www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www licenses/gpl-faq.fr.html licenses/po/gpl-fa...


From: GNUN
Subject: www licenses/gpl-faq.fr.html licenses/po/gpl-fa...
Date: Tue, 13 Mar 2018 07:59:17 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/03/13 07:59:17

Modified files:
        licenses       : gpl-faq.fr.html 
        licenses/po    : gpl-faq.fr-en.html 
        proprietary    : malware-mobiles.de.html 
                         proprietary-back-doors.de.html 
        proprietary/po : malware-mobiles.de-diff.html 
                         proprietary-back-doors.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/gpl-faq.fr.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/gpl-faq.fr-en.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.de.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.2&r2=1.3

Patches:
Index: licenses/gpl-faq.fr.html
===================================================================
RCS file: /web/www/www/licenses/gpl-faq.fr.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- licenses/gpl-faq.fr.html    9 Mar 2018 11:29:40 -0000       1.165
+++ licenses/gpl-faq.fr.html    13 Mar 2018 11:59:14 -0000      1.166
@@ -1983,8 +1983,8 @@
 a-t-il un effet quelconque ? <span class="anchor-reference-id">(<a
 href="#AggregateContainers" >#AggregateContainers</a>)</span></dt>
 <dd><p>Non. L'analyse permettant de déterminer s'ils forment <a
-href="/licenses/gpl-faq.html#MereAggregation">une création unique ou un
-agrégat</a> est indépendante de la présence de conteneurs.</p></dd>
+href="#MereAggregation">une création unique ou un agrégat</a> est
+indépendante de la présence de conteneurs.</p></dd>
 
 <dt id="AssignCopyright">Pourquoi la FSF demande-t-elle aux personnes qui 
contribuent aux programmes
 sous copyright de la FSF de lui transférer leur copyright ? Si je détiens le
@@ -2380,8 +2380,8 @@
 sans jamais avoir à la redistribuer à d'autres. Ce que fait cette société 
en
 est un cas particulier. Par conséquent, la société n'est pas obligée de
 publier les sources modifiées. La situation est différente quand le
-programme modifié est régi par la <a
-href="/licenses/gpl-faq.html#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
+programme modifié est régi par la <a href="#UnreleasedModsAGPL">GNU Affero
+GPL</a>.</p>
 
 <p>Comparez ceci à la situation où le site web contient, ou met en lien, des
 programmes indépendants sous GPL qui sont distribués à l'utilisateur
@@ -4122,7 +4122,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/03/09 11:29:40 $
+$Date: 2018/03/13 11:59:14 $
 
 <!-- timestamp end -->
 </p>

Index: licenses/po/gpl-faq.fr-en.html
===================================================================
RCS file: /web/www/www/licenses/po/gpl-faq.fr-en.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- licenses/po/gpl-faq.fr-en.html      9 Mar 2018 11:29:42 -0000       1.81
+++ licenses/po/gpl-faq.fr-en.html      13 Mar 2018 11:59:16 -0000      1.82
@@ -2000,7 +2000,7 @@
  <span class="anchor-reference-id">(<a href="#AggregateContainers"
  >#AggregateContainers</a>)</span></dt>
 <dd><p>No, the analysis of whether they are a <a
-href="/licenses/gpl-faq.html#MereAggregation">single work or an
+href="#MereAggregation">single work or an
 aggregate</a> is unchanged by the involvement of containers.</p></dd>
 
 <dt id="AssignCopyright">Why does
@@ -2411,7 +2411,7 @@
 case of that. Therefore, the company does not have to release the
 modified sources. The situation is different when the modified program
 is licensed under the terms of the <a
-href="/licenses/gpl-faq.html#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
+href="#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
 
