store" which is an online marketplace run by valve requires you to give you your phone number. So it is impossible to use all features of the software without giving up this kind of information.</p>
|
||||
<h3>Steam "phones home" and requires and internet connection</h3>
|
||||
<p>
|
||||
Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.
|
||||
</p>
|
||||
<p>Steam will "phone home" whenever the Steam client is opened or a program is launched through Steam. This spyware feature is mandatory and cannot be turned off. Steam provides an offline mode which is not an opt-out because users must still connect to Steam Servers every 30 days or so.</p>
|
||||
<h3>Steam is self-updating software</h3>
|
||||
<p>
|
||||
Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further Reading</h2>
|
||||
<p>
|
||||
|
||||
<a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a>
|
||||
<a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a>
|
||||
<a href="http://archive.is/baCzK">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
<a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a>
|
||||
<a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/UpQU5">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
|
||||
<a name="1">1.</a>
|
||||
<a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a>
|
||||
<a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a>
|
||||
<a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a>
|
||||
<a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a>
|
||||
<br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a>
|
||||
<a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/rc37E">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a>
|
||||
<a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a>
|
||||
<a href="https://archive.li/06hx7">[archive.is]</a>
|
||||
<br>
|
||||
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/3/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>Steam contains spyware features that allow it to update itself without user verification. This is not an opt-out feature because eventually Steam will stop working until it is updated. Self-updating software is a form of spyware because it can be used to install new spyware features or force users to agree to new agreements that force them to explicitly give up more information to continue using the spyware program.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://voat.co/v/technology/2475543">Steam Proprietary Malware</a> <a href="http://web.archive.org/web/20180802034105/https://voat.co/v/technology/2475543">[web.archive.org]</a> <a href="http://archive.is/baCzK">[archive.is]</a></li>
|
||||
<li><a href="https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">Steam uses insecure, out-of-date Chromium browser</a> <a href="https://web.archive.org/web/20180114102416/https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/">[web.archive.org]</a> <a href="http://archive.is/UpQU5">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="http://store.steampowered.com/privacy_agreement/">Privacy Policy Agreement</a> <a href="https://web.archive.org/web/20180601093517/https://store.steampowered.com/privacy_agreement/">[web.archive.org]</a> <a href="http://archive.is/20180527153547/https://store.steampowered.com/privacy_agreement/">[archive.is]</a> <a href="http://wayback.archive-it.org/all/20170630073019/http://store.steampowered.com/privacy_agreement/">[wayback.archive-it.org]</a> <a href="http://arquivo.pt/wayback/20160515220303/http://store.steampowered.com/privacy_agreement/">[arquivo.pt]</a></li>
|
||||
<li id="s2"><a href="http://store.steampowered.com/privacy_agreement/">VAC now reads all the domains you have visited and sends it back to their servers hashed</a> <a href="https://web.archive.org/web/20180521023712/https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/vac_now_reads_all_the_domains_you_have_visited/">[web.archive.org]</a> <a href="https://archive.is/rc37E">[archive.is]</a></li>
|
||||
<li id="s3"><a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">Valve, VAC, and trust</a> <a href="https://web.archive.org/web/20180521023711/https://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/">[web.archive.org]</a> <a href="https://archive.li/06hx7">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/3/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
|
@ -9,27 +10,19 @@
|
|||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img width="100" height="37" src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<img src="../images/surf_logo.png" alt="Surf Logo"/>
|
||||
<h1>Surf</h1>
|
||||
<p>
|
||||
From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.
|
||||
</p>
|
||||
<p>From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."<sup><a href="#s1">[1]</a></sup> Program tested: v2.0 for Linux. Mitmproxy was used to check for connections.</p>
|
||||
<h2>Spyware Level: <span class="green">Not Spyware</span></h2>
|
||||
<p>
|
||||
Surf <b><span class="green">makes no unsolicited requests at all.</span></b>
|
||||
It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.
