www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.it.html malwa...


From: GNUN
Subject: www/proprietary malware-microsoft.it.html malwa...
Date: Mon, 27 Mar 2017 20:59:35 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/03/27 20:59:35

Modified files:
        proprietary    : malware-microsoft.it.html 
                         malware-microsoft.ja.html 
                         proprietary-back-doors.ja.html 
Added files:
        proprietary/po : malware-microsoft.it-diff.html 
                         malware-microsoft.ja-diff.html 
                         proprietary-back-doors.ja-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ja.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ja.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.it.html   8 Dec 2016 20:57:31 -0000       1.19
+++ malware-microsoft.it.html   28 Mar 2017 00:59:35 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.it.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
 </style>
 
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Il software di Microsoft è malware</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -466,7 +472,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/12/08 20:57:31 $
+$Date: 2017/03/28 00:59:35 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ja.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.ja.html   20 Dec 2016 06:31:00 -0000      1.19
+++ malware-microsoft.ja.html   28 Mar 2017 00:59:35 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.ja.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
 </style>
 
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>マイクロソフトのソフトウェアはマルウェアだ</h2>
 
 <p><a 
href="/proprietary/proprietary.html">ほかのプロプライエタリ・マルウェアの例</a></p>
@@ -337,7 +343,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/12/20 06:31:00 $
+$Date: 2017/03/28 00:59:35 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ja.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-back-doors.ja.html      24 Jan 2017 03:40:30 -0000      1.16
+++ proprietary-back-doors.ja.html      28 Mar 2017 00:59:35 -0000      1.17
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>プロプライエタリなバックドア</h2>
 
 <p><a 
href="/proprietary/proprietary.html">ほかのプロプライエタリ・マルウェアの例</a></p>
@@ -294,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/28 00:59:35 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: po/malware-microsoft.it-diff.html
diff -N po/malware-microsoft.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-microsoft.it-diff.html   28 Mar 2017 00:59:35 -0000      1.1
@@ -0,0 +1,473 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-microsoft.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Microsoft's Software Is Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;</strong></del></span>
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Microsoft's Software is Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how Microsoft software is malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div <span class="removed"><del><strong>class="toc"&gt;
+&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+&lt;ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+
+&lt;h3 id="back-doors"&gt;Microsoft Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+  Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;</em></ins></span>
+  any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;More information on when &lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+  this was used&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
 and immediately imposed&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+  Windows 8 also has a back door for remotely deleting 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;You might well decide to let a security service that you trust
+  remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+  But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+  should have the right to decide who (if anyone) to trust in this 
way.&lt;/p&gt;&lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Windows 8's back doors 
are so gaping that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+      away from Windows 8 computers with TPM 2.0 due to potential back
+      door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users</strong></del></span> <span 
class="inserted"><ins><em>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+&lt;li id="windows7-back-door"&gt;&lt;p&gt;Users</em></ins></span> reported 
that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
+    allows an attacker to retrieve Microsoft account credentials, if
+    the user is tricked into visiting a malicious link.&lt;/p&gt;
+    &lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+
+&lt;h3 id="sabotage"&gt;Microsoft Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Microsoft
+actions that harm to the users of specific Microsoft software.&lt;/p&gt;
+
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;Microsoft has made Windows 7 and 8 cease to function on certain
+      new computers,
+      &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
+   of Windows
+   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find that they are denied the option to cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
+   &lt;/p&gt;
+   &lt;p&gt;This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+  has &lt;a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
+  all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those machines will
+  be stuck with the nastier Windows 10.
+  &lt;a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
+  AMD and Qualcomm CPUs, too&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;Of course, Windows 7 and 8 are unethical too, because they are
+  proprietary software.  But this example of Microsoft's wielding its
+  power demonstrates the power it holds.
+  &lt;/p&gt;
+  &lt;p&gt;Free software developers also stop maintaining old versions of
+  their programs, but this is not unfair to users because the
+  users of free software have control over it.  If it is important
+  enough to you, you and other users can hire someone to support
+  the old version on your future platforms.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
+    forcibly pushing Windows
+    update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
+    that you could set to not upgrade.  This reaffirms the presence of
+    a &lt;a href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+  repeatedly nagging many users to install Windows 10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Microsoft was for months &lt;a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
+tricking users into &ldquo;upgrading&rdquo; to Windows 10&lt;/a&gt;, if they
+failed to notice and say no.