 <p>Compare this to a situation where the web site contains or links to
 separate GPL'ed programs that are distributed to the user when they
@@ -3933,7 +3933,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/03/09 11:29:42 $
+$Date: 2018/03/13 11:59:16 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-mobiles.de.html 25 Oct 2017 12:31:02 -0000      1.19
+++ proprietary/malware-mobiles.de.html 13 Mar 2018 11:59:16 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -14,6 +19,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadprogramme auf Mobilgeräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -669,7 +675,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 12:31:02 $
+$Date: 2018/03/13 11:59:16 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.de.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary-back-doors.de.html  25 Oct 2017 12:31:02 -0000      
1.25
+++ proprietary/proprietary-back-doors.de.html  13 Mar 2018 11:59:16 -0000      
1.26
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Hintertüren</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -570,7 +576,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 12:31:02 $
+$Date: 2018/03/13 11:59:16 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-mobiles.de-diff.html 26 Sep 2017 11:00:50 -0000      
1.6
+++ proprietary/po/malware-mobiles.de-diff.html 13 Mar 2018 11:59:16 -0000      
1.7
@@ -11,14 +11,14 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
-<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+&lt;style type="text/css" media="print,screen"&gt;&lt;!--
 li dl { margin-top: .3em; }
 li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
 li dl dd { margin: 0 3%; }
---&gt;&lt;/style&gt;</em></ins></span>
+--&gt;&lt;/style&gt;
 &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
@@ -43,8 +43,49 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;Nearly all mobile phones do two 
grievous wrongs to their users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
+<span class="inserted"><ins><em>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The phone network
+    &lt;a href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+      tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is inherent in the design of the phone network: as long as
+      the phone is in communication with the network, there is no way
+      to stop the network from recording its location.  Many countries
+      (including the US and the EU) require the network to store all
+      these location data for months or years.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p id="universal-back-door"&gt;Almost every phone's 
communication processor has
+      a universal back door which
+      is &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+      often used to make a phone transmit all conversations it
+ hears&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The back
+      door &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+      may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.&lt;/p&gt;
+    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.&lt;/p&gt;
+    &lt;p&gt;A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.&lt;/p&gt;
+    &lt;p&gt;The universal back door is apparently also used to make phones
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+      transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
+      are tracked, and may also make the listening feature work.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of malware in mobile devices.  See also
 the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
 page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
@@ -71,20 +112,18 @@
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li 
id="back-door-microphone"&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
-    &lt;p&gt;The universal back door in portable phones
-      &lt;a
-    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
-  <span class="removed"><del><strong>&lt;/li&gt;
-
-  &lt;li id="back-door-malicious"&gt;</strong></del></span>
-    &lt;p&gt;Most mobile phones have <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> universal back door, which has 
been
+  &lt;li&gt;
+    <span class="removed"><del><strong>&lt;p&gt;The</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span>
+      <span class="inserted"><ins><em>door&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>portable phones
+      &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most</strong></del></span> <span 
class="inserted"><ins><em>essentially all</em></ins></span> mobile <span 
class="removed"><del><strong>phones have this universal back 
door,</strong></del></span> <span 
class="inserted"><ins><em>phones,</em></ins></span> which <span 
class="removed"><del><strong>has been
       used to
       &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn them malicious&lt;/a&gt;.&lt;/p&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       turn</strong></del></span> <span class="inserted"><ins><em>permits 
converting</em></ins></span>
+      them <span class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>into full-time listening 
devices.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -98,17 +137,25 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-  &lt;p&gt;In Android, &lt;a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; (it</em></ins></span> is in a program
-  called GTalkService).
+  &lt;p&gt;In Android,
+  &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps&lt;/a&gt; (it is</strong></del></span> <span 
class="inserted"><ins><em>apps.&lt;/a&gt;  (It was</em></ins></span> in a
+  program called <span 
class="removed"><del><strong>GTalkService).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService, which seems since then to have been
+  merged into Google Play.)</em></ins></span>
   &lt;/p&gt;
 
-&lt;p&gt;Google can also &lt;a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at the Wayback Machine (archived May 20, 2015)"&gt;forcibly and remotely
-install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
-been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;p&gt;
+  Google</em></ins></span> can also
+  &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 
2015)"&gt;forcibly</strong></del></span> <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+  forcibly</em></ins></span> and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which seems, since that article, to 
have
+been merged into</strong></del></span> Google <span 
class="removed"><del><strong>Play).</strong></del></span> <span 
class="inserted"><ins><em>Play.</em></ins></span>
+  This <span class="removed"><del><strong>adds up</strong></del></span> <span 
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal 
back <span class="removed"><del><strong>door.</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various
+  dirty tricks.</em></ins></span>
+  &lt;/p&gt;
 
   &lt;p&gt;
   Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
@@ -132,12 +179,12 @@
 &lt;ul&gt;
 