|
||||
</p>
|
||||
<p>Surf <b><span class="green">makes no unsolicited requests at all</span></b>. It is also fully libre software under the expat license. It was tested in conjunction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.</p>
|
||||
<p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources</h4>
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<center>
|
||||
<a name="1">1.</a><a href="https://surf.suckless.org/">surf.suckless.org</a>
|
||||
<a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></br>
|
||||
</center>
|
||||
<li id="s1"><a href="https://surf.suckless.org/">surf.suckless.org</a> <a href="https://ghostarchive.org/archive/jid7Y?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20200307222953/https://surf.suckless.org/">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
|
|
|
@ -9,44 +9,36 @@
|
|||
</head>
|
||||
<body>
|
||||
<div class="case">
|
||||
<div class="nav">
|
||||
<a href="index.html">← Catalog</a>
|
||||
</div>
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/telegram_logo.png" alt="Telegram Logo"/>
|
||||
<h1>Telegram</h1>
|
||||
<p>Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Not Rated</span></h2>
|
||||
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.</p>
|
||||
<p>Telegram has some privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#s1">[1]</a></sup>.</p>
|
||||
<h3>Telephone Number Required</h3>
|
||||
<p>Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.</p>
|
||||
<h3>Centralized communication routing</h3>
|
||||
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#one">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
|
||||
<p>Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.<sup><a href="#s1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.</p>
|
||||
<p>Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.</p>
|
||||
<h3>Telegram does not follow its GPLv2 Obligations</h3>
|
||||
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#two">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
|
||||
<p>Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.<sup><a href="#s2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="center">
|
||||
<h2>Sources</h2>
|
||||
<p><a id="one">1.</a>
|
||||
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
|
||||
<a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a>
|
||||
<a href="https://archive.is/qkfGr">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<p>
|
||||
<a id="two">2.</a>
|
||||
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
|
||||
<a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a>
|
||||
<a href="https://archive.is/SrX5J">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a>
|
||||
</p>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://telegram.org/privacy">Telegram Privacy Policy</a> <a href="https://web.archive.org/web/20201012074908/https://telegram.org/privacy">[web.archive.org]</a> <a href="https://archive.is/qkfGr">[archive.is]</a> <a href="https://ghostarchive.org/archive/lGDzT">[ghostarchive.org]</a></li>
|
||||
<li id="s2"><a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a> <a href="https://web.archive.org/web/20201012074643/https://github.com/overtake/TelegramSwift/issues/163">[web.archive.org]</a> <a href="https://archive.is/SrX5J">[archive.is]</a> <a href="https://ghostarchive.org/archive/j84v2?kreymer=false">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<p>This article was created on 2/18/2019</p>
|
||||
<p>This article was lasted edited on 10/11/2020</p>
|
||||
<b>This article was created on 2/18/2019</b>
|
||||
<br/>
|
||||
<b>This article was lasted edited on 10/11/2020</b>
|
||||
<hr/>
|
||||
<p>If you want to contribute to this website, you can always <a href="https://codeberg.org/shadow/SpywareWatchdog">make a pull request</a>.</p>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
|
|
|
@ -1,47 +1,36 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Ungoogled-Chromium — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo"/>
|
||||
<h1>Ungoogled-Chromium</h1>
|
||||
<p>
|
||||
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,
|
||||
control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="lime">Not Spyware</font></h2>
|
||||
<p>
|
||||
Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes
|
||||
<b><font color="lime">no unsolicited requests</font></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated
|
||||
browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it.
