www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec propr-blurbs...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec propr-blurbs...
Date: Sun, 16 Sep 2018 15:19:51 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/16 15:19:51

Modified files:
        server/staging/proprietary/rec: propr-blurbs.rec 

Log message:
        More tagging and fixes.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- propr-blurbs.rec    16 Sep 2018 10:16:45 -0000      1.3
+++ propr-blurbs.rec    16 Sep 2018 19:19:51 -0000      1.4
@@ -3,15 +3,47 @@
 %mandatory: Blurb
 %sort: Id
 %type: Id int
+%type: Added int
 
-Id: -201712060
-Added: 2018-09-15
-PubDate: 2017-12-06
-Section: games sabotage
-Keyword: addiction
-Blurb: <p>Learn how <a 
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
 gratis-to-play-and-not-win-much games manipulate their useds 
psychologically</a>.</p>
+#  "Id" is a 9-digit negative integer, made from the publication date of the
+#  latest reference in the  blurb and a disambiguation digit; for instance,
+#  "Id: -201805300" if the latest reference was published on May 30th, 2018.
+#  Another blurb with the same latest-publication date would have
+#  "Id: -201805301". (We want reverse chronological order, but Recutils only
+#  sorts in ascending order. That's why the numbers are negative.)
+
+#  "Added" is an 8-digit positive integer made from the date the blurb was
+#  entered; e.g., "Added: 20180915". It is used to select latest additions
+#  for the main page of proprietary/.
+
+#  It is a lot easier to work with the blurbs if they are unwrapped. In any
+#  case, each line within a blurb should start with a + sign, including
+#  blank lines.
+
+Id: -201708160
+PubDate: 2017-08-16
+Section: potential
+Keyword: surveillance voice
++  <p>Any device that has a microphone and a speaker could be <a 
href="http://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/";>turned
 into a sonar system that would track the movements of people in the same room 
or other rooms nearby</a>.</p>
+
+Id: -201712130
+PubDate: 2017-12-13
+Section: potential
+Keyword: google amazon ai
+Blurb: <p>Patent applications show that Google and Amazon are interested in <a 
  
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
 making &ldquo;digital assistants&rdquo; study people's activities to learn all 
about them</a>.</p>
 + 
-+  <p>These manipulative behaviors are malicious functionalities, and they are 
possible because the game is proprietary. If it were free, people could publish 
a non-manipulative version and play that instead.</p>
++  <p>AI programs would understand what people say to each other, observe the 
clothing they wear and the objects they carry (including the marketing messages 
on them), and use sound to track people's activities, including in the toilet 
or in bed.</p>
++
++  <p>It should be illegal to have such a device in your apartment without 
getting signed consent from the people that live in the other appartments in 
the building.</p>
+
+Id: -200709130
+PubDate: 2007-09-13
+PubDate: 2007-08-26
+Section: back-doors universal
+Keyword: windows microsoft
+Blurb: <p>Microsoft Windows has a universal back door through which <a 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
 any change whatsoever can be imposed on the users</a>.</p>
++ 
++  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> this was 
used</a>.</p>
 
 Id: -201809070
 PubDate: 2018-09-07
@@ -80,7 +112,7 @@
 Id: -201806240
 PubDate: 2018-06-24
 Section: games surveillance
-Keyword: Red Shell
+Keyword: red-shell
 Blurb: <p>Red Shell is a spyware that is found in many proprietary games. It 
<a 
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>
 tracks data on users' computers and sends it to third parties</a>.</p>
 
 Id: -201806110
@@ -161,8 +193,8 @@
 
 Id: -201803190
 PubDate: 2018-03-19
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Microsoft is planning to make Windows <a 
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
 impose use of its browser, Edge, in certain circumstances</a>.</p>
 + 
 +  <p>The reason Microsoft can force things on users is that Windows is 
nonfree.</p>
@@ -198,16 +230,25 @@
 Id: -201712210
 PubDate: 2017-06-20
 PubDate: 2017-12-21
-Section:
+Section: webpages surveillance
 Keyword:
 Blurb: <p>Many web sites use JavaScript code <a 
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
 to snoop on information that users have typed into a form but not sent</a>, in 
order to learn their identity. Some are <a 
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
 getting sued</a> for this.</p>
 
