Audacity clarifies privacy policy over spyware allegations

clock • 2 min read
Audacity clarifies privacy policy over spyware allegations
Image:

Audacity clarifies privacy policy over spyware allegations

The first version of the privacy policy mentioned sharing data with potential buyers, governments and law enforcement

Popular open-source audio-editing software Audacity has promised to revise its privacy policy, following allegations that it is being transformed into 'spyware'. The free tool has over 100 milli...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Systems Management

Microsoft announces public preview of Windows Autopatch, delays new Exchange Server to 2025

Microsoft announces public preview of Windows Autopatch, delays new Exchange Server to 2025

Autopatch transfers patching duty to Microsoft, new Exchange delayed after series of attacks

clock 06 June 2022 • 4 min read
Interview: Sunlight, AI & Machine Learning Awards finalist

Interview: Sunlight, AI & Machine Learning Awards finalist

"Sunlight was born out of a collaboration with ARM in 2013 and that was to build a lightweight hypervisor that could really efficiently virtualise low power and embedded processor platforms"

Computing Staff
clock 13 May 2022 • 2 min read
Richard Williams, integration lead for the British Army, says previous data systems were "disjointed and complex"

APIs turned the Armed Forces' IT into a retention tool

Military IT is complex: from legacy systems to operational security, there are a host of challenges to navigate.

Tom Allen
clock 20 April 2022 • 6 min read