|
||||
Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are
|
||||
looking for a Chrome-based browser to switch too without taking the time to compile any software.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a>
|
||||
<a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a>
|
||||
<a href="http://archive.is/uLsce">[archive.is]</a><br>
|
||||
<!-- more apporpiate to link to a git/software archive, whichever one that might be -->
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 11/1/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, control, and transparency (almost all of which require manual activation or enabling).<sup><a href="#s1">[1]</a></sup></p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>Ungoogled-chromium is a fork of Chrome that has all of Google's spyware removed. It was tested with MITMproxy and makes <b><span class="lime">no unsolicited requests</span></b>, and is therefore not spyware. Ungoogled-chromium is the highest-rated browser based on <a href="../articles/chrome.html">Google Chrome</a>, and is probably one of the best choices if you can compile it. Otherwise, <a href="../guides/iridium.html">configuring Iridium</a> to a sufficient privacy standard might be a good choice if you are looking for a Chrome-based browser to switch too without taking the time to compile any software.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://github.com/Eloston/ungoogled-chromium">Ungoogled-Chromium</a> <a href="http://web.archive.org/web/20181008021159/https://github.com/Eloston/ungoogled-chromium">[web.archive.org]</a> <a href="http://archive.is/uLsce">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 11/1/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,94 +1,59 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Vivaldi — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/vivaldi_logo.png" alt="vivaldi logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/vivaldi_logo.png" alt="vivaldi logo"/>
|
||||
<h1>Vivaldi</h1>
|
||||
<p>
|
||||
Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
||||
<p>
|
||||
Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.
|
||||
</p>
|
||||
<p>Vivaldi is a feature-full, customizable web browser made by some of Opera's old developers (since they were dissatisfied with the direction Opera was heading). But how does it look in terms of privacy? Versions 1.15 and 2.0 were tested to make this article. Program used for testing requests: Mitmproxy.</p>
|
||||
<h2>Spyware Level: <span class="yellow">Medium</span></h2>
|
||||
<p>Vivaldi makes a bunch of requests to Google upon startup and after (malware protection requests can be turned off, but extension updates don't appear to?). Phones home every 24 hours with a unique ID using Piwik, an analytics service. Anti-privacy <a href="../articles/bing.html">Bing</a> as the default search engine. Not fully open source. Connects to an analytics platform that spies on its users.</p>
|
||||
<h3>Vivaldi's developers do not respect your privacy</h3>
|
||||
<p>
|
||||
Vivaldi connects to the analytics platform Piwik<sup><a href="#1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page.
|
||||
What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on,
|
||||
are <font color=red><b>not developers you can trust.</b></font> Below is an anti-privacy rant from a moderator on Vivaldi's forums:
|
||||
</p>
|
||||
<p><i>
|
||||
@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#2">[2]</a></sup>
|
||||
</i></p>
|
||||
<p>Vivaldi connects to the analytics platform Piwik<sup><a href="#s1">[1]</a></sup> that it uses to spy on its users, which is discussed in greater detail in other sections of this page. What is most notable about this is the attitude of Vivaldi's developer team: Developers that belittle privacy concerns, and insult their users further when they speak out about being spied on, are <span class="red"><b>not developers you can trust.</b></span> Below is an anti-privacy rant from a moderator on Vivaldi's forums:</p>
|
||||
<p><i>@dib_ Stop spreading FUD. Piwik as employed by Vivaldi is not "spyware." Piwik is not a "spyware company" (unless Google, Facebook, Yahoo, TVGuide, Microsoft, Apple, NYT, Huffpo, Ancestry.com, WaPo, CenturyLink and McAfee are "spyware companies" — in which case just disconnect your computer and go to bed). It is irresponsible and malicious of you to lie about Vivaldi in this fashion. If you want to know what a connection does, ask. But don't sling around reckless accusations.<sup><a href="#s2">[2]</a></sup></i></p>
|
||||
<h3>Addon updates</h3>
|
||||
<p>
|
||||
<BR>
|
||||
<img class="screenshot" src = "../images/vivaldi_update.png"><BR>
|
||||
These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <font color=red>Can't be disabled.</font>
|
||||
</p>
|
||||
<img class="screenshot" src = "../images/vivaldi_update.png" alt="Vivaldi Update"/>
|
||||
<p>These are the Chrome webstore requests, supposed to update your extensions. But with a new Vivaldi install, you don't have any, so they only accomplish spying. And the first request includes "x-googleupdate-appid" which is most likely <b>uniquely identifying</b>. <span class="red">Can't be disabled.</span></p>
|
||||
<h3>Google Safe Browsing</h3>
|
||||
<p>
|
||||
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png"><BR>
|
||||
<img class="screenshot" src = "../images/vivaldi_threatlist.png"><BR>
|
||||
Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.