 Id: -201712110
 PubDate: 2017-12-11
-Section: surveillance microsoft windows
-Keyword: hp system
+Section: surveillance 
+Keyword: hp windows
 Blurb: <p>HP's proprietary operating system <a 
href="http://www.bbc.com/news/technology-42309371";> includes a proprietary 
keyboard driver with a key logger in it</a>.</p>
 
+Id: -201712060
+Added: 20180915
+PubDate: 2017-12-06
+Section: games sabotage
+Keyword: addiction
+Blurb: <p>Learn how <a 
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
 gratis-to-play-and-not-win-much games manipulate their useds 
psychologically</a>.</p>
++ 
++  <p>These manipulative behaviors are malicious functionalities, and they are 
possible because the game is proprietary. If it were free, people could publish 
a non-manipulative version and play that instead.</p>
+
 Id: -201711250
 PubDate: 2017-11-25
 Section: appleDRM drm surveillance
@@ -252,8 +293,8 @@
 
 Id: -201711150
 PubDate: 2017-11-15
-Section:
-Keyword:
+Section: webpages surveillance
+Keyword: javascript
 Blurb: <p>Some websites send JavaScript code to collect all the user's input, 
<a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/";>
 which can then be used to reproduce the whole session</a>.</p>
 + 
 +  <p>If you use LibreJS, it will block that malicious JavaScript code.</p>
@@ -287,7 +328,7 @@
 Id: -201710131
 PubDate: 2017-10-13
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>Windows 10 telemetry program sends information to Microsoft about 
the user's computer and their use of the computer.</p>
 + 
 +  <p>Furthermore, for users who installed the fourth stable build of Windows 
10, called the &ldquo;Creators Update,&rdquo; Windows maximized the 
surveillance<a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
 by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
@@ -451,8 +492,8 @@
 Id: -201706130
 PubDate: 2017-05-03
 PubDate: 2017-06-13
-Section:
-Keyword:
+Section: microsoft jails
+Keyword: windows-10s
 Blurb: <p>Windows 10 S was a jail: <a 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
 only programs from the Windows Store could be installed and executed</a>. It 
was however possible to <a 
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
 upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a special 
configuration of Windows 10 called <a 
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
 S mode</a>. The major difference with Windows 10 S is that there is an easy 
way to switch out of S mode.</p>
 
 Id: -201706070
@@ -521,8 +562,8 @@
 
 Id: -201705120
 PubDate: 2017-05-12
-Section:
-Keyword:
+Section: microsoft insecurity
+Keyword: windows
 Blurb: <p>Exploits of bugs in Windows, which were developed by the NSA and 
then leaked by the Shadowbrokers group, are now being used to <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>
 attack a great number of Windows computers with ransomware</a>.</p>
 
 Id: -201705040
@@ -539,8 +580,8 @@
 
 Id: -201704191
 PubDate: 2017-04-19
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft has made Windows 7 and 8 cease to function on certain new 
computers, <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>
 effectively forcing their owners to switch to Windows 10</a>.</p>
 
 Id: -201704190
@@ -553,8 +594,8 @@
 
 Id: -201704130
 PubDate: 2017-04-13
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft <a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
 has dropped support for Windows 7 and 8 on recent processors</a> in a big 
hurry.</p>
 + 
 +  <p>It makes no difference what legitimate reasons Microsoft might have for 
not doing work to support them. If it doesn't want to do this work, it should 
let users do the work.</p>
@@ -603,8 +644,8 @@
 
 Id: -201703170
 PubDate: 2017-03-17
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Windows displays <a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
 intrusive ads for Microsoft products and its partners' products</a>.</p>
 + 
 +  <p>The article's author starts from the premise that Microsoft has a right 
to control what Windows does to users, as long as it doesn't go &ldquo;too 
far&rdquo;. We disagree.</p>
@@ -635,8 +676,8 @@
 
 Id: -201703100
 PubDate: 2017-03-10
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Microsoft inserts <a 
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts";>
 annoying advertisements inside of the File Explorer</a> to nag users to buy 
subscriptions for the OneDrive service.</p>
 
 Id: -201702280
@@ -680,10 +721,16 @@
 Keyword:
 Blurb: <p>Vizio &ldquo;smart&rdquo; <a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
 TVs report everything that is viewed on them, and not just broadcasts and 
cable</a>. Even if the image is coming from the user's own computer, the TV 
reports what it is. The existence of a way to disable the surveillance, even if 
it were not hidden as it was in these TVs, does not legitimize the 
surveillance.</p>
 
