[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.it.html malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.it.html malwa... |
Date: |
Mon, 27 Mar 2017 20:59:35 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/03/27 20:59:35
Modified files:
proprietary : malware-microsoft.it.html
malware-microsoft.ja.html
proprietary-back-doors.ja.html
Added files:
proprietary/po : malware-microsoft.it-diff.html
malware-microsoft.ja-diff.html
proprietary-back-doors.ja-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ja.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ja.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&rev=1.1
Patches:
Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.it.html 8 Dec 2016 20:57:31 -0000 1.19
+++ malware-microsoft.it.html 28 Mar 2017 00:59:35 -0000 1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.it.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-microsoft.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
</style>
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>Il software di Microsoft è malware</h2>
<p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -466,7 +472,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/12/08 20:57:31 $
+$Date: 2017/03/28 00:59:35 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ja.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.ja.html 20 Dec 2016 06:31:00 -0000 1.19
+++ malware-microsoft.ja.html 28 Mar 2017 00:59:35 -0000 1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.ja.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-microsoft.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
</style>
<!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
<h2>ãã¤ã¯ãã½ããã®ã½ããã¦ã§ã¢ã¯ãã«ã¦ã§ã¢ã </h2>
<p><a
href="/proprietary/proprietary.html">ã»ãã®ãããã©ã¤ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
@@ -337,7 +343,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2016/12/20 06:31:00 $
+$Date: 2017/03/28 00:59:35 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ja.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-back-doors.ja.html 24 Jan 2017 03:40:30 -0000 1.16
+++ proprietary-back-doors.ja.html 28 Mar 2017 00:59:35 -0000 1.17
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-back-doors.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-27" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
<h2>ãããã©ã¤ã¨ã¿ãªãªããã¯ãã¢</h2>
<p><a
href="/proprietary/proprietary.html">ã»ãã®ãããã©ã¤ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
@@ -294,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/28 00:59:35 $
<!-- timestamp end -->
</p>
Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: po/malware-microsoft.it-diff.html
diff -N po/malware-microsoft.it-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/malware-microsoft.it-diff.html 28 Mar 2017 00:59:35 -0000 1.1
@@ -0,0 +1,473 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-microsoft.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Microsoft's Software Is Malware
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<span class="removed"><del><strong><style type="text/css"
media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style></strong></del></span>
+<!--#include virtual="/server/banner.html" -->
+
+<h2>Microsoft's Software is Malware</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary
+malware</a></p>
+
+<div class="highlight-para">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+This page explains how Microsoft software is malware.
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in
+<a href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+</p>
+</div>
+
+<div <span class="removed"><del><strong>class="toc">
+<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3></em></ins></span>
+<ul>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a
href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">Insecurity</a></li>
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#interference">Interference</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+<span class="removed"><del><strong></div></strong></del></span>
+
+<h3 id="back-doors">Microsoft Back Doors</h3>
+<ul>
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk
encryption</a>.</p></li>
+
+ <li><p>Microsoft Windows has a universal back door through which
<a <span
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"></em></ins></span>
+ any change whatsoever can be imposed on the users</a>.</p>
+
+ <p>More information on when <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ this was used</a>.</p>
+
+ <p>In Windows 10, the universal back door is no longer hidden; all
“upgrades” will be
+ <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
and immediately imposed</a>.</p></li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ Windows 8 also has a back door for remotely deleting
apps</a>.</p>
+
+ <p>You might well decide to let a security service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide who (if anyone) to trust in this
way.</p></li>
+
+ <span class="removed"><del><strong><li><p>Windows 8's back doors
are so gaping that</strong></del></span>
+
+ <span class="inserted"><ins><em><li><p>German
government</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+ away from Windows 8 computers with TPM 2.0 due to potential back
+ door capabilities of</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.</p></li>
+
+<li><p>Users</strong></del></span> <span
class="inserted"><ins><em>TPM 2.0 chip</a>.</p>
+ </li>
+
+<li id="windows7-back-door"><p>Users</em></ins></span> reported
that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p>
+</li>
+
+</ul>
+
+<h3 id="insecurity">Microsoft Insecurity</h3>
+
+<ul>
+ <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
+ allows an attacker to retrieve Microsoft account credentials, if
+ the user is tricked into visiting a malicious link.</p>
+ </li>
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
+</ul>
+
+
+<h3 id="sabotage">Microsoft Sabotage</h3>
+
+<p>The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Microsoft
+actions that harm to the users of specific Microsoft software.</p>
+
+<ul>
+ <span class="inserted"><ins><em><li>
+ <p>Microsoft has made Windows 7 and 8 cease to function on certain
+ new computers,
+ <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ forcing their owners to switch to Windows 10</a>.</p>
+ </li></em></ins></span>
+
+ <li><p>Once Microsoft has tricked a user into accepting
installation
+ of Windows
+ 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find that they are denied the option to cancel or even postpone the
+ imposed date of installation</a>.