|
||||
</p>
|
||||
|
||||
<img class="screenshot" src = "../images/vivaldi_safebrowsing.png" alt="Vivaldi SafeBrowsing"/>
|
||||
<img class="screenshot" src = "../images/vivaldi_threatlist.png" alt="Vivaldi Threatlist"/>
|
||||
<p>Vivaldi is downloading the lists for Google's Malware and Phishing protection, which is enabled by default, but can be disabled from the Settings menu.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: <img class="screenshot" src="../images/vivaldi_piwik.png">
|
||||
</p>
|
||||
|
||||
<p>From Vivaldi's privacy policy: "When you install Vivaldi browser ('Vivaldi'), each installation profile is <b>assigned a unique user ID</b> that is stored on your computer. Vivaldi will send a message using HTTPS directly to our servers located in Iceland every 24 hours containing this ID, version, CPU architecture, screen resolution and time since last message. We anonymize the IP address of Vivaldi users by removing the last octet of the IP address from your Vivaldi client then we store the resolved approximate location after using a local geoip lookup. The purpose of this collection is to determine the total number of active users and their geographical distribution.". So they (claim to) delete "the last octet" of your IP. How generous of them. This is the full request: </p>
|
||||
<img class="screenshot" src="../images/vivaldi_piwik.png" alt="Vivaldi Piwik"/>
|
||||
<h3>Anti-privacy search engine by default</h3>
|
||||
<p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by.
|
||||
</p>
|
||||
|
||||
<p>The default search engine is Bing, whose privacy policy states: "Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.". To make it worse, that data is shared with third parties: "We share some de-identified search query data, including voice queries, with selected third parties for research and development purposes." (you have no proof it has been "de-identified", by the way). Vivaldi has other engines preinstalled, and you can easily change it, but still, the default is all we can judge it by.</p>
|
||||
<h3>New tab sites</h3>
|
||||
<p>By default, Vivaldi contains some websites in its new tab page that have a lot of spyware in them, but does not automatically make any connection, and those sites can easily be deleted.</p>
|
||||
|
||||
<h3>Cannot be built from source code</h3>
|
||||
<p>
|
||||
"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#3">[3]</a></sup>
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://matomo.org/download/">Get Matomo</a>
|
||||
<a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a>
|
||||
<a href="http://archive.is/q9hOn">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a>
|
||||
<a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a>
|
||||
<a href="http://archive.li/8Elc9">[archive.li]</a><br>
|
||||
|
||||
<a name="3">3.</a>
|
||||
<a href="
|
||||
https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
|
||||
">The Vivaldi source code license and the EULA appear to conflict with each other...</a>
|
||||
<a href="
|
||||
https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/
|
||||
">[web.archive.org]</a>
|
||||
<a href="http://archive.li/ZoRUx">[archive.li]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 10/14/2018
|
||||
</b></p>
|
||||
<p><b>
|
||||
This article was created on 11/25/2017
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>"However, it is only our Chromium work that is found on https://vivaldi.com/source. If you were to build it and run it, nothing will display as the HTML/CSS/JS UI is missing. This UI is only available as part of our end user packages, which is covered by the EULA (in which we also bundle with a compiled version of our modified Chromium)."<sup><a href="#s3">[3]</a></sup></p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://matomo.org/download/">Get Matomo</a> <a href="https://web.archive.org/web/20180531220947/https://matomo.org/download/">[web.archive.org]</a> <a href="http://archive.is/q9hOn">[archive.is]</a></li>
|
||||
<li id="s2"><a href="https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">Return of Vivaldi spyware</a> <a href="https://web.archive.org/web/20180214185847/https://forum.vivaldi.net/topic/24029/return-of-vivaldi-spyware">[web.archive.org]</a> <a href="http://archive.li/8Elc9">[archive.li]</a></li>
|
||||
<li id="s3"><a href="https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">The Vivaldi source code license and the EULA appear to conflict with each other...</a> <a href="https://web.archive.org/web/20180410043927/https://www.reddit.com/r/vivaldibrowser/comments/62adz5/the_vivaldi_source_code_license_and_the_eula/dfn7ltm/">[web.archive.org]</a> <a href="http://archive.li/ZoRUx">[archive.li]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 10/14/2018</b>
|
||||
<br/>
|
||||
<b>This article was created on 11/25/2017</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,50 +1,41 @@
|
|||
<!--Old Style-->
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>VLC — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/vlc_logo.png" alt="VLC Media Player Logo"/>
|
||||
<h1>VLC Media Player</h1>
|
||||
<p>
|
||||
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=lime>Not Spyware</font></h2>
|
||||
<p>
|
||||
VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.
