[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.html
From: |
Pavel Kharitonov |
Subject: |
www/proprietary malware-microsoft.html |
Date: |
Thu, 1 Sep 2016 17:06:02 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: Pavel Kharitonov <ineiev> 16/09/01 17:06:02
Modified files:
proprietary : malware-microsoft.html
Log message:
Add missing entries RT #1134761.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.37&r2=1.38
Patches:
Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-microsoft.html 28 Aug 2016 15:58:12 -0000 1.37
+++ malware-microsoft.html 1 Sep 2016 17:06:02 -0000 1.38
@@ -82,6 +82,25 @@
<li><p>Windows 8's back doors are so gaping that <a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
the German government has decided it can't be trusted</a>.</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of a back door in Windows 7 and 8.</p>
+</li>
+
</ul>
<h3 id="insecurity">Microsoft Insecurity</h3>
@@ -91,6 +110,14 @@
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
</li>
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
</ul>
@@ -132,8 +159,7 @@
<li><p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly
- pushing</a> <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
+ forcibly pushing Windows
update to its version 10</a>, ignoring the flag on Windows 7 or 8
that you could set to not upgrade. This reaffirms the presence of
a <a href="/proprietary/proprietary-back-doors.html">universal
@@ -148,6 +174,13 @@
repeatedly nagging many users to install Windows 10</a>.
</p></li>
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users into “upgrading” to Windows 10</a>, if they
+fail to notice and say no.
+</p></li>
+
<li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">
Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
@@ -194,6 +227,21 @@
<h3 id="surveillance">Microsoft Surveillance</h3>
<ul>
+
+<li>It appears <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 sends data to Microsoft about what applications are
+running</a>.</li>
+
+<li><p>A downgrade to Windows 10 deleted surveillance-detection
+applications. Then another downgrade inserted a general spying
+program. Users noticed this and complained, so Microsoft
+renamed it <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+to give users the impression it was gone</a>.</p>
+
+<p>To use proprietary software is to invite such treatment.</p></li>
+
<li><p>
<a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
Windows 10 comes with 13 screens of snooping options</a>, all enabled by
default,
@@ -232,6 +280,35 @@
<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
</li>
+
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+
+ <li><p>
+ Microsoft uses Windows 10's “privacy policy” to overtly impose a
+ “right” to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimension; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
</ul>
<h3 id="drm">Microsoft DRM</h3>
@@ -329,7 +406,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/28 15:58:12 $
+$Date: 2016/09/01 17:06:02 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-microsoft.html,
Pavel Kharitonov <=