[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.de.html malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.de.html malwa... |
Date: |
Mon, 12 Mar 2018 22:30:29 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/03/12 22:30:28
Modified files:
proprietary : malware-microsoft.de.html
malware-microsoft.it.html
malware-mobiles.it.html
proprietary-subscriptions.de.html
proprietary/po : malware-microsoft.de-diff.html
malware-microsoft.it-diff.html
malware-mobiles.it-diff.html
Added files:
proprietary/po : proprietary-subscriptions.de-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.de.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&rev=1.1
Patches:
Index: malware-microsoft.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.de.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-microsoft.de.html 11 Nov 2017 01:58:29 -0000 1.23
+++ malware-microsoft.de.html 13 Mar 2018 02:30:28 -0000 1.24
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.de.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-microsoft.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Microsofts Software ist Schadsoftware</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -657,7 +663,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/11/11 01:58:29 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-microsoft.it.html 31 Dec 2017 12:29:58 -0000 1.26
+++ malware-microsoft.it.html 13 Mar 2018 02:30:28 -0000 1.27
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.it.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-microsoft.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>Il software di Microsoft è malware</h2>
<p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -530,7 +536,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/12/31 12:29:58 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-mobiles.it.html 31 Dec 2017 12:29:58 -0000 1.20
+++ malware-mobiles.it.html 13 Mar 2018 02:30:28 -0000 1.21
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.it.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-mobiles.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.84 -->
@@ -14,6 +19,7 @@
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>Malware nei dispositivi mobili</h2>
<p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -537,7 +543,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/12/31 12:29:58 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
Index: proprietary-subscriptions.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-subscriptions.de.html 1 Feb 2017 12:01:16 -0000 1.1
+++ proprietary-subscriptions.de.html 13 Mar 2018 02:30:28 -0000 1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-subscriptions.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-subscriptions.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-subscriptions.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-subscriptions.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-subscriptions.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-subscriptions.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-subscriptions.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Proprietäre Abonnements</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -122,7 +128,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/02/01 12:01:16 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-microsoft.de-diff.html 17 Jul 2017 04:30:33 -0000 1.7
+++ po/malware-microsoft.de-diff.html 13 Mar 2018 02:30:28 -0000 1.8
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
<title>Microsoft's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
@@ -59,6 +59,7 @@
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
+<span class="inserted"><ins><em><li><a
href="#subscriptions">Subscriptions</a></li></em></ins></span>
</ul>
</div>
@@ -118,13 +119,13 @@
<ul>
-<span class="inserted"><ins><em><li>
+<li>
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to
<a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
of Windows computers with ransomware</a>.
</p>
-</li></em></ins></span>
+</li>
<li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
allows an attacker to retrieve Microsoft account credentials, if
@@ -283,6 +284,23 @@
<ul>
+<li><p>Windows 10 telemetry program sends information to Microsoft
about the
+user's computer and their use of the computer.</p>
+
+<p>Furthermore, for users who installed the fourth stable build of
+Windows 10, called the “Creators Update,” Windows maximized the
+surveillance <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to <span
class="removed"><del><strong>“Full”</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>“Full”</a>.</p>
+
+<p>The <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+ “Full” telemetry mode</a> allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li></em></ins></span>
+
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
be used to identify people browsing through Tor</a>. The vulnerability
@@ -420,6 +438,15 @@
users from installing other or modified operating
systems.</p></li>
</ul>
+<span class="inserted"><ins><em><h3 id="subscriptions">Microsoft
Subscriptions</h3>
+
+<ul>
+<li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
+</ul></em></ins></span>
