www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.de.html malwa...


From: GNUN
Subject: www/proprietary malware-microsoft.de.html malwa...
Date: Mon, 12 Mar 2018 22:30:29 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/03/12 22:30:28

Modified files:
        proprietary    : malware-microsoft.de.html 
                         malware-microsoft.it.html 
                         malware-mobiles.it.html 
                         proprietary-subscriptions.de.html 
        proprietary/po : malware-microsoft.de-diff.html 
                         malware-microsoft.it-diff.html 
                         malware-mobiles.it-diff.html 
Added files:
        proprietary/po : proprietary-subscriptions.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.de.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-microsoft.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.de.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-microsoft.de.html   11 Nov 2017 01:58:29 -0000      1.23
+++ malware-microsoft.de.html   13 Mar 2018 02:30:28 -0000      1.24
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.de.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Microsofts Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -657,7 +663,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/11/11 01:58:29 $
+$Date: 2018/03/13 02:30:28 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-microsoft.it.html   31 Dec 2017 12:29:58 -0000      1.26
+++ malware-microsoft.it.html   13 Mar 2018 02:30:28 -0000      1.27
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.it.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Il software di Microsoft è malware</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -530,7 +536,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/12/31 12:29:58 $
+$Date: 2018/03/13 02:30:28 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-mobiles.it.html     31 Dec 2017 12:29:58 -0000      1.20
+++ malware-mobiles.it.html     13 Mar 2018 02:30:28 -0000      1.21
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.it.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -14,6 +19,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Malware nei dispositivi mobili</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -537,7 +543,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/12/31 12:29:58 $
+$Date: 2018/03/13 02:30:28 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-subscriptions.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-subscriptions.de.html   1 Feb 2017 12:01:16 -0000       1.1
+++ proprietary-subscriptions.de.html   13 Mar 2018 02:30:28 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-subscriptions.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-subscriptions.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-subscriptions.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-subscriptions.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-subscriptions.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-subscriptions.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-subscriptions.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Abonnements</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -122,7 +128,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/02/01 12:01:16 $
+$Date: 2018/03/13 02:30:28 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-microsoft.de-diff.html   17 Jul 2017 04:30:33 -0000      1.7
+++ po/malware-microsoft.de-diff.html   13 Mar 2018 02:30:28 -0000      1.8
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
@@ -59,6 +59,7 @@
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#subscriptions"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -118,13 +119,13 @@
 
 &lt;ul&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;
+&lt;li&gt;
   &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
        and then leaked by the Shadowbrokers group, are now being used to
        &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
        of Windows computers with ransomware&lt;/a&gt;.
        &lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
     allows an attacker to retrieve Microsoft account credentials, if
@@ -283,6 +284,23 @@
 
 &lt;ul&gt;
 
+&lt;li&gt;&lt;p&gt;Windows 10 telemetry program sends information to Microsoft 
about the
+user's computer and their use of the computer.&lt;/p&gt;
+
+&lt;p&gt;Furthermore, for users who installed the fourth stable build of
+Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
+surveillance &lt;a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+    by force setting the telemetry mode to <span 
class="removed"><del><strong>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The &lt;a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;
+ &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+ can contain sensitive information like administrator's login
+ password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
 &lt;li&gt;&lt;p&gt;Windows DRM
 files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
 be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
@@ -420,6 +438,15 @@
   users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="inserted"><ins><em>&lt;h3 id="subscriptions"&gt;Microsoft 
Subscriptions&lt;/h3&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Microsoft Office forces
+      users &lt;a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+      subscribe to Office 360 to be able to create/edit
+      documents&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
 
 &lt;p&gt;As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.&lt;/p&gt;
@@ -471,7 +498,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -481,7 +508,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/07/17 04:30:33 $
+$Date: 2018/03/13 02:30:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-microsoft.it-diff.html   28 Mar 2017 00:59:35 -0000      1.1
+++ po/malware-microsoft.it-diff.html   13 Mar 2018 02:30:28 -0000      1.2
@@ -11,16 +11,10 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
-<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
-&lt;!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
---&gt;
-&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 
 &lt;h2&gt;Microsoft's Software is Malware&lt;/h2&gt;
@@ -48,11 +42,9 @@
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;div <span class="removed"><del><strong>class="toc"&gt;
-&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
-&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+&lt;div class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
@@ -67,16 +59,16 @@
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#subscriptions"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
 &lt;h3 id="back-doors"&gt;Microsoft Back Doors&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
   Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
   any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;More information on when &lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
@@ -93,17 +85,12 @@
   But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
   should have the right to decide who (if anyone) to trust in this 
way.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Windows 8's back doors 
are so gaping that</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+  &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
       away from Windows 8 computers with TPM 2.0 due to potential back
-      door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users</strong></del></span> <span 
class="inserted"><ins><em>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+      door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-&lt;li id="windows7-back-door"&gt;&lt;p&gt;Users</em></ins></span> reported 
that &lt;a 
+&lt;li id="windows7-back-door"&gt;&lt;p&gt;Users reported that &lt;a 
     