+Id: -201702021
+PubDate: 2017-02-02
+Section: drm
+Keyword: microsoft windows
+Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
 can be used to identify people browsing through Tor</a>. The vulnerability 
exists only if you use Windows.</p>
+
 Id: -201702020
 PubDate: 2017-02-02
-Section: surveillance drm microsoft windows
-Keyword: system
+Section: surveillance microsoft 
+Keyword: windows
 Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
 can be used to identify people browsing through Tor</a>. The vulnerability 
exists only if you use Windows.</p>
 
 Id: -201701300
@@ -825,8 +872,8 @@
 
 Id: -201611160
 PubDate: 2016-11-16
-Section:
-Keyword:
+Section: webpages surveillance
+Keyword: vpn
 Blurb: <p>A <a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
 research paper</a> that investigated the privacy and security of 283 Android 
VPN apps concluded that &ldquo;in spite of the promises for privacy, security, 
and anonymity given by the majority of VPN apps&mdash;millions of users may be 
unawarely subject to poor security guarantees and abusive practices inflicted 
by VPN apps.&rdquo;</p>
 + 
 +  <p>Following is a non-exhaustive list of proprietary VPN apps from the 
research paper that tracks and infringes the privacy of users:</p>
@@ -928,10 +975,16 @@
 Keyword:
 Blurb: <p>Many proprietary programs secretly <a 
href="https://web.archive.org/web/20160901222135/http://www.theregister.co.uk/2016/08/05/payperinstall_study/";>
 install other proprietary programs that the users don't want</a>.</p>
 
+Id: -201608171
+PubDate: 2016-08-17
+Section: surveillance
+Keyword: microsoft windows interference
+Blurb: <p>In order to increase Windows 10's install base, Microsoft <a 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
 blatantly disregards user choice and privacy</a>.</p>
+
 Id: -201608170
 PubDate: 2016-08-17
-Section: surveillance microsoft windows
-Keyword: system
+Section: microsoft interference
+Keyword: surveillance windows
 Blurb: <p>In order to increase Windows 10's install base, Microsoft <a 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
 blatantly disregards user choice and privacy</a>.</p>
 
 Id: -201608110
@@ -948,8 +1001,8 @@
 
 Id: -201608020
 PubDate: 2016-08-02
-Section:
-Keyword:
+Section: microsoft insecurity
+Keyword: browser
 Blurb: <p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>
 flaw in Internet Explorer and Edge</a> allows an attacker to retrieve 
Microsoft account credentials, if the user is tricked into visiting a malicious 
link.</p>
 
 Id: -201607290
@@ -992,8 +1045,8 @@
 
 Id: -201607150
 PubDate: 2016-07-15
-Section:
-Keyword:
+Section: microsoft tyrants
+Keyword: windows-rt
 Blurb: <p>Microsoft accidentally left a way for users to install GNU/Linux on 
Windows RT tablets, but now it has <a 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
 &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall to call 
this &ldquo;protecting&rdquo; the users. The article talks of installing 
&ldquo;Linux&rdquo;, but the context shows it is really <a 
href="/gnu/linux-and-gnu.html"> GNU/Linux</a> that users install.</p>
 
 Id: -201607140
@@ -1004,8 +1057,8 @@
 
 Id: -201607040
 PubDate: 2016-07-04
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Microsoft has started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
 nagging users obnoxiously and repeatedly to install Windows 10</a>.</p>
 
 Id: -201606290
@@ -1019,8 +1072,8 @@
 Id: -201606270
 PubDate: 2016-06-27
 PubDate: 2015-12-07
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
 forcibly pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 Windows update to its version 10</a>, ignoring the flag on Windows 7 or 8 that 
you could set to not upgrade. This reaffirms the presence of a <a 
href="/proprietary/proprietary-back-doors.html"> universal back door in 
Windows</a> 7 and 8.</p>
 
 Id: -201606080
@@ -1057,8 +1110,8 @@
 
 Id: -201606010
 PubDate: 2016-06-01
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Once Microsoft has tricked a user into accepting installation of 
Windows 10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";> 
they find that they are denied the option to cancel or even postpone the 
imposed date of installation</a>.</p>
 + 
 +  <p>This demonstrates what we've said for years: using proprietary software 
means letting someone have power over you, and you're going to get screwed 
sooner or later.</p>
@@ -1071,8 +1124,8 @@
 
 Id: -201605220
 PubDate: 2016-05-22
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Microsoft <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>
 is tricking users</a> <a 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
 into replacing Windows 7 with Windows 10</a>.</p>
 