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -471,7 +498,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -481,7 +508,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/07/17 04:30:33 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-microsoft.it-diff.html 28 Mar 2017 00:59:35 -0000 1.1
+++ po/malware-microsoft.it-diff.html 13 Mar 2018 02:30:28 -0000 1.2
@@ -11,16 +11,10 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
<title>Microsoft's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
-<span class="removed"><del><strong><style type="text/css"
media="print,screen">
-<!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
--->
-</style></strong></del></span>
<!--#include virtual="/server/banner.html" -->
<h2>Microsoft's Software is Malware</h2>
@@ -48,11 +42,9 @@
</p>
</div>
-<div <span class="removed"><del><strong>class="toc">
-<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>class="summary" style="margin-top: 2em">
-<h3>Type of malware</h3></em></ins></span>
+<div class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3>
<ul>
-<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
<li><a href="#insecurity">Insecurity</a></li>
@@ -67,16 +59,16 @@
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
+<span class="inserted"><ins><em><li><a
href="#subscriptions">Subscriptions</a></li></em></ins></span>
</ul>
</div>
-<span class="removed"><del><strong></div></strong></del></span>
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored its disk
encryption</a>.</p></li>
- <li><p>Microsoft Windows has a universal back door through which
<a <span
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"></em></ins></span>
+ <li><p>Microsoft Windows has a universal back door through which
<a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
any change whatsoever can be imposed on the users</a>.</p>
<p>More information on when <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
@@ -93,17 +85,12 @@
But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide who (if anyone) to trust in this
way.</p></li>
- <span class="removed"><del><strong><li><p>Windows 8's back doors
are so gaping that</strong></del></span>
-
- <span class="inserted"><ins><em><li><p>German
government</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+ <li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
away from Windows 8 computers with TPM 2.0 due to potential back
- door capabilities of</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.</p></li>
-
-<li><p>Users</strong></del></span> <span
class="inserted"><ins><em>TPM 2.0 chip</a>.</p>
+ door capabilities of the TPM 2.0 chip</a>.</p>
</li>
-<li id="windows7-back-door"><p>Users</em></ins></span> reported
that <a
+<li id="windows7-back-door"><p>Users reported that <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
@@ -125,7 +112,21 @@
<h3 id="insecurity">Microsoft Insecurity</h3>
+<p>These bugs are/were not intentional, so unlike the rest of the file
+ they do not count as malware. We mention them to refute the
+ supposition that prestigious proprietary software doesn't have grave
+ bugs.</p>
+
<ul>
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
@@ -149,12 +150,21 @@
actions that harm to the users of specific Microsoft software.</p>
<ul>
- <span class="inserted"><ins><em><li>
+ <li><p> Microsoft
+ <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
+ has dropped support for Windows 7 and 8 on recent processors</a>
+ in a big hurry.</p>
+ <p>It makes no difference what legitimate reasons Microsoft might
+ have for not doing work to support them. If it doesn't want to
+ do this work, it should let users do the work.</p>
+ </li>
+
+ <li>
<p>Microsoft has made Windows 7 and 8 cease to function on certain
new computers,
<a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
forcing their owners to switch to Windows 10</a>.</p>
- </li></em></ins></span>
+ </li>
<li><p>Once Microsoft has tricked a user into accepting
installation
of Windows
@@ -233,7 +243,7 @@
interference.</p>
<ul>
- <span class="inserted"><ins><em><li><p>Windows displays
+ <li><p>Windows displays
<a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads for Microsoft products and its
partners' products</a>.</p>
@@ -244,7 +254,7 @@
<li><p>Microsoft inserts <a
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
annoying advertisements inside of the File Explorer</a> to nag
- users to buy subscriptions for the OneDrive
service.</p></li></em></ins></span>
+ users to buy subscriptions for the OneDrive service.</p></li>
<li>In order to increase Windows 10's install base, Microsoft
<a
@@ -274,11 +284,28 @@
<ul>
-<span class="inserted"><ins><em><li><p>Windows DRM
+<li><p>Windows 10 telemetry program sends information to Microsoft
about the
+user's computer and their use of the computer.</p>
+
+<p>Furthermore, for users who installed the fourth stable build of
+Windows 10, called the “Creators Update,” Windows maximized the
+surveillance <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to
“Full”</a>.</p>
+
+<p>The <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+ “Full” telemetry mode</a> allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
+
+<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
be used to identify people browsing through Tor</a>. The vulnerability
exists only if you use Windows.