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
@@ -125,7 +112,21 @@
 
 &lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
 
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
 &lt;ul&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
     &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
     allows an attacker to retrieve Microsoft account credentials, if
     the user is tricked into visiting a malicious link.&lt;/p&gt;
@@ -149,12 +150,21 @@
 actions that harm to the users of specific Microsoft software.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
+  &lt;li&gt;&lt;p&gt; Microsoft
+      &lt;a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
+       has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+      in a big hurry.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+      have for not doing work to support them. If it doesn't want to
+      do this work, it should let users do the work.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
     &lt;p&gt;Microsoft has made Windows 7 and 8 cease to function on certain
       new computers,
       &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
       forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
    of Windows
@@ -233,7 +243,7 @@
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows displays
+  &lt;li&gt;&lt;p&gt;Windows displays
       &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
        intrusive ads for Microsoft products and its
        partners' products&lt;/a&gt;.&lt;/p&gt;
@@ -244,7 +254,7 @@
   &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
 
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
       annoying advertisements inside of the File Explorer&lt;/a&gt; to nag
-      users to buy subscriptions for the OneDrive 
service.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      users to buy subscriptions for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;In order to increase Windows 10's install base, Microsoft
 &lt;a
@@ -274,11 +284,28 @@
 
 &lt;ul&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows DRM
+&lt;li&gt;&lt;p&gt;Windows 10 telemetry program sends information to Microsoft 
about the
+user's computer and their use of the computer.&lt;/p&gt;
+
+&lt;p&gt;Furthermore, for users who installed the fourth stable build of
+Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
+surveillance &lt;a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+    by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The &lt;a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;
+ &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+ can contain sensitive information like administrator's login
+ password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Windows DRM
 files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
 be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
 exists only if you use Windows.
-&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
 debugging information to Microsoft, including core dumps&lt;/a&gt;. Microsoft
@@ -378,6 +405,16 @@
 
 &lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
 &lt;ul&gt;
+  &lt;li&gt;
+       &lt;p&gt;Windows 10 S ought to be called Windows 10 J, for 
&ldquo;Jail&rdquo;:
+       &lt;a 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;only
 programs from the Windows Store can be
+       downloaded and executed&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;If the history of iOS as a jail is any indication, Windows 10 J
+       will be no better.&lt;/p&gt;
+
+       &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
   Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
   user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
@@ -389,9 +426,8 @@
 &lt;p&gt;Microsoft accidentally left a way for users to install GNU/Linux
 on Windows RT tablets, but now it has &lt;a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;
-    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. <span 
class="removed"><del><strong>Those arrogant
-bastards</strong></del></span> <span class="inserted"><ins><em>They have the
-gall to</em></ins></span> call this &ldquo;protecting&rdquo; the users.  The 
article
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. They have the
+gall to call this &ldquo;protecting&rdquo; the users.  The article
 talks of installing &ldquo;Linux&rdquo;, but the context shows it is
 really &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users
 install.
@@ -402,6 +438,15 @@
   users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="inserted"><ins><em>&lt;h3 id="subscriptions"&gt;Microsoft 
Subscriptions&lt;/h3&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Microsoft Office forces
+      users &lt;a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+      subscribe to Office 360 to be able to create/edit
+      documents&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
 