|
||||
</p>
|
||||
<p>VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.</p>
|
||||
<h2>Spyware Level: <span class="lime">Not Spyware</span></h2>
|
||||
<p>VLC Media Player is not spyware, but it does have notable features in it that could be possible forms of spyware. However, all of these features are opt-in, and the software explicitly informs the user about the risks associated with these features. VLC is a model program that has convenience features in it that could compromise privacy, while still respecting user privacy.</p>
|
||||
<h3>VLC Media Player has been distributed with spyware programs by third parties</h3>
|
||||
<p>
|
||||
While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>.
|
||||
</p>
|
||||
<p>While VLC's creators do not distribute their player with spyware, it has been distributed with spyware<sup><a href="#s1">[1]</a></sup> by other parties. If you download VLC Media Player, make sure you download it from <a href="https://www.videolan.org/">VideoLAN's website</a>.</p>
|
||||
<h3>VLC Media Player contains some opt-in spyware features</h3>
|
||||
<p>
|
||||
VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy">
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a>
|
||||
<a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a>
|
||||
<a href="https://archive.is/80IDC">[archive.is]</a>
|
||||
<a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 7/30/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>VLC Media player searches through online databases to find complete album covers / metadata for songs. This implicitly means that it sends requests to external servers, and those servers could log information about specific users' music libraries. VLC Media player also has a self-updater, however this does not update without the user's consent, and while there is no precedent for the developers to add spyware in its updates, it's still notable. This is the notice that users are presented with when first installing VLC, which adequately explains the implications of these features. The only improvement would be to not have them checked off by default.</p>
|
||||
<img class="screenshot" src="../images/vlc_privacy_policy.png" alt="privacy policy"/>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">Companies bundling spyware, adware with open-source media player</a> <a href="https://web.archive.org/web/20180410043938/https://www.zdnet.com/article/companies-bundling-spyware-adware-with-open-source-media-player/">[web.archive.org]</a> <a href="https://archive.is/80IDC">[archive.is]</a> <a href="https://ghostarchive.org/archive/zq9Ut">[ghostarchive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 7/30/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,77 +1,51 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Yahoo! Search — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/yahoo_logo.png" alt="Yahoo Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/yahoo_logo.png" alt="Yahoo Logo"/>
|
||||
<h1>Yahoo! Search</h1>
|
||||
<p>
|
||||
Yahoo! search is a search engine made by Yahoo.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your
|
||||
internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)
|
||||
</p>
|
||||
<p>
|
||||
It's important to notice that this is <b><font color=red>just scratching the surface</font></b> at the extent of spying that the Oath
|
||||
spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search.
|
||||
</p>
|
||||
<p>Yahoo! search is a search engine made by Yahoo.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Yahoo! search is integrated into the Oath spyware ecosystem, which is a merger between Yahoo and AOL. When you use Yahoo! Search, your internet history is sent to Oath, and Oath will track you across the internet. This tracking is then sold to advertisers. The Oath Privacy Policy makes it difficult to know which parts of it refer to Yahoo! search, and which parts of it refer to other Oath services, so it's difficult to quantify the extent of data collection done by Yahoo! search specifically. (combining privacy policies is a common tactic to obfusicate privacy information)</p>
|
||||
<p>It's important to notice that this is <b><span class="red">just scratching the surface</span></b> at the extent of spying that the Oath spyware platform does to its users, and only includes information collection aspects of the Oath spyware platform that could be reasonably attributed to Yahoo! search.</p>
|
||||
<h3>Integration into the "Yahoo Account" spyware platform and tracking internet history</h3>
|
||||
<p>
|
||||
Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search
|
||||
is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#1">[1]</a></sup>
|
||||
</p>
|
||||
<p>
|
||||
It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that
|
||||
they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your
|
||||
use of its services, so that you will be tracked through your usage of them, whether you have an account or not.