-</p></li></em></ins></span>
+</p></li>
<li><p>By default, Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
debugging information to Microsoft, including core dumps</a>. Microsoft
@@ -378,6 +405,16 @@
<h3 id="jails">Microsoft Jails</h3>
<ul>
+ <li>
+ <p>Windows 10 S ought to be called Windows 10 J, for
“Jail”:
+ <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">only
programs from the Windows Store can be
+ downloaded and executed</a>.</p>
+
+ <p>If the history of iOS as a jail is any indication, Windows 10 J
+ will be no better.</p>
+
+ </li>
+
<li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
Windows 8 on “mobile devices” is a jail</a>: it censors the
user's choice of application programs.</p></li>
@@ -389,9 +426,8 @@
<p>Microsoft accidentally left a way for users to install GNU/Linux
on Windows RT tablets, but now it has <a
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
- “fixed” the “error”</a>. <span
class="removed"><del><strong>Those arrogant
-bastards</strong></del></span> <span class="inserted"><ins><em>They have the
-gall to</em></ins></span> call this “protecting” the users. The
article
+ “fixed” the “error”</a>. They have the
+gall to call this “protecting” the users. The article
talks of installing “Linux”, but the context shows it is
really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
install.
@@ -402,6 +438,15 @@
users from installing other or modified operating
systems.</p></li>
</ul>
+<span class="inserted"><ins><em><h3 id="subscriptions">Microsoft
Subscriptions</h3>
+
+<ul>
+<li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
+</ul></em></ins></span>
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -453,7 +498,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -463,7 +508,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/03/28 00:59:35 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-mobiles.it-diff.html 30 Dec 2017 13:29:19 -0000 1.10
+++ po/malware-mobiles.it-diff.html 13 Mar 2018 02:30:28 -0000 1.11
@@ -11,14 +11,14 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.85</em></ins></span> -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
-<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
+<style type="text/css" media="print,screen"><!--
li dl { margin-top: .3em; }
li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
li dl dd { margin: 0 3%; }
---></style></em></ins></span>
+--></style>
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
@@ -43,8 +43,49 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+
+<span class="inserted"><ins><em><p>Nearly all mobile phones do two
grievous wrongs to their users:
+tracking their movements, and listening to their conversations. This
+is why we call them “Stalin's dream”.</p></em></ins></span>
</div>
+<span class="inserted"><ins><em><ul>
+ <li><p>The phone network
+ <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ tracks the movements of each phone</a>.</p>
+ <p>This is inherent in the design of the phone network: as long as
+ the phone is in communication with the network, there is no way
+ to stop the network from recording its location. Many countries
+ (including the US and the EU) require the network to store all
+ these location data for months or years.</p>
+ </li>
+ <li><p id="universal-back-door">Almost every phone's
communication processor has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
+ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their
movements
+ are tracked, and may also make the listening feature work.</p>
+ </li>
+</ul></em></ins></span>
+
<p>Here are examples of malware in mobile devices. See also
the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple
iThings.</p>
@@ -71,20 +112,18 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <span class="removed"><del><strong><li
id="back-door-microphone"></strong></del></span>
- <span class="inserted"><ins><em><li></em></ins></span>
- <p>The universal back door in portable phones
- <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is</em></ins></span> employed to listen through their
microphones</a>.</p>
- <span class="removed"><del><strong></li>
-
- <li id="back-door-malicious"></strong></del></span>
- <p>Most mobile phones have <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> universal back door, which has
been
+ <li>
+ <span class="removed"><del><strong><p>The</strong></del></span>
+ <span class="inserted"><ins><em><p>See above for the <a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span>
+ <span class="inserted"><ins><em>door</a></em></ins></span> in
<span class="removed"><del><strong>portable phones
+ <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed to listen through their microphones</a>.</p>
+ <p>Most</strong></del></span> <span
class="inserted"><ins><em>essentially all</em></ins></span> mobile <span
class="removed"><del><strong>phones have this universal back
door,</strong></del></span> <span
class="inserted"><ins><em>phones,</em></ins></span> which <span
class="removed"><del><strong>has been
used to
<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <span class="inserted"><ins><em><p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></em></ins></span>
+ turn</strong></del></span> <span class="inserted"><ins><em>permits
converting</em></ins></span>
+ them <span class="removed"><del><strong>malicious</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>into full-time listening
devices.</p></em></ins></span>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
@@ -98,17 +137,25 @@
</li>
<li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a> (It</strong></del></span> <span
class="inserted"><ins><em>apps</a> (it</em></ins></span> is in a program
- called GTalkService).
