www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.de.html propr...


From: GNUN
Subject: www/proprietary malware-microsoft.de.html propr...
Date: Mon, 17 Jul 2017 00:30:34 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/07/17 00:30:33

Modified files:
        proprietary    : malware-microsoft.de.html 
                         proprietary-insecurity.de.html 
        proprietary/po : malware-microsoft.de-diff.html 
                         proprietary-insecurity.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.de.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.4&r2=1.5

Patches:
Index: malware-microsoft.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.de.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.de.html   8 May 2017 03:04:34 -0000       1.19
+++ malware-microsoft.de.html   17 Jul 2017 04:30:32 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.de.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-05-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Microsofts Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -636,7 +642,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/07/17 04:30:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-insecurity.de.html      8 May 2017 03:04:34 -0000       1.16
+++ proprietary-insecurity.de.html      17 Jul 2017 04:30:32 -0000      1.17
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-insecurity.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-insecurity.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-05-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Unsicherheit</h2>
 
 <a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a>
@@ -618,7 +624,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/07/17 04:30:32 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-microsoft.de-diff.html   24 Sep 2016 14:28:41 -0000      1.6
+++ po/malware-microsoft.de-diff.html   17 Jul 2017 04:30:33 -0000      1.7
@@ -15,12 +15,6 @@
 &lt;title&gt;Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
-&lt;style type="text/css" media="print,screen"&gt;
-&lt;!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
---&gt;
-&lt;/style&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 
 &lt;h2&gt;Microsoft's Software is Malware&lt;/h2&gt;
@@ -48,14 +42,12 @@
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;div class="toc"&gt;
-&lt;div class="malfunctions"&gt;
+&lt;div class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
-<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -69,14 +61,13 @@
     manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
 
 &lt;h3 id="back-doors"&gt;Microsoft Back Doors&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
   Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
   any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;More information on when &lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
@@ -93,11 +84,12 @@
   But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
   should have the right to decide who (if anyone) to trust in this 
way.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Windows 8's back doors are so gaping that &lt;a <span 
class="removed"><del><strong>href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</em></ins></span>
-  the German government has decided it can't be 
trusted&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+      away from Windows 8 computers with TPM 2.0 due to potential back
+      door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+&lt;li id="windows7-back-door"&gt;&lt;p&gt;Users reported that &lt;a 
     
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
@@ -119,7 +111,21 @@
 
 &lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
 
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
 &lt;ul&gt;
+
+<span class="inserted"><ins><em>&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
     &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
     allows an attacker to retrieve Microsoft account credentials, if
     the user is tricked into visiting a malicious link.&lt;/p&gt;
@@ -130,7 +136,7 @@
 into a botnet for the purpose of collecting customers' credit card
 numbers&lt;/a&gt;.
 &lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
 &lt;/ul&gt;
 
@@ -143,6 +149,22 @@
 actions that harm to the users of specific Microsoft software.&lt;/p&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt; Microsoft
+      &lt;a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
+       has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+      in a big hurry.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+      have for not doing work to support them. If it doesn't want to
+      do this work, it should let users do the work.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Microsoft has made Windows 7 and 8 cease to function on certain
+      new computers,
+      &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
    of Windows
    10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
@@ -171,7 +193,7 @@
   the old version on your future platforms.
   &lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Microsoft
+  &lt;li&gt;&lt;p&gt;Microsoft
     is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     forcibly pushing Windows
     update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
@@ -181,22 +203,22 @@
 
   &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
-      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
   Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
   repeatedly nagging many users to install Windows 10&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;
+&lt;li&gt;&lt;p&gt;
 Microsoft was for months &lt;a
 
href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
 tricking users into &ldquo;upgrading&rdquo; to Windows 10&lt;/a&gt;, if they
 failed to notice and say no.
-&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/"&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
   Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
@@ -220,8 +242,20 @@
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Windows displays
+      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for Microsoft products and its
+       partners' products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from the premise that Microsoft
+      has a right to control what Windows does to users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File Explorer&lt;/a&gt; to nag
+      users to buy subscriptions for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;In order to increase Windows 10's 
install base, Microsoft
+&lt;li&gt;In order to increase Windows 10's install base, Microsoft
 &lt;a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
 blatantly disregards user choice and privacy&lt;/a&gt;.
@@ -229,7 +263,7 @@
 