+ </p>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're
+ going to get screwed sooner or later.</p></li>
+
+ <li><p>Microsoft
+ has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+ all future Intel CPUs for Windows 7 and 8</a>. Those machines will
+ be stuck with the nastier Windows 10.
+ <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+ AMD and Qualcomm CPUs, too</a>.
+ </p>
+ <p>Of course, Windows 7 and 8 are unethical too, because they are
+ proprietary software. But this example of Microsoft's wielding its
+ power demonstrates the power it holds.
+ </p>
+ <p>Free software developers also stop maintaining old versions of
+ their programs, but this is not unfair to users because the
+ users of free software have control over it. If it is important
+ enough to you, you and other users can hire someone to support
+ the old version on your future platforms.
+ </p></li>
+
+ <li><p>Microsoft
+ is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ forcibly pushing Windows
+ update to its version 10</a>, ignoring the flag on Windows 7 or 8
+ that you could set to not upgrade. This reaffirms the presence of
+ a <a href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows 10 “upgrades” <a
+
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+ delete applications</a> without asking
permission.</p></li>
+
+ <li><p>
+ Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ repeatedly nagging many users to install Windows 10</a>.
+ </p></li>
+
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users into “upgrading” to Windows 10</a>, if they
+failed to notice and say no.
+</p></li>
+
+ <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs the NSA of bugs in Windows before fixing
them.</a></p></li>
+
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
+ Microsoft cut off security fixes for Windows XP, except to some big users
+ that pay exorbitantly.</a></p>
+
+ <p>Microsoft is going to
+ <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+ cut off support for some Internet Explorer versions</a> in the same
way.</p>
+
+ <p>A person or company has the right to cease to work on a
+ particular program; the wrong here is Microsoft does this after having
+ made the users dependent on Microsoft, because they are not free to ask
+ anyone else to work on the program for them.</p></li>
+</ul>
+
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+interference.</p>
+
+<ul>
+ <span class="inserted"><ins><em><li><p>Windows displays
+ <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its
+ partners' products</a>.</p>
+ <p>The article's author starts from the premise that Microsoft
+ has a right to control what Windows does to users, as long as it
+ doesn't go “too far”. We disagree.</p></li>
+
+ <li><p>Microsoft inserts <a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside of the File Explorer</a> to nag
+ users to buy subscriptions for the OneDrive
service.</p></li></em></ins></span>
+
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
+<li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+
+ <li><p>Microsoft
+ <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ tricking
+ users</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
+
+ <li><p>Microsoft has made companies' Windows machines managed by
the
+company's
+sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users to complain to the sysadmins about not “upgrading” to Windows
+10</a>.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+
+<ul>
+
+<span class="inserted"><ins><em><li><p>Windows DRM
+files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
+be used to identify people browsing through Tor</a>. The vulnerability
+exists only if you use Windows.