+ <p>In Android,
+ <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps</a> (it is</strong></del></span> <span
class="inserted"><ins><em>apps.</a> (It was</em></ins></span> in a
+ program called <span
class="removed"><del><strong>GTalkService).</strong></del></span> <span
class="inserted"><ins><em>GTalkService, which seems since then to have been
+ merged into Google Play.)</em></ins></span>
</p>
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article,
to have
-been merged into Google Play). This adds up to a universal back door.
</p>
+<span class="removed"><del><strong><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><p>
+ Google</em></ins></span> can also
+ <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
+title="at the Wayback Machine (archived May 20,
2015)">forcibly</strong></del></span> <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</em></ins></span> and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which seems, since that article, to
have
+been merged into</strong></del></span> Google <span
class="removed"><del><strong>Play).</strong></del></span> <span
class="inserted"><ins><em>Play.</em></ins></span>
+ This <span class="removed"><del><strong>adds up</strong></del></span> <span
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal
back <span class="removed"><del><strong>door.</strong></del></span> <span
class="inserted"><ins><em>door, but permits various
+ dirty tricks.</em></ins></span>
+ </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -132,12 +179,12 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>Siri, Alexa, and all the other
voice-control systems can be
+ <p>Siri, Alexa, and all the other voice-control systems can be
<a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
</p>
</li>
-<li></em></ins></span>
+<li>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
@@ -147,8 +194,7 @@
<p>Samsung
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
-<span
class="removed"><del><strong>ransomeware</a>.</p></strong></del></span>
-<span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
+ransomware</a>.</p>
</li>
<li>
@@ -165,14 +211,14 @@
BlackBerry</a>. While there is not much detail here, it seems that this
does not operate via the universal back door that we know nearly all
portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></strong></del></span>
<span
class="inserted"><ins><em>href="#universal-back-door"></em></ins></span>
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
<h3 id="surveillance">Mobile Surveillance</h3>
<ul>
- <span class="inserted"><ins><em><li><p>The Sarahah app
+ <li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
@@ -181,7 +227,7 @@
</li>
<li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li></em></ins></span>
+ sold with spyware sending lots of data to
China</a>.</p></li>
<li>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
@@ -499,7 +545,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -509,7 +555,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/12/30 13:29:19 $
+$Date: 2018/03/13 02:30:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: po/proprietary-subscriptions.de-diff.html
diff -N po/proprietary-subscriptions.de-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/proprietary-subscriptions.de-diff.html 13 Mar 2018 02:30:28 -0000
1.1
@@ -0,0 +1,132 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-subscriptions.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<title>Proprietary Subscriptions
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-subscriptions.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Subscriptions</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>It sounds simple to say that a certain program “requires a
+subscription.” What that means concretely is that it contains a
+time bomb, so that it will refuse to operate after that date. Or else
+it is <a href="/proprietary/proprietary-tethers.html">tethered to a
+server</a>, and that server checks the date. Either one is a
+malicious functionality.</p>
+
+<ul>
+<span class="inserted"><ins><em><li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
+<li>
+
+<p>Sony has brought back its robotic pet Aibo, this time <a
+href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
+with a universal back door, and tethered to a server that requires a
+subscription</a>.</p>
+</li></em></ins></span>
+
+<li>
+<p><a
+href="http://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/">
+Adobe tools require a subscription</a>. Adobe also tried to <a
+href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/">
+rip people off by making the subscriptions annual</a>,
+but that is a secondary issue compared with the basic wrong of the
+time bomb. When a program proprietary, and even malware, don't get
+distracted by the secondary issues like price.</p>
+
+<p>Please don't repeat the marketing term “Creative Cloud”
+except to express revulsion for it. The <a
+href="/philosophy/words-to-avoid.html#CloudComputing"> term
+“cloud” is designed to cloud users' minds</a>.</p>
+</li>
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2018/03/13 02:30:28 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.de.html malwa...,
GNUN <=