+&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
+  Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
+  Microsoft cut off security fixes for Windows XP, except to some big users
+  that pay exorbitantly.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;Microsoft is going to
+  &lt;a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
+  cut off support for some Internet Explorer versions&lt;/a&gt; in the same 
way.&lt;/p&gt;
+
+  &lt;p&gt;A person or company has the right to cease to work on a
+  particular program; the wrong here is Microsoft does this after having
+  made the users dependent on Microsoft, because they are not free to ask
+  anyone else to work on the program for them.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows displays
+      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for Microsoft products and its
+       partners' products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from the premise that Microsoft
+      has a right to control what Windows does to users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File Explorer&lt;/a&gt; to nag
+      users to buy subscriptions for the OneDrive 
service.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;In order to increase Windows 10's install base, Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+        tricking
+        users&lt;/a&gt; &lt;a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
+company's
+sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
+
+&lt;ul&gt;
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows DRM
+files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
+be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
+exists only if you use Windows.
+&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+debugging information to Microsoft, including core dumps&lt;/a&gt;. Microsoft
+now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;It appears &lt;a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
+Windows 10 sends data to Microsoft about what applications are 
+running&lt;/a&gt;.&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;A downgrade to Windows 10 deleted surveillance-detection
+applications.  Then another downgrade inserted a general spying
+program.  Users noticed this and complained, so Microsoft
+renamed it &lt;a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+  Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled 
by default,
+  and turning them off would be daunting to most users.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+  ships with default settings that show no regard for the
+  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
+  to snoop on the users' files, text input, voice input,
+  location info, contacts, calendar records and web browsing
+  history, as well as automatically connecting the machines to open
+  hotspots and showing targeted ads.&lt;/p&gt;
+
+  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user 
enables other companies to
+  track the browsing of each specific user.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+  Windows Update snoops on the user.&lt;/a&gt;
+  &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
+  Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
+  &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
+  secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+  Microsoft SkyDrive allows the NSA to directly examine users' 
data.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
+  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
+  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
+  as in other issues.&lt;/p&gt;
+
+  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on demand?&lt;/p&gt;
+
+  &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
+  track the browsing of each specific user.&lt;/p&gt;
+
+  &lt;p&gt;It's as if Microsoft has deliberately chosen to make Windows 10
+  maximally evil on every dimension; to make a grab for total power
+  over anyone that doesn't drop Windows now.&lt;/p&gt;&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM (digital restrictions mechanisms) in Windows&lt;/a&gt;, introduced to
+  cater to &lt;a 
href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt; disks.
+  (The article also talks about how the same malware would later be introduced
+  in MacOS.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
+  Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
+  user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Microsoft Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has &lt;a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. <span 
class="removed"><del><strong>Those arrogant
+bastards</strong></del></span> <span class="inserted"><ins><em>They have the
+gall to</em></ins></span> call this &ldquo;protecting&rdquo; the users.  The 
article
+talks of installing &ldquo;Linux&rdquo;, but the context shows it is
+really &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users
+install.
+&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
+  Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;: they block
+  users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;p&gt;As this page shows, if you do want to clean your computer of malware,
+the first software to delete is Windows.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/28 00:59:35 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: po/malware-microsoft.ja-diff.html
diff -N po/malware-microsoft.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-microsoft.ja-diff.html   28 Mar 2017 00:59:35 -0000      1.1
@@ -0,0 +1,473 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-microsoft.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Microsoft's Software Is Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;</strong></del></span>
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Microsoft's Software is Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how Microsoft software is malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div <span class="removed"><del><strong>class="toc"&gt;
+&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+&lt;ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+
+&lt;h3 id="back-doors"&gt;Microsoft Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+  Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;</em></ins></span>
+  any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;More information on when &lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+  this was used&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
 and immediately imposed&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+  Windows 8 also has a back door for remotely deleting 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;You might well decide to let a security service that you trust
+  remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+  But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+  should have the right to decide who (if anyone) to trust in this 
way.&lt;/p&gt;&lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Windows 8's back doors 
are so gaping that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+      away from Windows 8 computers with TPM 2.0 due to potential back
+      door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users</strong></del></span> <span 
class="inserted"><ins><em>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+&lt;li id="windows7-back-door"&gt;&lt;p&gt;Users</em></ins></span> reported 
that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
+    allows an attacker to retrieve Microsoft account credentials, if
+    the user is tricked into visiting a malicious link.&lt;/p&gt;
+    &lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+
+&lt;h3 id="sabotage"&gt;Microsoft Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Microsoft
+actions that harm to the users of specific Microsoft software.&lt;/p&gt;
+
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;Microsoft has made Windows 7 and 8 cease to function on certain
+      new computers,
+      &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
+   of Windows
+   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find that they are denied the option to cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
+   &lt;/p&gt;
+   &lt;p&gt;This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+  has &lt;a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
+  all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those machines will
+  be stuck with the nastier Windows 10.