+</p></li></em></ins></span>
+
+<li><p>By default, Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+debugging information to Microsoft, including core dumps</a>. Microsoft
+now distributes them to another company.</p></li>
+
+<li>It appears <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 sends data to Microsoft about what applications are
+running</a>.</li>
+
+<li><p>A downgrade to Windows 10 deleted surveillance-detection
+applications. Then another downgrade inserted a general spying
+program. Users noticed this and complained, so Microsoft
+renamed it <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+to give users the impression it was gone</a>.</p>
+
+<p>To use proprietary software is to invite such
treatment.</p></li>
+
+ <li><p>
+ <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
+ Windows 10 comes with 13 screens of snooping options</a>, all enabled
by default,
+ and turning them off would be daunting to most users.</p></li>
+
+ <li><p>
+ Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard for the
+ privacy of its users</a>, giving Microsoft the “right”
+ to snoop on the users' files, text input, voice input,
+ location info, contacts, calendar records and web browsing
+ history, as well as automatically connecting the machines to open
+ hotspots and showing targeted ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government
on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on
demand?</p></li>
+
+ <li><p>
+ <a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if a
user
+ turns off its Bing search and Cortana features, and activates the
+ privacy-protection settings.</p></li>
+
+ <li><p>The unique “advertising ID” for each user
enables other companies to
+ track the browsing of each specific user.</p></li>
+
+ <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user.</a>
+ <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ Windows 8.1 snoops on local searches.</a> And there's a
+ <a href="http://www.marketoracle.co.uk/Article40836.html">
+ secret NSA key in Windows</a>, whose functions we don't
know.</li>
+
+ <li><p>
+ <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
data.</a></p>
+ </li>
+
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+
+ <li><p>
+ Microsoft uses Windows 10's “privacy policy” to overtly impose a
+ “right” to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government
on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimension; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
+</ul>
+
+<h3 id="drm">Microsoft DRM</h3>
+<ul>
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM (digital restrictions mechanisms) in Windows</a>, introduced to
+ cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
+ (The article also talks about how the same malware would later be introduced
+ in MacOS.)</p></li>
+</ul>
+
+<h3 id="jails">Microsoft Jails</h3>
+<ul>
+ <li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
+ Windows 8 on “mobile devices” is a jail</a>: it censors the
+ user's choice of application programs.</p></li>
+</ul>
+
+<h3 id="tyrants">Microsoft Tyrants</h3>
+<ul>
+<li>
+<p>Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
+ “fixed” the “error”</a>. <span
class="removed"><del><strong>Those arrogant
+bastards</strong></del></span> <span class="inserted"><ins><em>They have the
+gall to</em></ins></span> call this “protecting” the users. The
article
+talks of installing “Linux”, but the context shows it is
+really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
+install.
+</p>
+</li>
+ <li><p><a
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ Mobile devices that come with Windows 8 are tyrants</a>: they block
+ users from installing other or modified operating
systems.</p></li>
+</ul>
+
+
+<p>As this page shows, if you do want to clean your computer of malware,
+the first software to delete is Windows.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/28 00:59:35 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: po/malware-microsoft.ja-diff.html
diff -N po/malware-microsoft.ja-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/malware-microsoft.ja-diff.html 28 Mar 2017 00:59:35 -0000 1.1
@@ -0,0 +1,473 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-microsoft.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Microsoft's Software Is Malware
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<span class="removed"><del><strong><style type="text/css"
media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style></strong></del></span>
+<!--#include virtual="/server/banner.html" -->
+
+<h2>Microsoft's Software is Malware</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary
+malware</a></p>
+
+<div class="highlight-para">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+This page explains how Microsoft software is malware.
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in
+<a href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+</p>
+</div>
+
+<div <span class="removed"><del><strong>class="toc">
+<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3></em></ins></span>
+<ul>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a
href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">Insecurity</a></li>
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#interference">Interference</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+<span class="removed"><del><strong></div></strong></del></span>
+
+<h3 id="back-doors">Microsoft Back Doors</h3>
+<ul>
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk
encryption</a>.</p></li>
+
+ <li><p>Microsoft Windows has a universal back door through which
<a <span
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"></em></ins></span>
+ any change whatsoever can be imposed on the users</a>.</p>
+
+ <p>More information on when <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ this was used</a>.</p>
+
+ <p>In Windows 10, the universal back door is no longer hidden; all
“upgrades” will be
+ <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
and immediately imposed</a>.</p></li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ Windows 8 also has a back door for remotely deleting
apps</a>.</p>
+
+ <p>You might well decide to let a security service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide who (if anyone) to trust in this
way.</p></li>
+
+ <span class="removed"><del><strong><li><p>Windows 8's back doors
are so gaping that</strong></del></span>
+
+ <span class="inserted"><ins><em><li><p>German
government</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+ away from Windows 8 computers with TPM 2.0 due to potential back
+ door capabilities of</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.</p></li>
+
+<li><p>Users</strong></del></span> <span
class="inserted"><ins><em>TPM 2.0 chip</a>.</p>
+ </li>
+
+<li id="windows7-back-door"><p>Users</em></ins></span> reported
that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p>
+</li>
+
+</ul>
+
+<h3 id="insecurity">Microsoft Insecurity</h3>
+
+<ul>
+ <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
+ allows an attacker to retrieve Microsoft account credentials, if
+ the user is tricked into visiting a malicious link.</p>
+ </li>
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
+</ul>
+
+
+<h3 id="sabotage">Microsoft Sabotage</h3>
+
+<p>The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Microsoft
+actions that harm to the users of specific Microsoft software.</p>
+
+<ul>
+ <span class="inserted"><ins><em><li>
+ <p>Microsoft has made Windows 7 and 8 cease to function on certain
+ new computers,
+ <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ forcing their owners to switch to Windows 10</a>.</p>
+ </li></em></ins></span>
+
+ <li><p>Once Microsoft has tricked a user into accepting
installation
+ of Windows
+ 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find that they are denied the option to cancel or even postpone the
+ imposed date of installation</a>.