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
   &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
   &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
   &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
        can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
        Broadcom's non-free firmware.&lt;/p&gt;
@@ -147,8 +194,7 @@
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-<span 
class="removed"><del><strong>ransomeware&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -165,14 +211,14 @@
   BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
   does not operate via the universal back door that we know nearly all
   portable phones have. It may involve exploiting various bugs. There are
-  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+   &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;</em></ins></span>
   lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Sarahah app 
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
       uploads all phone numbers and email addresses&lt;/a&gt; in user's address
       book to developer's server.  Note that this article misuses the words
@@ -181,7 +227,7 @@
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;
   &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
@@ -499,7 +545,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -509,7 +555,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/26 11:00:50 $
+$Date: 2018/03/13 11:59:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-back-doors.de-diff.html  14 Oct 2017 09:01:50 
-0000      1.2
+++ proprietary/po/proprietary-back-doors.de-diff.html  13 Mar 2018 11:59:16 
-0000      1.3
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
 &lt;title&gt;Proprietary Back Doors - GNU Project - Free Software 
Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary-back-doors.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -26,12 +26,26 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-&lt;p&gt;Here are examples of demonstrated back doors in proprietary 
software.&lt;/p&gt;
+&lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.
+They are sorted out according to what they are known to allow. Back doors
+that allow full control over the operating system are said to be
+&ldquo;universal&rdquo;.&lt;/p&gt;
+
+&lt;p class="c"&gt;
+   &lt;a href="#spy"&gt;Spying&lt;/a&gt; |
+   &lt;a 
href="#alter-data"&gt;Altering&nbsp;user's&nbsp;data/settings&lt;/a&gt; |
+   &lt;a href="#install-delete"&gt;Installing/deleting&nbsp;programs&lt;/a&gt; 
|
+   &lt;a href="#universal"&gt;Full&nbsp;control&lt;/a&gt; |
+   &lt;a href="#other"&gt;Other/undefined&lt;/a&gt;
+&lt;/p&gt;</em></ins></span>
 
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+<span class="inserted"><ins><em>&lt;h3 
id="spy"&gt;Spying&lt;/h3&gt;</em></ins></span>
+
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Tesla cars have a &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;universal
 back door&lt;/a&gt;.&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;Tesla cars have a &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;universal
 back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery
     capacity did not do them any harm, the same back door would permit
@@ -40,22 +54,22 @@
     to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;</strong></del></span>
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
-    cameras contain a glaring backdoor&mdash;they have login accounts
+      cameras contain a glaring <span 
class="removed"><del><strong>backdoor&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>back door&mdash;they</em></ins></span> have login 
accounts
     with hard-coded passwords, which can't be changed, and &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
-    there is no way to delete these accounts either&lt;/a&gt;.
-    &lt;/p&gt;
-
+      there is no way to delete these accounts <span 
class="removed"><del><strong>either&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
     &lt;p&gt;Since these accounts with hard-coded passwords are impossible to
     delete, this problem is not merely an insecurity; it amounts to a
-    backdoor that can be used by the manufacturer (and government) to
+    <span class="removed"><del><strong>backdoor</strong></del></span>
+      <span class="inserted"><ins><em>back door</em></ins></span> that can be 
used by the manufacturer (and government) to
     spy on users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;
+    <span class="removed"><del><strong>&lt;p&gt;Vizio &ldquo;smart&rdquo;
     TVs &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;have
     a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -72,82 +86,150 @@
     remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;WhatsApp &lt;a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has
-        a back door that the company can use to read the plaintext
+  &lt;li&gt;</strong></del></span>
+    &lt;p&gt;WhatsApp &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;
+      has</em></ins></span> a back door that the company can use to read the 
plaintext
         of messages&lt;/a&gt;.&lt;/p&gt;
-    
         &lt;p&gt;This should not come as a surprise. Nonfree software for
           encryption is never trustworthy.&lt;/p&gt;
   &lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-        can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-        on many sorts of data in the phone, and in server accounts, it can
-        alter them too&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft has already backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
 