+  &lt;a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
+  AMD and Qualcomm CPUs, too&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;Of course, Windows 7 and 8 are unethical too, because they are
+  proprietary software.  But this example of Microsoft's wielding its
+  power demonstrates the power it holds.
+  &lt;/p&gt;
+  &lt;p&gt;Free software developers also stop maintaining old versions of
+  their programs, but this is not unfair to users because the
+  users of free software have control over it.  If it is important
+  enough to you, you and other users can hire someone to support
+  the old version on your future platforms.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
+    forcibly pushing Windows
+    update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
+    that you could set to not upgrade.  This reaffirms the presence of
+    a &lt;a href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+  repeatedly nagging many users to install Windows 10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Microsoft was for months &lt;a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
+tricking users into &ldquo;upgrading&rdquo; to Windows 10&lt;/a&gt;, if they
+failed to notice and say no.
+&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
+  Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
+  Microsoft cut off security fixes for Windows XP, except to some big users
+  that pay exorbitantly.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;Microsoft is going to
+  &lt;a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
+  cut off support for some Internet Explorer versions&lt;/a&gt; in the same 
way.&lt;/p&gt;
+
+  &lt;p&gt;A person or company has the right to cease to work on a
+  particular program; the wrong here is Microsoft does this after having
+  made the users dependent on Microsoft, because they are not free to ask
+  anyone else to work on the program for them.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows displays
+      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for Microsoft products and its
+       partners' products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from the premise that Microsoft
+      has a right to control what Windows does to users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File Explorer&lt;/a&gt; to nag
+      users to buy subscriptions for the OneDrive 
service.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;In order to increase Windows 10's install base, Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+        tricking
+        users&lt;/a&gt; &lt;a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
+company's
+sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
+
+&lt;ul&gt;
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows DRM
+files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
+be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
+exists only if you use Windows.
+&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+debugging information to Microsoft, including core dumps&lt;/a&gt;. Microsoft
+now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;It appears &lt;a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
+Windows 10 sends data to Microsoft about what applications are 
+running&lt;/a&gt;.&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;A downgrade to Windows 10 deleted surveillance-detection
+applications.  Then another downgrade inserted a general spying
+program.  Users noticed this and complained, so Microsoft
+renamed it &lt;a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+  Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled 
by default,
+  and turning them off would be daunting to most users.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+  ships with default settings that show no regard for the
+  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
+  to snoop on the users' files, text input, voice input,
+  location info, contacts, calendar records and web browsing
+  history, as well as automatically connecting the machines to open
+  hotspots and showing targeted ads.&lt;/p&gt;
+
+  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user 
enables other companies to
+  track the browsing of each specific user.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+  Windows Update snoops on the user.&lt;/a&gt;
+  &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
+  Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
+  &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
+  secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+  Microsoft SkyDrive allows the NSA to directly examine users' 
data.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
+  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
+  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
+  as in other issues.&lt;/p&gt;
+
+  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on demand?&lt;/p&gt;
+
+  &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
+  track the browsing of each specific user.&lt;/p&gt;
+
+  &lt;p&gt;It's as if Microsoft has deliberately chosen to make Windows 10
+  maximally evil on every dimension; to make a grab for total power
+  over anyone that doesn't drop Windows now.&lt;/p&gt;&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM (digital restrictions mechanisms) in Windows&lt;/a&gt;, introduced to
+  cater to &lt;a 
href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt; disks.