+ </p>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're
+ going to get screwed sooner or later.</p></li>
+
+ <li><p>Microsoft
+ has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+ all future Intel CPUs for Windows 7 and 8</a>. Those machines will
+ be stuck with the nastier Windows 10.
+ <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+ AMD and Qualcomm CPUs, too</a>.
+ </p>
+ <p>Of course, Windows 7 and 8 are unethical too, because they are
+ proprietary software. But this example of Microsoft's wielding its
+ power demonstrates the power it holds.
+ </p>
+ <p>Free software developers also stop maintaining old versions of
+ their programs, but this is not unfair to users because the
+ users of free software have control over it. If it is important
+ enough to you, you and other users can hire someone to support
+ the old version on your future platforms.
+ </p></li>
+
+ <li><p>Microsoft
+ is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ forcibly pushing Windows
+ update to its version 10</a>, ignoring the flag on Windows 7 or 8
+ that you could set to not upgrade. This reaffirms the presence of
+ a <a href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows 10 “upgrades” <a
+
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+ delete applications</a> without asking
permission.</p></li>
+
+ <li><p>
+ Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ repeatedly nagging many users to install Windows 10</a>.
+ </p></li>
+
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users into “upgrading” to Windows 10</a>, if they
+failed to notice and say no.
+</p></li>
+
+ <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs the NSA of bugs in Windows before fixing
them.</a></p></li>
+
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
+ Microsoft cut off security fixes for Windows XP, except to some big users
+ that pay exorbitantly.</a></p>
+
+ <p>Microsoft is going to
+ <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+ cut off support for some Internet Explorer versions</a> in the same
way.</p>
+
+ <p>A person or company has the right to cease to work on a
+ particular program; the wrong here is Microsoft does this after having
+ made the users dependent on Microsoft, because they are not free to ask
+ anyone else to work on the program for them.</p></li>
+</ul>
+
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+interference.</p>
+
+<ul>
+ <span class="inserted"><ins><em><li><p>Windows displays
+ <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its
+ partners' products</a>.</p>
+ <p>The article's author starts from the premise that Microsoft
+ has a right to control what Windows does to users, as long as it
+ doesn't go “too far”. We disagree.</p></li>
+
+ <li><p>Microsoft inserts <a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside of the File Explorer</a> to nag
+ users to buy subscriptions for the OneDrive
service.</p></li></em></ins></span>
+
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
+<li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+
+ <li><p>Microsoft
+ <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ tricking
+ users</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
+
+ <li><p>Microsoft has made companies' Windows machines managed by
the
+company's
+sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users to complain to the sysadmins about not “upgrading” to Windows
+10</a>.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+
+<ul>
+
+<span class="inserted"><ins><em><li><p>Windows DRM
+files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
+be used to identify people browsing through Tor</a>. The vulnerability
+exists only if you use Windows.