     &lt;li&gt;
-        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
-           universal back door in the application processor, for
-           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+      
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This may have improved with &lt;a
+      
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+      iOS 8 security improvements&lt;/a&gt;; but &lt;a
+      href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+      not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-           universal back door in the modem processor that the local
-           phone company can use&lt;/a&gt;.&lt;/p&gt;
+&lt;h3 id="alter-data"&gt;Altering user's data or settings&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li id="chrome-erase-addons"&gt;
+    &lt;p&gt;Chrome has a back door &lt;a
+      
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;
+      for remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
-        a driver that can be used as a backdoor by any application
-        installed on a Windows computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A</em></ins></span> pregnancy test controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+      spy</em></ins></span> on many sorts of data in the phone, and in server 
accounts, it
+      can alter them too&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;The Dropbox app for Macintosh &lt;a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
-        total control of the machine by repeatedly nagging the user
-        for an admini password&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+        <span class="removed"><del><strong>&lt;p&gt;Xiaomi phones come with 
&lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door in the application 
processor,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The Dropbox app</em></ins></span> 
for
+           <span class="removed"><del><strong>Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from</strong></del></span> <span 
class="inserted"><ins><em>Macintosh</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door-phone-modem"&gt;the
+           universal back door in the modem processor 
that</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
+      takes control of user interface items after luring</em></ins></span> the 
<span class="removed"><del><strong>local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user into
+      entering an admin password&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
     &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li 
id="universal-back-door-phone-modem"&gt;&lt;p&gt;The</strong></del></span>
+
+    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Capcom's Street 
Fighter V update</strong></del></span>
+
   <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;The</em></ins></span> universal back door in portable phones
-      &lt;a
-    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Most mobile phones have this 
universal back door, which has been
-      used to
-      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn them malicious&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Users reported that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
+        a driver</strong></del></span> 
+      <span 
class="inserted"><ins><em>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+      Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+      Windows 10&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft was in fact &lt;a 
+      
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+      attacking computers</em></ins></span> that <span 
class="removed"><del><strong>can be used as a backdoor by any application
+        installed</strong></del></span> <span class="inserted"><ins><em>run 
Windows 7 and 8&lt;/a&gt;, switching</em></ins></span> on a <span 
class="inserted"><ins><em>flag 
+      that said whether to &ldquo;upgrade&rdquo; to</em></ins></span> Windows 
<span class="removed"><del><strong>computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+    &lt;li&gt;&lt;p&gt;The Dropbox app for Macintosh</strong></del></span> 
<span class="inserted"><ins><em>10 when users 
+      had turned it off.&lt;/p&gt;
+    &lt;p&gt;Later on, Microsoft published instructions on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total control of the machine by repeatedly 
nagging</strong></del></span> 
+      <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+      how to permanently reject</em></ins></span> the <span 
class="removed"><del><strong>user
+        for an admini password&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;The universal</strong></del></span> <span 
class="inserted"><ins><em>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This seems to involve use of a</em></ins></span> back door in 
<span class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>Windows 7 and 8.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Caterpillar vehicles come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most mobile phones have this universal</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
+      a</em></ins></span> back <span class="removed"><del><strong>door, which 
has been
+      used</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+       turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>shutoff the engine&lt;/a&gt; 
remotely.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
       Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+  &lt;li&gt;&lt;p&gt;Modern</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;Modern</em></ins></span> gratis game cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
       collect a wide range of data about their users and their users' 
       friends and associates&lt;/a&gt;.&lt;/p&gt;
-
       &lt;p&gt;Even nastier, they do it through ad networks that merge the data
       collected by various cr&hellip;apps and sites made by different 
       companies.&lt;/p&gt;
-
       &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
       for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
       also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
-
       &lt;p&gt;While the article describes gratis games, games that cost money 
       can use the same tactics.&lt;/p&gt;    
   &lt;/li&gt;
+
   &lt;li&gt;
-    &lt;p&gt;Dell computers, shipped with Windows, had a bogus root
-      certificate that
-      &lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
-      anyone (not just Dell) to remotely authorize any software to
-      run&lt;/a&gt; on the computer.&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;Dell computers, 
shipped</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a id="samsung"
+      
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+      Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>Windows, 
had</strong></del></span>
+      a <span class="removed"><del><strong>bogus root
+      certificate</strong></del></span> <span class="inserted"><ins><em>back 
door&lt;/a&gt;</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
+      anyone (not just Dell) to remotely authorize any 
software</strong></del></span> <span class="inserted"><ins><em>provides remote 
access</em></ins></span> to
+      <span class="removed"><del><strong>run&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>the files stored</em></ins></span> on
+      the <span 
class="removed"><del><strong>computer.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+
   &lt;li&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door
-      that &lt;a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
+    <span class="removed"><del><strong>&lt;p&gt;Baidu's proprietary Android 
library, Moplus,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+      Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+      dlink of an eye.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+      The TP-Link router has a back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of routers
+      have back doors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="swindle-eraser"&gt;
+    &lt;p&gt;The Amazon Kindle-Swindle</em></ins></span> has a back door that 
<span class="inserted"><ins><em>has been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
       &ldquo;upload files&rdquo; as well as forcibly install
       apps&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
@@ -155,10 +237,15 @@
   