+  (The article also talks about how the same malware would later be introduced
+  in MacOS.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
+  Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
+  user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Microsoft Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has &lt;a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. <span 
class="removed"><del><strong>Those arrogant
+bastards</strong></del></span> <span class="inserted"><ins><em>They have the
+gall to</em></ins></span> call this &ldquo;protecting&rdquo; the users.  The 
article
+talks of installing &ldquo;Linux&rdquo;, but the context shows it is
+really &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users
+install.
+&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
+  Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;: they block
+  users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;p&gt;As this page shows, if you do want to clean your computer of malware,
+the first software to delete is Windows.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/28 00:59:35 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: po/proprietary-back-doors.ja-diff.html
diff -N po/proprietary-back-doors.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-back-doors.ja-diff.html      28 Mar 2017 00:59:35 -0000      
1.1
@@ -0,0 +1,409 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-back-doors.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Proprietary Back Doors - GNU Project - Free Software 
Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-back-doors.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Back Doors&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of demonstrated back doors in proprietary 
software.&lt;/p&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Vizio &ldquo;smart&rdquo;
+    TVs &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;have
+    a universal back door&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The Amazon Echo appears to have a universal back door, 
since
+      &lt;a 
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+      it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We have found nothing explicitly documenting the lack of any way 
to
+      disable remote changes to the software, so we are not completely sure
+      there isn't one, but it seems pretty clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
+    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;WhatsApp &lt;a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has
+        a back door that the company can use to read the plaintext
+        of messages&lt;/a&gt;.&lt;/p&gt;
+    
+        &lt;p&gt;This should not come as a surprise. Nonfree software for
+          encryption is never trustworthy.&lt;/p&gt;
+  &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+        can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+        on many sorts of data in the phone, and in server accounts, it can
+        alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;</em></ins></span>
+        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door in the application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+           universal back door in the modem processor that the local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
+        a driver that can be used as a backdoor by any application
+        installed on a Windows computer&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The Dropbox app for Macintosh &lt;a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total control of the machine by repeatedly nagging the user
+        for an admini password&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+  &lt;li id="universal-back-door-phone-modem"&gt;&lt;p&gt;The universal back 
door in portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+ 
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+      collected by various cr&hellip;apps and sites made by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, games that cost money 
+      can use the same tactics.&lt;/p&gt;    
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Dell computers, shipped with Windows, had a bogus root
+      certificate that
+      &lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
+      anyone (not just Dell) to remotely authorize any software to
+      run&lt;/a&gt; on the computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door
+      that &lt;a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
+      &ldquo;upload files&rdquo; as well as forcibly install
+      apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+  &lt;/li&gt;
+  
+&lt;li&gt;&lt;p&gt;ARRIS cable modem has a
+  &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Most mobile phones have a universal back door, which has been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have a universal back door in the modem chip. So
+why did Coolpad bother to introduce another? Because this one is controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has a universal back door through which
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on the users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Windows 8's back doors are so gaping that</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also has a back door for remotely deleting apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide to let a security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers malicious.
+But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and you
+should have the right to decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;In Android,
+&lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google can also
+&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
+seems, since that article, to have been merged into Google Play).
+This is not equivalent to a universal back door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+malicious so far, the point is that nobody should have such power,
+which could also be used maliciously.  You might well decide to let a
+security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
+decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android versions come with a back
+door&lt;/a&gt; that provides remote access to the files stored on the device.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to
+&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One of the books erased was 1984, by George 
Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded to criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The Kindle-Swindle also has a
+&lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
+universal back door&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give
+HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access to the customer's data, but if the back door allows installation of
+software changes, a change could be installed that would give access to the
+customer's data.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a dlink
+of an eye.
+&lt;/p&gt;
+
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
+have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+Some applications come with MyFreeProxy, which is a universal back door
+that can download programs and run them.&lt;/a&gt;
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a big problem whose details are still secret.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
+The FBI asks lots of companies to put back doors in proprietary programs.
+&lt;/a&gt; We don't know of specific cases where this was done, but every
+proprietary program for encryption is a possibility.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a suspicion that we can't prove, but is worth thinking
+about.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"&gt;
+Writable microcode for Intel and AMD microprocessors&lt;/a&gt; may be a vehicle
+for the NSA to invade computers, with the help of Microsoft, say respected
+security experts.
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;The EFF has other examples of the &lt;a 
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;use 
of back doors&lt;/a&gt;.&lt;/p&gt;
+
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 2014-2017 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/28 00:59:35 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]