+</p></li></em></ins></span>
+
+<li><p>By default, Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+debugging information to Microsoft, including core dumps</a>. Microsoft
+now distributes them to another company.</p></li>
+
+<li>It appears <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 sends data to Microsoft about what applications are
+running</a>.</li>
+
+<li><p>A downgrade to Windows 10 deleted surveillance-detection
+applications. Then another downgrade inserted a general spying
+program. Users noticed this and complained, so Microsoft
+renamed it <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+to give users the impression it was gone</a>.</p>
+
+<p>To use proprietary software is to invite such
treatment.</p></li>
+
+ <li><p>
+ <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
+ Windows 10 comes with 13 screens of snooping options</a>, all enabled
by default,
+ and turning them off would be daunting to most users.</p></li>
+
+ <li><p>
+ Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard for the
+ privacy of its users</a>, giving Microsoft the “right”
+ to snoop on the users' files, text input, voice input,
+ location info, contacts, calendar records and web browsing
+ history, as well as automatically connecting the machines to open
+ hotspots and showing targeted ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government
on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on
demand?</p></li>
+
+ <li><p>
+ <a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if a
user
+ turns off its Bing search and Cortana features, and activates the
+ privacy-protection settings.</p></li>
+
+ <li><p>The unique “advertising ID” for each user
enables other companies to
+ track the browsing of each specific user.</p></li>
+
+ <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user.</a>
+ <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ Windows 8.1 snoops on local searches.</a> And there's a
+ <a href="http://www.marketoracle.co.uk/Article40836.html">
+ secret NSA key in Windows</a>, whose functions we don't
know.</li>
+
+ <li><p>
+ <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
data.</a></p>
+ </li>
+
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+
+ <li><p>
+ Microsoft uses Windows 10's “privacy policy” to overtly impose a
+ “right” to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government
on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimension; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
+</ul>
+
+<h3 id="drm">Microsoft DRM</h3>
+<ul>
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM (digital restrictions mechanisms) in Windows</a>, introduced to
+ cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
+ (The article also talks about how the same malware would later be introduced
+ in MacOS.)</p></li>
+</ul>
+
+<h3 id="jails">Microsoft Jails</h3>
+<ul>
+ <li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
+ Windows 8 on “mobile devices” is a jail</a>: it censors the
+ user's choice of application programs.</p></li>
+</ul>
+
+<h3 id="tyrants">Microsoft Tyrants</h3>
+<ul>
+<li>
+<p>Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
+ “fixed” the “error”</a>. <span
class="removed"><del><strong>Those arrogant
+bastards</strong></del></span> <span class="inserted"><ins><em>They have the
+gall to</em></ins></span> call this “protecting” the users. The
article
+talks of installing “Linux”, but the context shows it is
+really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
+install.
+</p>
+</li>
+ <li><p><a
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ Mobile devices that come with Windows 8 are tyrants</a>: they block
+ users from installing other or modified operating
systems.</p></li>
+</ul>
+
+
+<p>As this page shows, if you do want to clean your computer of malware,
+the first software to delete is Windows.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/28 00:59:35 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: po/proprietary-back-doors.ja-diff.html
diff -N po/proprietary-back-doors.ja-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/proprietary-back-doors.ja-diff.html 28 Mar 2017 00:59:35 -0000
1.1
@@ -0,0 +1,409 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-back-doors.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Proprietary Back Doors - GNU Project - Free Software
Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-back-doors.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Back Doors</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>Here are examples of demonstrated back doors in proprietary
software.</p>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<ul>
+ <li>
+ <span class="inserted"><ins><em><p>Vizio “smart”
+ TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">have
+ a universal back door</a>.</p>
+ </li>
+
+ <li><p>The Amazon Echo appears to have a universal back door,
since
+ <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ it installs “updates” automatically</a>.</p>
+ <p>We have found nothing explicitly documenting the lack of any way
to
+ disable remote changes to the software, so we are not completely sure
+ there isn't one, but it seems pretty clear.</p>
+ </li>
+
+ <li><p>Chrome has a back door <a
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">for
+ remote erasure of add-ons</a>.</p>
+ </li>
+
+ <li>
+ <p>WhatsApp <a
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">has
+ a back door that the company can use to read the plaintext
+ of messages</a>.</p>
+
+ <p>This should not come as a surprise. Nonfree software for
+ encryption is never trustworthy.</p>
+ </li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in the phone, and in server accounts, it can
+ alter them too</a>.</p>
+ </li>
+
+ <li></em></ins></span>
+ <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal back door in the application processor, for
+ Xiaomi's use</a>.</p>
+
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local
+ phone company can use</a>.</p>
+ </li>
+
+ <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
+ a driver that can be used as a backdoor by any application
+ installed on a Windows computer</a>.</p>
+ </li>
+
+ <li><p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total control of the machine by repeatedly nagging the user
+ for an admini password</a>.</p>
+ </li>
+ <li id="universal-back-door-phone-modem"><p>The universal back
door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ </li>
+
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk
encryption</a>.</p></li>
+
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+ <li>
+ <p>Dell computers, shipped with Windows, had a bogus root
+ certificate that
+ <a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed
+ anyone (not just Dell) to remotely authorize any software to
+ run</a> on the computer.</p>
+ </li>
+ <li>
+ <p>Baidu's proprietary Android library, Moplus, has a back door
+ that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
+ “upload files” as well as forcibly install
+ apps</a>.</p>
+ <p>It is used by 14,000 Android applications.</p>
+ </li>
+
+<li><p>ARRIS cable modem has a
+ <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p>
+</li>
+
+<li>
+<p>Most mobile phones have a universal back door, which has been used to
+<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of Android has a universal back door</a>. Nearly all
+models of mobile phones have a universal back door in the modem chip. So
+why did Coolpad bother to introduce another? Because this one is controlled
+by Coolpad.