 Id: -201605200
@@ -1155,7 +1208,7 @@
 Id: -201603170
 PubDate: 2016-03-17
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p><a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
 Windows 10 comes with 13 screens of snooping options</a>, all enabled by 
default, and turning them off would be daunting to most users.</p>
 
 Id: -201603100
@@ -1166,14 +1219,14 @@
 
 Id: -201603090
 PubDate: 2016-03-09
-Section:
-Keyword:
+Section: microsoft interference
+Keyword: windows
 Blurb: <p>Microsoft has made companies' Windows machines managed by the 
company's sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>
 harangue users to complain to the sysadmins about not &ldquo;upgrading&rdquo; 
to Windows 10</a>.</p>
 
 Id: -201603080
 PubDate: 2016-03-08
-Section:
-Keyword:
+Section: webpages surveillance
+Keyword: ebook javascript
 Blurb: <p>E-books can contain JavaScript code, and <a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
 sometimes this code snoops on readers</a>.</p>
 
 Id: -201603020
@@ -1184,21 +1237,11 @@
 + 
 +  <p>The article says this is a back door, but that could be a 
misunderstanding. However, it is certainly surveillance, at least.</p>
 
-Id: -201602241
-PubDate: 2016-02-24
-Section: surveillance
-Keyword: cars insecurity back-doors phone
-Blurb: <p id="nissan-modem">The Nissan Leaf has a built-in cell phone modem 
which allows effectively anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";> to 
access its computers remotely and make changes in various settings</a>.</p>
-+ 
-+  <p>That's easy to do because the system has no authentication when accessed 
through the modem. However, even if it asked for authentication, you couldn't 
be confident that Nissan has no access. The software in the car is proprietary, 
<a href="/philosophy/free-software-even-more-important.html"> which means it 
demands blind faith from its users</a>.</p>
-+ 
-+  <p>Even if no one connects to the car remotely, the cell phone modem 
enables the phone company to track the car's movements all the time; it is 
possible to physically remove the cell phone modem though.</p>
-
 Id: -201602240
 PubDate: 2016-02-24
-Section: cars insecurity
-Keyword: back-doors phone surveillance
-Blurb: <p>The Nissan Leaf has a built-in cell phone modem which allows 
effectively anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";> to 
access its computers remotely and make changes in various settings</a>.</p>
+Section: surveillance cars insecurity
+Keyword: back-doors phone
+Blurb: <p id="nissan-modem">The Nissan Leaf has a built-in cell phone modem 
which allows effectively anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";> to 
access its computers remotely and make changes in various settings</a>.</p>
 + 
 +  <p>That's easy to do because the system has no authentication when accessed 
through the modem. However, even if it asked for authentication, you couldn't 
be confident that Nissan has no access. The software in the car is proprietary, 
<a href="/philosophy/free-software-even-more-important.html"> which means it 
demands blind faith from its users</a>.</p>
 + 
@@ -1222,8 +1265,8 @@
 
 Id: -201602020
 PubDate: 2016-02-02
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft was for months <a 
href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
 tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they fail to 
notice and say no.</p>
 
 Id: -201601310
@@ -1235,8 +1278,8 @@
 
 Id: -201601160
 PubDate: 2016-01-16
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>
 desupported all future Intel CPUs for Windows 7 and 8</a>. Those machines will 
be stuck with the nastier Windows 10. <a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
 AMD and Qualcomm CPUs, too</a>.</p>
 + 
 +  <p>Of course, Windows 7 and 8 are unethical too, because they are 
proprietary software. But this example of Microsoft's wielding its power 
demonstrates the power it holds.</p>
@@ -1248,8 +1291,8 @@
 PubDate: 2015-12-07
 PubDate: 2016-01-14
 Section: back-doors alter-data microsoft windows
-Keyword: system
-Blurb: <p>Users reported that <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft was forcing them to replace Windows 7 and 8 with all-spying Windows 
10</a>.</p>
+Keyword:
+Blurb: <p id="windows7-back-door">Users reported that <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft was forcing them to replace Windows 7 and 8 with all-spying Windows 
10</a>.</p>
 + 
 +  <p>Microsoft was in fact <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 attacking computers that run Windows 7 and 8</a>, switching on a flag that 
said whether to &ldquo;upgrade&rdquo; to Windows 10 when users had turned it 
off.</p>
 + 
@@ -1282,7 +1325,7 @@
 Id: -201601050
 PubDate: 2016-01-05
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>It appears <a 
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
 Windows 10 sends data to Microsoft about what applications are running</a>.</p>
 
