{"id":11474,"date":"2014-10-07T23:34:25","date_gmt":"2014-10-07T22:34:25","guid":{"rendered":"http:\/\/jurnsearch.wordpress.com\/?p=11474"},"modified":"2014-10-07T23:34:25","modified_gmt":"2014-10-07T22:34:25","slug":"adobe-spybook","status":"publish","type":"post","link":"https:\/\/jurn.link\/jurnsearch\/index.php\/2014\/10\/07\/adobe-spybook\/","title":{"rendered":"Adobe SpyBook"},"content":{"rendered":"<p>Ooops. Not content with having its Acrobat PDF reader be an ongoing and huge security risk, it seems Adobe now actively spies on its ebook readers: <a href=\"http:\/\/arstechnica.com\/security\/2014\/10\/adobes-e-book-reader-sends-your-reading-logs-back-to-adobe-in-plain-text\/\">&#8220;Adobe sends your reading logs back to Adobe &mdash; in plain text&#8221;<\/a>&#8230;<\/p>\n<blockquote><p>Adobe\u2019s Digital Editions e-book and PDF reader &mdash; an application used by thousands of libraries to give patrons access to electronic lending libraries &mdash; actively logs and reports every document readers add to their local \u201clibrary\u201d along with what users do with those files. Even worse, the logs are transmitted over the Internet in the clear, allowing anyone who can monitor network traffic &#8230; to follow along over readers\u2019 shoulders.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Ooops. Not content with having its Acrobat PDF reader be an ongoing and huge security risk, it seems Adobe now &hellip;<\/p>\n<p><a href=\"https:\/\/jurn.link\/jurnsearch\/index.php\/2014\/10\/07\/adobe-spybook\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,16],"tags":[],"class_list":["post-11474","post","type-post","status-publish","format-standard","hentry","category-ooops","category-spotted-in-the-news"],"_links":{"self":[{"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/posts\/11474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/comments?post=11474"}],"version-history":[{"count":0,"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/posts\/11474\/revisions"}],"wp:attachment":[{"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/media?parent=11474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/categories?post=11474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jurn.link\/jurnsearch\/index.php\/wp-json\/wp\/v2\/tags?post=11474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}