 &lt;li&gt;&lt;p&gt;Microsoft has
 started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
-users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
       &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
@@ -249,7 +283,17 @@
 
 &lt;ul&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;It appears &lt;a
+&lt;li&gt;&lt;p&gt;Windows DRM
+files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
+be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
+exists only if you use Windows.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+debugging information to Microsoft, including core dumps&lt;/a&gt;. Microsoft
+now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;It appears &lt;a
 
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
 Windows 10 sends data to Microsoft about what applications are 
 running&lt;/a&gt;.&lt;/li&gt;
@@ -261,7 +305,7 @@
 
href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
 to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+&lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
   &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
@@ -275,11 +319,11 @@
   to snoop on the users' files, text input, voice input,
   location info, contacts, calendar records and web browsing
   history, as well as automatically connecting the machines to open
-  hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>ads.&lt;/p&gt;
+  hotspots and showing targeted ads.&lt;/p&gt;
 
   &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
   demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+  look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
   &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
@@ -287,7 +331,7 @@
   turns off its Bing search and Cortana features, and activates the
   privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The unique 
&ldquo;advertising ID&rdquo; for each user enables other companies to
+  &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user 
enables other companies to
   track the browsing of each specific user.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
@@ -308,7 +352,7 @@
       Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
   Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
@@ -330,24 +374,6 @@
   maximally evil on every dimension; to make a grab for total power
   over anyone that doesn't drop Windows now.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"&gt;
-  Windows 10 requires users to give permission for total snooping&lt;/a&gt;,
-  including their files, their commands, their text input, and their
-  voice input.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;Spyware in Windows: &lt;a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
-  Windows Update snoops on the user.&lt;/a&gt;
-  &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
-  Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
-  &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
-  secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;
-  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-  Microsoft SkyDrive allows the NSA to directly examine users' 
data.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-
 &lt;/ul&gt;
 
 &lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
@@ -361,6 +387,16 @@
 
 &lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
 &lt;ul&gt;
+  &lt;li&gt;
+       &lt;p&gt;Windows 10 S ought to be called Windows 10 J, for 
&ldquo;Jail&rdquo;:
+       &lt;a 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;only
 programs from the Windows Store can be
+       downloaded and executed&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;If the history of iOS as a jail is any indication, Windows 10 J
+       will be no better.&lt;/p&gt;
+
+       &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
   Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
   user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
@@ -368,17 +404,17 @@
 
 &lt;h3 id="tyrants"&gt;Microsoft Tyrants&lt;/h3&gt;
 &lt;ul&gt;
-<span class="inserted"><ins><em>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;Microsoft accidentally left a way for users to install GNU/Linux
 on Windows RT tablets, but now it has &lt;a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;
-&ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. Those arrogant
-bastards call this &ldquo;protecting&rdquo; the users.  The article
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. They have the
+gall to call this &ldquo;protecting&rdquo; the users.  The article
 talks of installing &ldquo;Linux&rdquo;, but the context shows it is
 really &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users
 install.
 &lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
   Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;: they block
   users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
@@ -435,7 +471,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -445,7 +481,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/09/24 14:28:41 $
+$Date: 2017/07/17 04:30:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-insecurity.de-diff.html      14 Sep 2016 06:29:34 -0000      
1.4
+++ po/proprietary-insecurity.de-diff.html      17 Jul 2017 04:30:33 -0000      
1.5
@@ -20,27 +20,167 @@
 