 Id: -201512290
@@ -1293,12 +1336,24 @@
 + 
 +  <p>A game console is a computer, and you can't trust a computer with a 
nonfree operating system.</p>
 
+Id: -201512281
+PubDate: 2015-12-28
+Section: back-doors microsoft
+Keyword: windows surveillance
+Blurb: <p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
 Microsoft has already backdoored its disk encryption</a>.</p>
+
 Id: -201512280
 PubDate: 2015-12-28
-Section: back-doors surveillance microsoft
-Keyword: windows
+Section: surveillance
+Keyword: windows back-doors microsoft
 Blurb: <p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
 Microsoft has already backdoored its disk encryption</a>.</p>
 
+Id: -201512260
+PubDate: 2015-12-26
+Section: appleDRM drm ithing
+Keyword: hardware
+Blurb: <p><a 
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
 Apple uses DRM software to prevent people from charging an iThing with a 
generic USB cable</a>.</p>
+
 Id: -201512140
 PubDate: 2015-12-14
 Section:
@@ -1333,15 +1388,15 @@
 Id: -201511261
 PubDate: 2015-11-26
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>A downgrade to Windows 10 deleted surveillance-detection 
applications. Then another downgrade inserted a general spying program. Users 
noticed this and complained, so Microsoft renamed it <a 
href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
 to give users the impression it was gone</a>.</p>
 + 
 +  <p>To use proprietary software is to invite such treatment.</p>
 
 Id: -201511260
 PubDate: 2015-11-26
-Section: back-doors other microsoft windows
-Keyword: dell system
+Section: back-doors other
+Keyword: dell windows
 Blurb: <p>Dell computers, shipped with Windows, had a bogus root certificate 
that <a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
 allowed anyone (not just Dell) to remotely authorize any software to run</a> 
on the computer.</p>
 
 Id: -201511250
@@ -1360,8 +1415,8 @@
 
 Id: -201511240
 PubDate: 2015-11-24
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Windows 10 &ldquo;upgrades&rdquo; <a 
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
 delete applications</a> without asking permission.</p>
 
 Id: -201511192
@@ -1537,8 +1592,8 @@
 
 Id: -201509110
 PubDate: 2015-09-11
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p>Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
 repeatedly nagging many users to install Windows 10</a>.</p>
 
 Id: -201508210
@@ -1561,7 +1616,7 @@
 Id: -201508130
 PubDate: 2015-08-13
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p><a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
 Windows 10 sends identifiable information to Microsoft</a>, even if a user 
turns off its Bing search and Cortana features, and activates the 
privacy-protection settings.</p>
 
 Id: -201508120
@@ -1573,8 +1628,10 @@
 Id: -201507300
 PubDate: 2015-07-30
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>Windows 10 <a 
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
 ships with default settings that show no regard for the privacy of its 
users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' 
files, text input, voice input, location info, contacts, calendar records and 
web browsing history, as well as automatically connecting the machines to open 
hotspots and showing targeted ads.</p>
++ 
++  <p>We can suppose Microsoft looks at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p></li>
 
 Id: -201507280
 PubDate: 2015-07-28
@@ -1592,7 +1649,7 @@
 PubDate: 2015-07-21
 Section: cars insecurity
 Keyword: jeep phone
-Blurb: <p>Crackers were able to <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
 take remote control of the Jeep</a> &ldquo;connected car&rdquo;.+ They could 
track the car, start or stop the engine, and activate or deactivate the brakes, 
and more.</p>
+Blurb: <p>Crackers were able to <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
 take remote control of the Jeep</a> &ldquo;connected car&rdquo;. They could 
track the car, start or stop the engine, and activate or deactivate the brakes, 
and more.</p>
 + 
 +  <p>I expect that Chrysler and the NSA can do this too.</p>
 + 
@@ -1608,8 +1665,8 @@
 PubDate: 2007-09-13
 PubDate: 2007-08-26
 PubDate: 2015-07-17
-Section: back-doors universal microsoft windows
-Keyword: system
+Section: microsoft back-doors
+Keyword: windows universal
 Blurb: <p>Microsoft Windows has a universal back door through which <a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263";>
 any change whatsoever can be imposed on the users</a>.</p>
 + 
 +  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> this was 
used</a>.</p>
@@ -1618,8 +1675,8 @@
 