 &lt;li&gt;&lt;p&gt;ARRIS cable modem has a
   &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+  backdoor in</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+      remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was 1984, by George
+      Orwell.&lt;/p&gt;
+    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it would delete books only
+      following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
      remotely.&lt;/p&gt;
   &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
@@ -166,44 +253,64 @@
 intentional local back door for 4 years&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+&lt;li&gt;&lt;p&gt;Users reported</strong></del></span> <span 
class="inserted"><ins><em>state.  However,</em></ins></span> that <span 
class="inserted"><ins><em>policy didn't last.
+      In 2012 it</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+      wiped a user's Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft was in fact &lt;a 
+    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
+      offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Do other ebook readers have back doors</em></ins></span> in <span 
class="removed"><del><strong>fact &lt;a 
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    attacking computers that run Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software?
+      We don't know,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching on a flag 
     that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
     had turned it off.&lt;/p&gt;
 
     &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
     
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+    how to permanently reject the downgrade</strong></del></span> <span 
class="inserted"><ins><em>we have no way</em></ins></span> to <span 
class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>find out.  There is no reason</em></ins></span>
+      to <span class="removed"><del><strong>involve use 
of</strong></del></span> <span class="inserted"><ins><em>assume that they 
don't.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-<span class="removed"><del><strong>&lt;p&gt;Most mobile phones have a 
universal back door, which has been used to
-&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;The iPhone has</em></ins></span> a back door <span 
class="removed"><del><strong>in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>for &lt;a
+      
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+      remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+      enabling it without understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-&lt;li&gt;</strong></del></span>
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
-models of mobile phones have a universal back door in the modem chip. So
-why did Coolpad bother to introduce another? Because this one is controlled
-by Coolpad.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;h3 id="install-delete"&gt;Installing or deleting programs&lt;/h3&gt;
 
-&lt;li&gt;
-&lt;p&gt;Microsoft Windows has a universal back door through which
-&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
+&lt;ul&gt;</em></ins></span>
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Baidu's 
proprietary</em></ins></span> Android <span class="inserted"><ins><em>library, 
Moplus,</em></ins></span> has a <span class="removed"><del><strong>universal 
back door&lt;/a&gt;. Nearly all
+models of mobile phones have a universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother to introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>that &lt;a
+      
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+      can &ldquo;upload files&rdquo; as well as forcibly install 
apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>controlled</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> by <span 
class="removed"><del><strong>Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>14,000 
Android applications.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;Microsoft 
Windows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;In Android, &lt;a
+      
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+      Google</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>to remotely delete apps.&lt;/a&gt;  (It was in a
+      program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever</strong></del></span> <span 
class="inserted"><ins><em>seems since then to have been
+      merged into Google Play.)&lt;/p&gt;
+    &lt;p&gt;Google</em></ins></span> can <span 
class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
@@ -211,27 +318,32 @@
 &lt;/p&gt;
 &lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
+be</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+      forcibly</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due to potential back
-door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span 
class="inserted"><ins><em>remotely install apps&lt;/a&gt; through GTalkService.
+      This is not equivalent</em></ins></span> to <span 
class="removed"><del><strong>potential</strong></del></span> <span 
class="inserted"><ins><em>a universal</em></ins></span> back
+<span class="removed"><del><strong>door capabilities</strong></del></span> 
<span class="inserted"><ins><em>door, but permits various
+      dirty tricks.&lt;/p&gt;
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt;</em></ins></span> 
of <span class="removed"><del><strong>the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+&lt;p&gt;The iPhone</strong></del></span> <span class="inserted"><ins><em>this 
power</em></ins></span> has <span class="removed"><del><strong>a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>not been
+      malicious so far, the point is</em></ins></span> that <span 
class="removed"><del><strong>allows Apple to remotely delete 
apps&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>nobody 
should have such power,</em></ins></span>
+      which <span class="removed"><del><strong>Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span class="inserted"><ins><em>could also be used 
maliciously.  You might well decide</em></ins></span> to <span 
class="removed"><del><strong>have this power
 because of course we can trust Apple.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The iPhone has a back door for
+&lt;p&gt;The iPhone has</strong></del></span> <span 
class="inserted"><ins><em>let</em></ins></span> a <span 
class="removed"><del><strong>back door for
 &lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
 remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
 it without understanding.
@@ -240,150 +352,319 @@
 