 &lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Nonfree (proprietary) software is 
very often malware (designed to
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
-detriment of the users they ought to serve.&lt;/p&gt;</em></ins></span>
+detriment of the users they ought to serve.&lt;/p&gt;
 
 &lt;p&gt;This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.&lt;/p&gt;
 
-&lt;p&gt;It would be incorrect to compare proprietary software with a
-fictitious idea of free software as perfect.  Every nontrivial program
-has bugs, and any system, free or proprietary, may have security
-holes.  That in itself is not culpable.  But proprietary software
-developers frequently disregard gaping holes, or even introduce them
-deliberately, and &lt;em&gt;the users are helpless to fix 
them&lt;/em&gt;.&lt;/p&gt;
+&lt;p&gt;It is incorrect to compare free software with a fictitious idea of
+proprietary software as perfect, but the press often implicitly does
+that whenever a security hole in a free program is discovered.  The
+examples below show that proprietary software isn't perfect, and
+is often quite sloppy.&lt;/p&gt;
+
+&lt;p&gt;It would be equally incorrect to compare proprietary software with
+a fictitious idea of free software as perfect.  Every nontrivial
+program has bugs, and any system, free or proprietary, may have
+security errors.  To err is human, and not culpable.  But proprietary
+software developers frequently disregard gaping holes, or even
+introduce them deliberately.  In any case, they keep users
+&lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
+users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
 &lt;ul&gt;
+<span class="inserted"><ins><em>&lt;li id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
+      to watch the people who are watching TV.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Many models of Internet-connected cameras &lt;a
+  href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
+  have backdoors&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;That is a malicious functionality, but in addition it is a gross
+  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models of HP laptops logged the user's
+    keystroke to a file in the filesystem. Any process with access to
+    the filesystem or the MapViewOfFile API could gain access to the
+    log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
+    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
+    Channel enables malware authors to capture keystrokes without
+    taking the risk of being classified as malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;
+  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
+       &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
+       vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
+
+  <span class="inserted"><ins><em>&lt;p&gt;The vulnerability allowed a cracker 
to access the computer's Intel Active
+      Management Technology
+      (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
+      web interface with an empty password and gave administrative
+      access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
+      among other privileges.&lt;/p&gt;</em></ins></span>
+
+       &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
+       to turn off the Intel Management Engine. Thus, even users who are 
+       proactive about their security can do nothing to protect themselves 
+       besides using machines that don't come with the backdoor.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Due to weak security, &lt;a 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
+its security is crap&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;For example, a cracker can gain access to the dishwasher's 
filesystem, 
+infect it with malware, and force the dishwasher to launch attacks on other
+devices in the network. Since these dishwashers are used in hospitals, such
+attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;WhatsApp has a feature that 
+    &lt;a 
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
+      has been described as a &ldquo;back door&rdquo;&lt;/a&gt;
+    because it would enable governments to nullify its encryption.&lt;/p&gt;
+  &lt;p&gt;The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be
+&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
 controlled with a mobile phone&lt;/a&gt;; physical access
+is not necessary. This would enable crackers to listen in on a child's
+conversations, and even speak into the toys themselves.&lt;/p&gt;
+
+&lt;p&gt;This means a burglar could speak into the toys and ask the child to
+unlock the front door while Mommy's not looking.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The mobile apps for
+communicating &lt;a 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is in addition to the fact that the car contains a cellular
+modem that tells big brother all the time where it is.  If you own
+such a car, it would be wise to disconnect the modem so as to turn off
+the tracking.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
+phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
+ransomeware&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;4G LTE phone networks are drastically insecure. They can be
+&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
+taken
+over by third parties and used for man-in-the-middle 
attacks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Due to weak security, &lt;a 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
 is easy to open the doors of 100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -83,7 +223,7 @@
 &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
 &lt;p&gt;Over 70 brands of network-connected surveillance
 cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
 security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
@@ -382,7 +522,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -392,7 +532,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/09/14 06:29:34 $
+$Date: 2017/07/17 04:30:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]