 Id: -201507150
 PubDate: 2015-07-15
-Section:
-Keyword:
+Section: microsoft subscriptions
+Keyword: office
 Blurb: <p>Microsoft Office forces users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>
 to subscribe to Office 365 to be able to create/edit documents</a>.</p>
 
 Id: -201507030
@@ -1659,12 +1716,12 @@
 Id: -201506170
 PubDate: 2015-06-17
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly 
impose a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 
full disk encryption <a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
 gives Microsoft a key</a>.</p>
 + 
 +  <p>Thus, Windows is overt malware in regard to surveillance, as in other 
issues.</p>
 + 
-+  <p>We can suppose Microsoft look at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p>
++  <p>We can suppose Microsoft looks at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p>
 + 
 +  <p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to track the browsing of each specific user.</p>
 + 
@@ -1747,16 +1804,10 @@
 
 Id: -201502060
 PubDate: 2015-02-06
-Section: back-doors other microsoft
-Keyword: intel amd
+Section: back-doors other potential
+Keyword: intel amd microsoft
 Blurb: <p>Here is a suspicion that we can't prove, but is worth thinking 
about: <a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
 Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for 
the NSA to invade computers, with the help of Microsoft, say respected security 
experts.</p>
 
-Id: -201501031
-PubDate: 2015-01-03
-Section: drm
-Keyword: google netflix
-Blurb: <p>The Netflix Android app <a 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix uses 
to enforce the geolocation restrictions dictated by the movie studios.</p>
-
 Id: -201501030
 PubDate: 2015-01-03
 Section: google drm
@@ -1923,8 +1974,8 @@
 
 Id: -201405140
 PubDate: 2014-05-14
-Section:
-Keyword:
+Section: microsoft surveillance
+Keyword: skydrive
 Blurb: <p><a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
 Microsoft SkyDrive allows the NSA to directly examine users' data</a>.</p>
 
 Id: -201405110
@@ -2047,8 +2098,8 @@
 
 Id: -201312040
 PubDate: 2013-12-04
-Section:
-Keyword:
+Section: microsoft insecurity
+Keyword: windows
 Blurb: <p><a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
 Point-of-sale terminals running Windows were taken over and turned into a 
botnet for the purpose of collecting customers' credit card numbers</a>.</p>
 
 Id: -201311300
@@ -2110,8 +2161,8 @@
 
 Id: -201309110
 PubDate: 2013-09-11
-Section: back-doors other microsoft
-Keyword: bitlocker
+Section: back-doors other potential
+Keyword: bitlocker microsoft
 Blurb: <p>Here is a big problem whose details are still secret: <a 
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";> The 
FBI asks lots of companies to put back doors in proprietary programs</a>. We 
don't know of specific cases where this was done, but every proprietary program 
for encryption is a possibility.</p>
 
 Id: -201309051
@@ -2198,15 +2249,17 @@
 
 Id: -201307110
 PubDate: 2013-07-11
-Section:
+Section: microsoft surveillance skype
 Keyword:
 Blurb: <p>Spyware in Skype: <a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
 
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
 Microsoft changed Skype <a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
 specifically for spying</a>.</p>
 
 Id: -201307080
+PubDate: 2003-02-28
 PubDate: 2013-07-08
-Section: surveillance microsoft windows
-Keyword: system
-Blurb: <p><a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 Windows 8.1 snoops on local searches.</a>.</p>
+PubDate: 2013-06-10
+Section: microsoft surveillance windows
+Keyword:
+Blurb: <p>Spyware in older versions of Windows: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
 Windows Update snoops on the user</a>. <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 Windows 8.1 snoops on local searches</a>. And there's a <a 
href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA key in 
Windows</a>, whose functions we don't know.
 