 &lt;li&gt;
   &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for the state&lt;/a&gt;.
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;</strong></del></span>
+      <span class="inserted"><ins><em>security service</em></ins></span> 
remotely <span class="removed"><del><strong>extract some data from 
iPhones</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;deactivate&lt;/em&gt; programs that it
+      considers malicious.  But there is no excuse</em></ins></span> for <span 
class="inserted"><ins><em>allowing it
+      to &lt;em&gt;delete&lt;/em&gt;</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
-  &lt;p&gt;This may have improved with
+  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>programs, and you should</em></ins></span> have <span 
class="removed"><del><strong>improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
   iOS 8 security improvements&lt;/a&gt;; but
   &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the right to
+      decide who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-Windows 8 also has a back door for remotely deleting apps&lt;/a&gt;.
+  &lt;li&gt;
+    &lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+      Windows 8 also has a back door for remotely deleting <span 
class="removed"><del><strong>apps&lt;/a&gt;.
 &lt;/p&gt;
 
 &lt;p&gt;
-You might well decide to let a security service that you trust
-remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers malicious.
-But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and you
-should have the right to decide who (if anyone) to trust in this way.
+You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
+      remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+      But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, 
and you
+      should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
 &lt;/p&gt;
 
 &lt;p&gt;
 As these pages show, if you do want to clean your computer of malware,
 the first software to delete is Windows or iOS.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;In Android,
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;In Android,
 &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a program
+Google</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The iPhone</em></ins></span> has 
a back door <span class="inserted"><ins><em>&lt;a
+      
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+      that allows Apple</em></ins></span> to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It is in</strong></del></span> 
<span class="inserted"><ins><em>apps&lt;/a&gt; which Apple considers
+      &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have this
+      power because of course we can trust Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="universal"&gt;Full control&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;ChromeOS has</em></ins></span> a <span 
class="removed"><del><strong>program
 called GTalkService).
 &lt;/p&gt;
 
-&lt;p&gt;
-Google can also
-&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
-seems, since that article, to have been merged into Google Play).
-This is not equivalent to a universal back door, but permits various
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>universal back 
door. At least,</em></ins></span> Google <span class="removed"><del><strong>can 
also</strong></del></span> <span class="inserted"><ins><em>says
+      it does&mdash;in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+      section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+      
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+      universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+      listening device, remote changes to the code could surely convert it
+      into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+      
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
+      with a universal back door,</em></ins></span> and <span 
class="removed"><del><strong>remotely install apps&lt;/a&gt; through 
GTalkService (which
+seems, since that article,</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="inserted"><ins><em>a server that requires a
+      subscription&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Tesla cars</em></ins></span> have <span 
class="removed"><del><strong>been merged into Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>a &lt;a
+      
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
+      universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole
+      battery capacity did</em></ins></span> not <span 
class="removed"><del><strong>equivalent</strong></del></span> <span 
class="inserted"><ins><em>do them any harm, the same back door would
+      permit Tesla (perhaps under the command of some government) to
+      remotely order the car to use none of its battery. Or perhaps to drive
+      its passenger</em></ins></span> to a <span 
class="inserted"><ins><em>torture prison.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
+      
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+      have a universal back door&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The Amazon Echo appears to have a</em></ins></span> universal 
back door, <span class="removed"><del><strong>but permits various
 dirty tricks.
 &lt;/p&gt;
 
