www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.ja.html proprieta...


From: GNUN
Subject: www/proprietary malware-apple.ja.html proprieta...
Date: Tue, 21 Jun 2016 17:00:01 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/06/21 17:00:01

Modified files:
        proprietary    : malware-apple.ja.html 
                         proprietary-sabotage.ja.html 
Added files:
        proprietary/po : malware-apple.ja-diff.html 
                         proprietary-sabotage.ja-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ja.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ja.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-apple.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ja.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-apple.ja.html       14 Apr 2016 07:49:28 -0000      1.12
+++ malware-apple.ja.html       21 Jun 2016 17:00:01 -0000      1.13
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.ja.po">
+ http://www.gnu.org/proprietary/po/malware-apple.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-04-22" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -16,6 +21,7 @@
 </style>
 
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>Appleのオペレーティング・システムはマルウェアだ</h2>
 
 <p><a 
href="/philosophy/proprietary/">そのほかのプロプライエタリなマルウェアの例</a></p>
@@ -328,7 +334,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/04/14 07:49:28 $
+$Date: 2016/06/21 17:00:01 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ja.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-sabotage.ja.html        8 Mar 2016 05:38:18 -0000       1.12
+++ proprietary-sabotage.ja.html        21 Jun 2016 17:00:01 -0000      1.13
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-sabotage.ja.po">
+ http://www.gnu.org/proprietary/po/proprietary-sabotage.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-sabotage.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-sabotage.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-04-22" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>プロプライエタリな妨害行為</h2>
 