 Id: -201307000
 PubDate: 2013-07
@@ -2216,8 +2269,18 @@
 
 Id: -201306220
 PubDate: 2013-06-22
-Section:
-Keyword:
+Section: microsoft sabotage
+Keyword: windows
+Blurb: <p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
 Microsoft cut off security fixes for Windows XP, except to some big users that 
pay exorbitantly.</a></p>
++ 
++  <p>Microsoft is going to <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
 cut off support for some Internet Explorer versions</a> in the same way.</p>
++ 
++  <p>A person or company has the right to cease to work on a particular 
program; the wrong here is Microsoft does this after having made the users 
dependent on Microsoft, because they are not free to ask anyone else to work on 
the program for them.</p>
+
+Id: -201306220
+PubDate: 2013-06-22
+Section: microsoft sabotage
+Keyword: windows
 Blurb: <p><a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
 Microsoft informs the NSA of bugs in Windows before fixing them.</a></p>
 
 Id: -201306140
@@ -2226,12 +2289,6 @@
 Keyword: tesla
 Blurb: <p>Tesla cars allow the company to extract data remotely and determine 
the car's location at any time. (See <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
 Section 2, paragraphs b and c.</a>). The company says it doesn't store this 
information, but if the state orders it to get the data and hand it over, the 
state can store it.</p>
 
-Id: -201306100
-PubDate: 2013-06-10
-Section: surveillance microsoft windows
-Keyword: system
-Blurb: <p>And there's a <a 
href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA key in 
Windows</a>, whose functions we don't know.</p>
-
 Id: -201305100
 PubDate: 2013-05-10
 Section: tethers sabotage adobe 
@@ -2258,18 +2315,10 @@
 Keyword:
 Blurb: <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> 
The Amazon Kindle has DRM</a>. That article is flawed in that it fails to treat 
DRM as an ethical question; it takes for granted that whatever Amazon might do 
to its users is legitimate. It refers to DRM as digital &ldquo;rights&rdquo; 
management, which is the spin term used to promote DRM. Nonetheless it serves 
as a reference for the facts.</p>
 
-Id: -201303251
-PubDate: 2013-03-25
-Section: cars
-Keyword: surveillance
-Blurb: Proprietary software in cars <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
 records information about drivers' movements</a>, which is made available to 
car manufacturers, insurance companies, and others.</p>
-+ 
-+  <p>The case of toll-collection systems, mentioned in this article, is not 
really a matter of proprietary surveillance. These systems are an intolerable 
invasion of privacy, and should be replaced with anonymous payment systems, but 
the invasion isn't done by malware. The other cases mentioned are done by 
proprietary malware in the car.</p>
-
 Id: -201303250
 PubDate: 2013-03-25
-Section: surveillance
-Keyword: cars
+Section: surveillance cars
+Keyword:
 Blurb: <p id="records-drivers">Proprietary software in cars <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
 records information about drivers' movements</a>, which is made available to 
car manufacturers, insurance companies, and others.</p>
 + 
 +  <p>The case of toll-collection systems, mentioned in this article, is not 
really a matter of proprietary surveillance. These systems are an intolerable 
invasion of privacy, and should be replaced with anonymous payment systems, but 
the invasion isn't done by malware. The other cases mentioned are done by 
proprietary malware in the car.</p>
@@ -2367,8 +2416,8 @@
 
 Id: -201210080
 PubDate: 2012-10-08
-Section:
-Keyword:
+Section: microsoft jails mobiles
+Keyword: windows
 Blurb: <p><a 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
 Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.</p>
 
 Id: -201210020
@@ -2423,8 +2472,8 @@
 
 Id: -201110110
 PubDate: 2011-10-11
-Section:
-Keyword:
+Section: microsoft tyrants mobiles
+Keyword: windows
 Blurb: <p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> 
Mobile devices that come with Windows 8 are tyrants.</a></p>
 
 Id: -201110040
@@ -2536,7 +2585,7 @@
 Id: -200708131
 PubDate: 2007-08-13
 Section: drm microsoft
-Keyword: apple
+Keyword: windows apple
 Blurb: <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";> DRM 
in Windows</a>, introduced to cater to <a href="#bluray"> Bluray</a> disks.  
(The article talks about how the same malware would later be introduced in 
MacOS. That had not been done at the time, but it was done subsequently.)</p>
 
 Id: -200708130
@@ -2568,9 +2617,3 @@
 Section: games surveillance
 Keyword: Blizzard Warden
 Blurb: <p>Blizzard Warden is a hidden &ldquo;cheating-prevention&rdquo; 
program that <a 
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware";> spies 
on every process running on a gamer's computer and sniffs a good deal of 
personal data</a>, including lots of activities which have nothing to do with 
cheating.</p>
-
-Id: -20151226
-PubDate: 2015-12-26
-Section: appleDRM drm ithing
-Keyword: hardware
-Blurb: <p><a 
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
 Apple uses DRM software to prevent people from charging an iThing with a 
generic USB cable</a>.</p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]