 &lt;p&gt;
-Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
-malicious so far, the point is that nobody should have such power,
-which could also be used maliciously.  You might well decide to let a
+Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>since &lt;a
+      href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+      it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We have found nothing explicitly documenting the 
lack</em></ins></span> of <span class="removed"><del><strong>this power has not 
been
+malicious</strong></del></span> <span class="inserted"><ins><em>any way to
+      disable remote changes to the software,</em></ins></span> so <span 
class="removed"><del><strong>far,</strong></del></span> <span 
class="inserted"><ins><em>we are not completely sure
+      there isn't one, but it seems pretty clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Xiaomi phones come with &lt;a
+      
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
+      a universal back door in</em></ins></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>application processor, for
+      Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+      universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>nobody should have such 
power,</strong></del></span> <span class="inserted"><ins><em>the local
+      phone company can use&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Microsoft Windows has a universal back door 
through</em></ins></span> which <span class="removed"><del><strong>could 
also</strong></del></span> <span class="inserted"><ins><em>&lt;a
+      
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+      any change whatsoever can</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well decide to let a
 security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
-considers malicious.  But there is no excuse for allowing it
-to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
-decide who (if anyone) to trust in this way.
-&lt;/p&gt;
-&lt;/li&gt;
+considers malicious.  But there</strong></del></span> <span 
class="inserted"><ins><em>imposed on the users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More information on when &lt;a
+      href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+      this was used&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In Windows 10, the universal back door</em></ins></span> is no 
<span class="removed"><del><strong>excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs,</strong></del></span> <span 
class="inserted"><ins><em>longer hidden; all
+      &ldquo;upgrades&rdquo; will be &lt;a
+      
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
+      forcibly</em></ins></span> and <span class="removed"><del><strong>you 
should</strong></del></span> <span class="inserted"><ins><em>immediately 
imposed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-Samsung Galaxy devices running proprietary Android versions come with a back
-door&lt;/a&gt; that provides remote access to the files stored on the device.
-&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+      A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+      all models of mobile phones</em></ins></span> have <span 
class="inserted"><ins><em>a &lt;a href="#universal-back-door"&gt;
+      universal back door in</em></ins></span> the <span 
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad 
bother</em></ins></span>
+      to <span class="removed"><del><strong>trust in</strong></del></span> 
<span class="inserted"><ins><em>introduce another? Because</em></ins></span> 
this <span class="removed"><del><strong>way.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one is 
controlled by Coolpad.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to
-&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-remotely erase books&lt;/a&gt;.  One of the books erased was 1984, by George 
Orwell.
-&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;&lt;a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android 
versions</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+      Some applications</em></ins></span> come with <span 
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back
+<span class="removed"><del><strong>door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span>
+      that <span class="removed"><del><strong>provides remote access to the 
files stored on the device.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can download 
programs and run them.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;p&gt;Amazon responded to criticism by saying it would delete books only
-following orders from the state.  However, that policy didn't last.
-In 2012
-it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;The Amazon 
Kindle-Swindle</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p id="universal-back-door"&gt;Almost 
every phone's communication
+      processor</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back door <span 
class="removed"><del><strong>that has been</strong></del></span> <span 
class="inserted"><ins><em>which is &lt;a
+      
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+      often</em></ins></span> used to <span class="inserted"><ins><em>make a 
phone transmit all conversations it hears&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The back door</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One</strong></del></span>
+      <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+      may take the form</em></ins></span> of <span 
class="inserted"><ins><em>bugs that have gone 20 years unfixed&lt;/a&gt;.
+      The choice to leave</em></ins></span> the <span 
class="removed"><del><strong>books erased was 1984, by George Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>security holes in place is morally
+      equivalent</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from</strong></del></span> <span 
class="inserted"><ins><em>writing a back door.&lt;/p&gt;
+    &lt;p&gt;The back door is in</em></ins></span> the <span 
class="removed"><del><strong>state.  However, that policy didn't 
last.</strong></del></span> <span class="inserted"><ins><em>&ldquo;modem 
processor&rdquo;, whose
+      job is to communicate with the radio network.</em></ins></span>  In 
<span class="removed"><del><strong>2012</strong></del></span> <span 
class="inserted"><ins><em>most phones,
+      the modem processor controls the microphone.  In most 
phones</em></ins></span> it <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
 a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
 kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
 
-&lt;p&gt;The Kindle-Swindle also has a
+&lt;p&gt;The Kindle-Swindle also</strong></del></span>
+      has <span class="removed"><del><strong>a
 &lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
 universal back door&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span> 
the <span class="removed"><del><strong>proprietary
 &ldquo;Left Hand&rdquo; operating system have back doors that give
-HP &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</em></ins></span>
-remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access to the customer's data, but if the back door allows installation of
-software changes, a change could be installed that would give access to the
+HP &lt;a 
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims</strong></del></span> <span 
class="inserted"><ins><em>rewrite the software for the main processor
+      too.&lt;/p&gt;
+    &lt;p&gt;A few phone models are specially designed so</em></ins></span> 
that <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>the modem
+      processor</em></ins></span> does not <span 
class="removed"><del><strong>give HP
+access</strong></del></span> <span class="inserted"><ins><em>control the 
microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable</em></ins></span> to <span 
class="inserted"><ins><em>turn the phone unto a
+      listening device.&lt;/p&gt;
+    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
+      
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+      transmit even when they are turned off&lt;/a&gt;.  This means their
+      movements are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>listening feature
+      work.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book 
eraser&lt;/a&gt;,</em></ins></span> the
+      <span class="inserted"><ins><em>Kindle-Swindle has a &lt;a
+      
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
+      universal</em></ins></span> back <span class="removed"><del><strong>door 
allows installation of
+software changes,</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="other"&gt;Other or undefined&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A Capcom's Street Fighter V update &lt;a
+      
href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;
+      installed</em></ins></span> a <span 
class="removed"><del><strong>change</strong></del></span> <span 
class="inserted"><ins><em>driver that</em></ins></span> could be <span 
class="inserted"><ins><em>used as a back door by any
+      application</em></ins></span> installed <span 
class="removed"><del><strong>that would give access</strong></del></span> <span 
class="inserted"><ins><em>on a Windows computer&lt;/a&gt;, but was &lt;a
+      
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack"&gt;
+      immediately rolled back&lt;/a&gt; in response</em></ins></span> to <span 
class="removed"><del><strong>the
 customer's data.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>public 
outcry.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have a back door for changing settings in a dlink
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;ARRIS cable modem 
has</em></ins></span> a <span class="inserted"><ins><em>&lt;a
+      
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;</em></ins></span>
+      back door <span class="removed"><del><strong>for changing 
settings</strong></del></span> in <span class="removed"><del><strong>a dlink
 of an eye.
 &lt;/p&gt;
 