 <a 
href="/philosophy/proprietary.html">ほかのプロプライエタリ・マルウェアの例</a>
@@ -211,7 +217,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/03/08 05:38:18 $
+$Date: 2016/06/21 17:00:01 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: po/malware-apple.ja-diff.html
diff -N po/malware-apple.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-apple.ja-diff.html       21 Jun 2016 17:00:01 -0000      1.1
@@ -0,0 +1,439 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-apple.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;title&gt;Apple's Operating Systems are Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/"&gt;Other</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;Other</em></ins></span>
 examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how the software in Apple's computer products are
+malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here's how Apple's systems are malware.&lt;/p&gt;
+
+&lt;div class="toc"&gt;
+&lt;div class="malfunctions"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an
+&lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;, which could be
+exploited by attackers to gain root privileges.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door &lt;a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door for &lt;a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+enabling it without understanding.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Apple <span class="inserted"><ins><em>censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because of which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program from the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A bug in the iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Apple
+actions that harm to the users of specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+      the user's file system for music files, copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing the security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p&gt;iOS version 9 for
+    iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-jails.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple</em></ins></span>
+  censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving the verification code Apple 
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends to Apple servers unsaved documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided to save are even more sensitive than the
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to Apple servers without asking 
permission&lt;/a&gt;.
+  This exposes the files to Big Brother and perhaps to other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't have a malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove the malfeature unless many users push back hard, and the users
+  can't remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo; of iOS seem to exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The &lt;a
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+  get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does, &lt;a
+  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  Apple uses DRM software to prevent people from charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on the fact that a new model of Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS, the operating system of the Apple iThings, is a jail for
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here is an article about the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code is written in Swift.  Users
+  cannot do this freely because they are required to identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is a crack in the prison walls, it is not big enough to
+  mean that the iThings are no longer jails.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple arbitrarily
+  &lt;a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
+  blocks users from installing old versions of iOS&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThings are tyrant devices: they do not permit
+  installing a different or modified operating system.  There is a
+  port of Android to the iThings, but installing it
+  requires &lt;a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"&gt;
+  finding a bug or &ldquo;exploit&rdquo;&lt;/a&gt; to make it possible to
+  install a different system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/06/21 17:00:01 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: po/proprietary-sabotage.ja-diff.html
diff -N po/proprietary-sabotage.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-sabotage.ja-diff.html        21 Jun 2016 17:00:01 -0000      
1.1
@@ -0,0 +1,300 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-sabotage.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+
+&lt;title&gt;Proprietary Sabotage - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;!--#include virtual="/proprietary/po/proprietary-sabotage.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Sabotage&lt;/h2&gt;
+
+&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary.html"&gt;Other</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;Other</em></ins></span>
 examples of proprietary malware&lt;/a&gt;
+
+&lt;p&gt;Here are examples of proprietary software that has something
+worse than a back door.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Once Microsoft has tricked a user 
into accepting installation
+      of Windows
+      10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+      find that they are denied the option to cancel or even postpone
+      the imposed date of installation&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;This demonstrates what we've said for years: using
+      proprietary software means letting someone have power over you,
+      and you're going to get screwed sooner or later.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+      the user's file system for music files, copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing the security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p&gt;iOS version 9 for
+    iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;Phillips &ldquo;smart&rdquo; lightbulbs had initially been 
+  designed to interact with other companies' smart light bulbs, but &lt;a 
+  
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+  later the company updated the firmware to disallow 
interoperability&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, it is 
+  cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Whether you like it or not, Microsoft
+    is &lt;a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;forcibly
+    pushing Windows update to its version 10&lt;/a&gt;, ignoring the flag on
+    Windows 7 or 8 that you could set to not upgrade.  This reaffirms
+    the presence of
+    a &lt;a href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+      delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Google has long had &lt;a
+      
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+      back door to remotely unlock an Android device&lt;/a&gt;, unless its
+      disk is encrypted (possible since Android 5.0 Lollipop, but
+      still not quite the default).&lt;/p&gt;&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Users report &lt;a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This seems to involve use of a back door in Windows 7 and 8.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Vizio
+&lt;a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users 
watch&lt;/a&gt;.
+The TVs did not do that when first sold.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Amazon
+&lt;a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
+downgraded the software in users' Swindles&lt;/a&gt;
+so that those already rooted would cease to function at 
all.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Apple &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;deleted
+from iPods the music that users had got from internet music stores
+that competed with iTunes&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/"&gt;Microsoft
+informs the NSA of bugs in Windows before fixing them.&lt;/a&gt;
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms"&gt;Nintendo
+remotely sabotaged all Wiis, making them refuse to work unless the
+user agrees to a new EULA.&lt;/a&gt;
+&lt;/p&gt;
+&lt;p&gt;We can be quite sure this EULA is is unjust because injustice is
+the only motive for imposing an EULA.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+FTDI's proprietary driver for its USB-to-serial chips has been
+designed to
+&lt;a 
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+alternative compatible chips&lt;/a&gt; so that they no longer work. Microsoft 
is &lt;a 
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
 this automatically&lt;/a&gt; as an
+&ldquo;upgrade&rdquo;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;Microsoft
+cut off security fixes for Windows XP, except to some big
+    users that pay exorbitantly.&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Microsoft is going to
+  &lt;a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
+    cut off support for some Internet Explorer versions&lt;/a&gt; in the same 
way.&lt;/p&gt;
+
+&lt;p&gt;A person or company has the right to cease to work on a
+particular program; the wrong here is Microsoft does this after having
+made the users dependent on Microsoft, because they are not free to ask
+anyone else to work on the program for them.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;The
+NSA has put back doors into nonfree encryption software.&lt;/a&gt;
+We don't know which ones they are, but we can be sure they include
+some widely used systems.  This reinforces the point that you can never
+trust the security of nonfree software.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;An
+Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+not approved by &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-jails.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple</em></ins></span>
+censorship&lt;/a&gt;.  All this was apparently intentional.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Some
+proprietary &lt;a 
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;games
+lure children to spend their parents' money&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Adobe applications have time bombs:
+they &lt;a 
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/"&gt;stop
+working after a certain time&lt;/a&gt;, after which the user must pay to
+extend the time.&lt;/p&gt;
+
+&lt;p&gt;Once there was a problem with the servers that these programs use
+to check who has paid, and
+&lt;a 
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out"&gt;the
 applications refused to work for anyone&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Sony &lt;a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3"&gt;sabotaged
+the Playstation 3&lt;/a&gt; with a firmware downgrade that removed the
+feature that allowed users to run GNU/Linux on it.&lt;/p&gt;
+
+&lt;p&gt;Sony subsequently sent police after Geohot, after he cracked the
+code that blocked users from changing the firmware, and we responded by
+calling for a &lt;a href="http://boycottsony.org"&gt;boycott of
+Sony &lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+LG &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;disabled
+network features&lt;/a&gt; on &lt;em&gt;previously purchased&lt;/em&gt;
+&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
+begin to snoop on them and distribute their personal data.
+&lt;/p&gt;&lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+Oracle's</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Oracle's</em></ins></span> 
nonfree Java plug-in for browsers &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539"&gt;sneakily</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/"&gt;sneakily</em></ins></span>
 installs other annoying proprietary software&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;That article disregards all other bad things about proprietary 
software.  For
+instance, it regards the inclusion of proprietary Flash Player (which  has a 
&lt;a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;surveillance
 feature&lt;/a&gt; and DRM) in Chrome as a good thing.  Chrome
+is a proprietary browser with a universal back door.&lt;/p&gt;
+
+&lt;p&gt;We don't agree with the article's views on those issues, but we 
present it
+as a factual reference.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;p&gt;
+In</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;In</em></ins></span> 2014, &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java"&gt;Oracle</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;Oracle</em></ins></span>
 insisted on continuing
+this <span class="removed"><del><strong>practice.&lt;/a&gt;
+&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>practice.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/06/21 17:00:01 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]