|
||||
</p>
|
||||
<p>Yahoo's privacy policy is actually called the "Oath" privacy policy, so it's not as simple to find. Yahoo search is integrated into the "Yahoo Account" spyware platform, which shares all of the information it collects with its parent company, Oath, including your browsing history. When you have an account connected to Oath, which would be an AOL account or a Yahoo account, your internet history is collected and associated with a unique user identity obtained through browser fingerprinting.<sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>It's important to notice that this information will be collected whether you are signed in or not. The Oath Privacy Policy makes it clear that they fingerprint your computer and so can uniquely identify you no matter what. What is probably happening is that Yahoo will fingerprint your use of its services, so that you will be tracked through your usage of them, whether you have an account or not.</p>
|
||||
<h3>Tracking users</h3>
|
||||
<p>
|
||||
The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet:
|
||||
</p>
|
||||
<p><i>
|
||||
"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#1">[1]</a></sup>
|
||||
</i></p>
|
||||
<p>The Oath Privacy Policy makes a lot of statements about how it tracks its users across their devices and across the internet:</p>
|
||||
<p><i>"We collect information from your devices (computers, mobile phones, tablets, etc.), including information about how you interact with our Services and those of our third-party partners and information that allows us to recognize and associate your activity across devices and Services. This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data."<sup><a href="#s1">[1]</a></sup></i></p>
|
||||
<h3>Selling user information to advertisers</h3>
|
||||
<p>
|
||||
The Oath privacy policy clearly states that the information it collects from you is shared with advertisers:
|
||||
</p>
|
||||
<p><i>
|
||||
"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p><i>
|
||||
"We also may use the information we have about you for the following purposes: ... <br>
|
||||
Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br>
|
||||
Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br>
|
||||
Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."
|
||||
</i><sup><a href="#1">[1]</a></sup></p>
|
||||
<p>
|
||||
A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a>
|
||||
<a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a>
|
||||
<a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a>
|
||||
<a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a><br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 8/3/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>The Oath privacy policy clearly states that the information it collects from you is shared with advertisers:</p>
|
||||
<p><i>"We may recognize your devices to provide you with personalized experiences and advertising across the devices you use."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p><i> "We also may use the information we have about you for the following purposes: ... <br/>
|
||||
Help advertisers and publishers connect to offer relevant advertising in their apps and websites.....<br/>
|
||||
Match and serve targeted advertising (across devices and both on and off of our Services) and provide targeted advertising based on your device activity, inferred interests and location information....<br/>
|
||||
Create analytics and reports for external parties, including partners, publishers, advertisers, apps, third-parties and the public regarding the use of and trends within our Services and ads, including showing trends to partners regarding general preferences, the effectiveness of ads and information on user experiences...."</i><sup><a href="#s1">[1]</a></sup></p>
|
||||
<p>A LOT more could be written but this is probably enough to understand that Yahoo! search is spyware. If you want any more, the privacy policy should speak for itself.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://policies.oath.com/us/en/oath/privacy/index.html">Welcome to the Oath Privacy Center</a> <a href="https://ghostarchive.org/archive/PKwYQ?kreymer=false">[ghostarchive.org]</a> <a href="https://web.archive.org/web/20180803155645/https://policies.oath.com/us/en/oath/privacy/index.html">[web.archive.org]</a> <a href="http://archive.is/20180709124104/https://policies.oath.com/us/en/oath/privacy/index.html">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 8/3/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
Loading…
Reference in New Issue