 &lt;p&gt;
 &lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
-have back doors&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+have</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> back <span 
class="removed"><del><strong>doors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Dell computers, shipped with 
Windows, had</em></ins></span> a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>bogus root certificate
+      that &lt;a
+      
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
+      allowed anyone (not just Dell) to remotely authorize any software to
+      run&lt;/a&gt; on the computer.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
-Some applications come with MyFreeProxy, which is a universal back door
-that can download programs and run them.&lt;/a&gt;
-&lt;/p&gt;
-&lt;/li&gt;
-&lt;/ul&gt;
+  &lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+Some applications come with MyFreeProxy, which is a 
universal</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Mac OS X had an &lt;a
+      
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+      intentional local</em></ins></span> back door
+<span class="removed"><del><strong>that can download programs and run 
them.&lt;/a&gt;
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>for 4 
years&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;</strong></del></span>
 
-&lt;p&gt;Here is a big problem whose details are still secret.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
+    &lt;p&gt;Here is a big problem whose details are still <span 
class="removed"><del><strong>secret.&lt;/p&gt;
 
 &lt;ul&gt;
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
-The FBI asks lots of companies to put back doors in proprietary programs.
-&lt;/a&gt; We don't know of specific cases where this was done, but every
-proprietary program for encryption is a possibility.&lt;/p&gt;
-&lt;/li&gt;
-&lt;/ul&gt;
+&lt;p&gt;&lt;a</strong></del></span> <span class="inserted"><ins><em>secret: 
&lt;a</em></ins></span>
+      
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
+      The FBI asks lots of companies to put back doors in proprietary <span 
class="removed"><del><strong>programs.
+&lt;/a&gt;</strong></del></span>
+      <span class="inserted"><ins><em>programs&lt;/a&gt;.</em></ins></span> We 
don't know of specific cases where this was done,
+      but every proprietary program for encryption is a possibility.&lt;/p&gt;
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;</strong></del></span>
 
-&lt;p&gt;Here is a suspicion that we can't prove, but is worth thinking
-about.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;German government &lt;a
+      
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
+      veers away from Windows 8 computers with TPM 2.0 due to potential back
+      door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p&gt;Here is a suspicion that we can't prove, but is worth thinking
+<span class="removed"><del><strong>about.&lt;/p&gt;
 
 &lt;ul&gt;
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"&gt;
-Writable microcode for Intel and AMD microprocessors&lt;/a&gt; may be a vehicle
-for the NSA to invade computers, with the help of Microsoft, say respected
-security experts.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;&lt;a</strong></del></span>
+      <span class="inserted"><ins><em>about: &lt;a</em></ins></span>
+      
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"&gt;
+      Writable microcode for Intel and AMD microprocessors&lt;/a&gt; may be a
+      vehicle for the NSA to invade computers, with the help of Microsoft,
+      say respected security <span class="removed"><del><strong>experts.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>experts.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+      &ldquo;Left Hand&rdquo; operating system have back doors that give HP 
&lt;a
+      
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+      remote login access&lt;/a&gt; to them.  HP claims that this does not 
give HP
+      access to the customer's data, but if the back door allows
+      installation of software changes, a change could be installed that
+      would give access to the customer's data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;The EFF has other examples of the &lt;a 
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;use 
of back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;The EFF has other examples of the &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;use</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;
+use</em></ins></span> of back doors&lt;/a&gt;.&lt;/p&gt;
 
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
@@ -416,7 +697,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2014-2017 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2018</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -426,7 +707,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/10/14 09:01:50 $
+$Date: 2018/03/13 11:59:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]