+</p>
+</li>
+
+<li>
+<p>Microsoft Windows has a universal back door through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on the users</a>.
+</p>
+<p>More information on when
+<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10, the universal back door is no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
+</p>
+</li>
+
+<span class="removed"><del><strong><li>
+<p>Windows 8's back doors are so gaping that</strong></del></span>
+
+<span class="inserted"><ins><em><li><p>German
government</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>TPM 2.0
chip</a>.</p></em></ins></span>
+</li>
+
+<li>
+<p>The iPhone has a back door
+<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple to remotely delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+</p>
+</li>
+
+<li>
+<p>The iPhone has a back door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
+ </li>
+
+
+<li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also has a back door for remotely deleting apps</a>.
+</p>
+
+<p>
+You might well decide to let a security service that you trust
+remotely <em>deactivate</em> programs that it considers malicious.
+But there is no excuse for <em>deleting</em> the programs, and you
+should have the right to decide who (if anyone) to trust in this way.
+</p>
+
+<p>
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+</p>
+</li>
+
+<li>
+<p>In Android,
+<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+Google has a back door to remotely delete apps.</a> (It is in a program
+called GTalkService).
+</p>
+
+<p>
+Google can also
+<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly and remotely install apps</a> through GTalkService (which
+seems, since that article, to have been merged into Google Play).
+This is not equivalent to a universal back door, but permits various
+dirty tricks.
+</p>
+
+<p>
+Although Google's <em>exercise</em> of this power has not been
+malicious so far, the point is that nobody should have such power,
+which could also be used maliciously. You might well decide to let a
+security service remotely <em>deactivate</em> programs that it
+considers malicious. But there is no excuse for allowing it
+to <em>delete</em> the programs, and you should have the right to
+decide who (if anyone) to trust in this way.
+</p>
+</li>
+
+<li>
+<p><a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android versions come with a back
+door</a> that provides remote access to the files stored on the device.
+</p>
+</li>
+
+<li>
+<p>The Amazon Kindle-Swindle has a back door that has been used to
+<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One of the books erased was 1984, by George
Orwell.
+</p>
+
+<p>Amazon responded to criticism by saying it would delete books only
+following orders from the state. However, that policy didn't last.
+In 2012
+it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+
+
+<p>The Kindle-Swindle also has a
+<a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
+universal back door</a>.
+</p>
+</li>
+
+<li>
+<p>HP “storage appliances” that use the proprietary
+“Left Hand” operating system have back doors that give
+HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access to the customer's data, but if the back door allows installation of
+software changes, a change could be installed that would give access to the
+customer's data.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have a back door for changing settings in a dlink
+of an eye.
+</p>
+
+<p>
+<a href="https://github.com/elvanderb/TCP-32764">Many models of router
+have back doors</a>.</p>
+</li>
+
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has a backdoor</a>.</p>
+</li>
+
+<li>
+<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+Some applications come with MyFreeProxy, which is a universal back door
+that can download programs and run them.</a>
+</p>
+</li>
+</ul>
+
+<p>Here is a big problem whose details are still secret.</p>
+
+<ul>
+<li>
+<p><a
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">
+The FBI asks lots of companies to put back doors in proprietary programs.
+</a> We don't know of specific cases where this was done, but every
+proprietary program for encryption is a possibility.</p>
+</li>
+</ul>
+
+<p>Here is a suspicion that we can't prove, but is worth thinking
+about.</p>
+
+<ul>
+<li>
+<p><a
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
+for the NSA to invade computers, with the help of Microsoft, say respected
+security experts.
+</p>
+</li>
+</ul>
+
+<p>The EFF has other examples of the <a
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones">use
of back doors</a>.</p>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/28 00:59:35 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.it.html malwa...,
GNUN <=