 &lt;p&gt;As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.&lt;/p&gt;
@@ -453,7 +498,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -463,7 +508,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/03/28 00:59:35 $
+$Date: 2018/03/13 02:30:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-mobiles.it-diff.html     30 Dec 2017 13:29:19 -0000      1.10
+++ po/malware-mobiles.it-diff.html     13 Mar 2018 02:30:28 -0000      1.11
@@ -11,14 +11,14 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
-<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+&lt;style type="text/css" media="print,screen"&gt;&lt;!--
 li dl { margin-top: .3em; }
 li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
 li dl dd { margin: 0 3%; }
---&gt;&lt;/style&gt;</em></ins></span>
+--&gt;&lt;/style&gt;
 &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
@@ -43,8 +43,49 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;Nearly all mobile phones do two 
grievous wrongs to their users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
+<span class="inserted"><ins><em>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The phone network
+    &lt;a href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+      tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is inherent in the design of the phone network: as long as
+      the phone is in communication with the network, there is no way
+      to stop the network from recording its location.  Many countries
+      (including the US and the EU) require the network to store all
+      these location data for months or years.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p id="universal-back-door"&gt;Almost every phone's 
communication processor has
+      a universal back door which
+      is &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+      often used to make a phone transmit all conversations it
+ hears&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The back
+      door &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+      may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.&lt;/p&gt;
+    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.&lt;/p&gt;
+    &lt;p&gt;A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.&lt;/p&gt;
+    &lt;p&gt;The universal back door is apparently also used to make phones
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+      transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
+      are tracked, and may also make the listening feature work.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of malware in mobile devices.  See also
 the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
 page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
@@ -71,20 +112,18 @@
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li 
id="back-door-microphone"&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
-    &lt;p&gt;The universal back door in portable phones
-      &lt;a
-    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
-  <span class="removed"><del><strong>&lt;/li&gt;
-
-  &lt;li id="back-door-malicious"&gt;</strong></del></span>
-    &lt;p&gt;Most mobile phones have <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> universal back door, which has 
been
+  &lt;li&gt;
+    <span class="removed"><del><strong>&lt;p&gt;The</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span>
+      <span class="inserted"><ins><em>door&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>portable phones
+      &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most</strong></del></span> <span 
class="inserted"><ins><em>essentially all</em></ins></span> mobile <span 
class="removed"><del><strong>phones have this universal back 
door,</strong></del></span> <span 
class="inserted"><ins><em>phones,</em></ins></span> which <span 
class="removed"><del><strong>has been
       used to
       &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn them malicious&lt;/a&gt;.&lt;/p&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       turn</strong></del></span> <span class="inserted"><ins><em>permits 
converting</em></ins></span>
+      them <span class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>into full-time listening 
devices.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -98,17 +137,25 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-  &lt;p&gt;In Android, &lt;a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; (it</em></ins></span> is in a program
-  called GTalkService).
+  &lt;p&gt;In Android,
+  &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps&lt;/a&gt; (it is</strong></del></span> <span 
class="inserted"><ins><em>apps.&lt;/a&gt;  (It was</em></ins></span> in a
+  program called <span 
class="removed"><del><strong>GTalkService).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService, which seems since then to have been
+  merged into Google Play.)</em></ins></span>
   &lt;/p&gt;
 
-&lt;p&gt;Google can also &lt;a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at the Wayback Machine (archived May 20, 2015)"&gt;forcibly and remotely
-install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
-been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;p&gt;
+  Google</em></ins></span> can also
+  &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 
2015)"&gt;forcibly</strong></del></span> <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+  forcibly</em></ins></span> and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which seems, since that article, to 
have
+been merged into</strong></del></span> Google <span 
class="removed"><del><strong>Play).</strong></del></span> <span 
class="inserted"><ins><em>Play.</em></ins></span>
+  This <span class="removed"><del><strong>adds up</strong></del></span> <span 
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal 
back <span class="removed"><del><strong>door.</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various
+  dirty tricks.</em></ins></span>
+  &lt;/p&gt;
 
   &lt;p&gt;
   Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
@@ -132,12 +179,12 @@
 &lt;ul&gt;
 
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
   &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
   &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
   &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
        can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
        Broadcom's non-free firmware.&lt;/p&gt;
@@ -147,8 +194,7 @@
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-<span 
class="removed"><del><strong>ransomeware&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -165,14 +211,14 @@
   BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
   does not operate via the universal back door that we know nearly all
   portable phones have. It may involve exploiting various bugs. There are
-  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+   &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;</em></ins></span>
   lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Sarahah app 
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
       uploads all phone numbers and email addresses&lt;/a&gt; in user's address
       book to developer's server.  Note that this article misuses the words
@@ -181,7 +227,7 @@
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;
   &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
@@ -499,7 +545,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -509,7 +555,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/12/30 13:29:19 $
+$Date: 2018/03/13 02:30:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: po/proprietary-subscriptions.de-diff.html
diff -N po/proprietary-subscriptions.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-subscriptions.de-diff.html   13 Mar 2018 02:30:28 -0000      
1.1
@@ -0,0 +1,132 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-subscriptions.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;title&gt;Proprietary Subscriptions
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-subscriptions.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Subscriptions&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;It sounds simple to say that a certain program &ldquo;requires a
+subscription.&rdquo;  What that means concretely is that it contains a
+time bomb, so that it will refuse to operate after that date.  Or else
+it is &lt;a href="/proprietary/proprietary-tethers.html"&gt;tethered to a
+server&lt;/a&gt;, and that server checks the date.  Either one is a
+malicious functionality.&lt;/p&gt;
+
+&lt;ul&gt;
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Microsoft Office forces
+      users &lt;a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+      subscribe to Office 360 to be able to create/edit
+      documents&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+
+&lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
+with a universal back door, and tethered to a server that requires a
+subscription&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/"&gt;
+Adobe tools require a subscription&lt;/a&gt;.  Adobe also tried to &lt;a
+href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/"&gt;
+rip people off by making the subscriptions annual&lt;/a&gt;,
+but that is a secondary issue compared with the basic wrong of the
+time bomb.  When a program proprietary, and even malware, don't get
+distracted by the secondary issues like price.&lt;/p&gt;
+
+&lt;p&gt;Please don't repeat the marketing term &ldquo;Creative Cloud&rdquo;
+except to express revulsion for it.  The &lt;a
+href="/philosophy/words-to-avoid.html#CloudComputing"&gt; term
+&ldquo;cloud&rdquo; is designed to cloud users' minds&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/03/13 02:30:28 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]