[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary/rec README apple...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary/rec README apple... |
Date: |
Sun, 16 Sep 2018 15:29:13 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/09/16 15:29:13
Modified files:
server/staging/proprietary/rec: README apple-stub.html
google-stub.html
microsoft-stub.html
Log message:
Reorganize alphabetically; add 'latest additions' section.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/README?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/apple-stub.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/google-stub.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/microsoft-stub.html?cvsroot=www&r1=1.1&r2=1.2
Patches:
Index: README
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/README,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- README 16 Sep 2018 10:23:37 -0000 1.3
+++ README 16 Sep 2018 19:29:13 -0000 1.4
@@ -38,9 +38,9 @@
Progress as of Sept 16, 2018:
-Total: 358 blurbs extracted from all pages in proprietary-*, + pages in
+Total: 363 blurbs extracted from all pages in proprietary-*, + pages in
malware-* that have been tagged so far.
-Tagged: 162 blurbs
+Tagged: 194 blurbs
Completely tagged pages:
malware-adobe
@@ -50,7 +50,10 @@
malware-cars
malware-games
malware-google
+ malware-microsoft
+ malware-webpages
proprietary-back-doors
+ potential-malware
Many thanks for your help!
Index: apple-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/apple-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- apple-stub.html 14 Sep 2018 21:12:47 -0000 1.1
+++ apple-stub.html 16 Sep 2018 19:29:13 -0000 1.2
@@ -37,23 +37,23 @@
<div class="summary" style="margin-top: 2em">
<h3>Type of malware</h3>
<ul>
-<li><a href="#back-doors">Back doors</a></li>
-<li><a href="#censorship">Censorship</a></li>
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#pressuring">Pressuring</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#incompatibility">Incompatibility</a></li>
-<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
+ <li><a href="#back-doors">Back doors</a></li>
+ <li><a href="#censorship">Censorship</a></li>
+ <li><a href="#deception">Deception</a></li>
+ <li><a href="#drm">Digital restrictions
+ management</a> or “DRM”—functionalities designed
to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>—systems
+ <li><a href="#incompatibility">Incompatibility</a></li>
+ <li><a href="#insecurity">Insecurity</a></li>
+ <li><a href="#interference">Interference</a></li>
+ <li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>—systems
+ <li><a href="#pressuring">Pressuring</a></li>
+ <li><a href="#sabotage">Sabotage</a></li>
+ <li><a href="#surveillance">Surveillance</a></li>
+ <li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
-<li><a href="#deception">Deception</a></li>
</ul>
</div>
@@ -67,6 +67,20 @@
section for more information.</p>
<!-- INSERT censorship.list -->
+<h3 id="deception">Apple Deception</h3>
+<!-- INSERT deception.list -->
+
+<h3 id="drm">Apple DRM</h3>
+<!-- INSERT appleDRM.list -->
+
+<h3 id="incompatibility">Apple Incompatibility</h3>
+
+<p>In this section, we list characteristics of Apple programs that block or
+hinder users from switching to any alternative program—and, in
+particular, from switching to free software which can liberate the device
+the software runs on.</p>
+<!-- INSERT incompatibility.list -->
+
<h3 id="insecurity">Apple Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
@@ -81,31 +95,6 @@
interference.</p>
<!-- INSERT interference.list -->
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
-<!-- INSERT pressuring.list -->
-
-<h3 id="sabotage">Apple Sabotage</h3>
-
-<p>These are situations in which Apple employs its power over users
-to directly intervene in ways that harm them or block their work.</p>
-<!-- INSERT sabotage.list -->
-
-<h3 id="surveillance">Apple Surveillance</h3>
-<!-- INSERT surveillance.list -->
-
-<h3 id="incompatibility">Apple Incompatibility</h3>
-
-<p>In this section, we list characteristics of Apple programs that block or
-hinder users from switching to any alternative program—and, in
-particular, from switching to free software which can liberate the device
-the software runs on.</p>
-<!-- INSERT incompatibility.list -->
-
-<h3 id="drm">Apple DRM</h3>
-<!-- INSERT appleDRM.list -->
-
<h3 id="jails">Apple Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
@@ -129,12 +118,23 @@
<h4>Examples of censorship by Apple jails</h4>
<!-- INSERT jails.list -->
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
+<!-- INSERT pressuring.list -->
+
+<h3 id="sabotage">Apple Sabotage</h3>
+
+<p>These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.</p>
+<!-- INSERT sabotage.list -->
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<!-- INSERT surveillance.list -->
+
<h3 id="tyrants">Apple Tyrants</h3>
<!-- INSERT tyrants.list -->
-<h3 id="deception">Apple Deception</h3>
-<!-- INSERT deception.list -->
-
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -192,7 +192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
<!-- timestamp end -->
</p>
</div>
Index: google-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/google-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- google-stub.html 14 Sep 2018 21:12:47 -0000 1.1
+++ google-stub.html 16 Sep 2018 19:29:13 -0000 1.2
@@ -36,24 +36,23 @@
</div>
<div class="summary" style="margin-top: 2em">
- <h3><strong>Type of malware</strong></h3>
- <ul>
+<h3><strong>Type of malware</strong></h3>
+<ul>
<li><a href="#back-doors">Back doors</a></li>
<li><a href="#censorship">Censorship</a></li>
- <li><a href="#insecurity">Insecurity</a></li>
- <!--<li><a href="#pressuring">Pressuring</a></li>-->
- <li><a href="#sabotage">Sabotage</a></li>
- <li><a href="#surveillance">Surveillance</a></li>
+<!--<li><a href="#deception">Deception</a></li>-->
<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
+ management</a> or “DRM”—functionalities designed
to restrict what users can do with the data in their computers.</li>
- <!--<li><a href="#jails">Jails</a>—systems
+ <li><a href="#insecurity">Insecurity</a></li>
+<!--<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>-->
+ <li><a href="#sabotage">Sabotage</a></li>
+ <li><a href="#surveillance">Surveillance</a></li>
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
- <!--<li><a href="#deception">Deception</a></li>-->
- </ul>
+</ul>
</div>
<h3 id="back-doors">Google Back Doors</h3>
@@ -144,7 +143,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
<!-- timestamp end -->
</p>
</div>
Index: microsoft-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/microsoft-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- microsoft-stub.html 14 Sep 2018 21:12:47 -0000 1.1
+++ microsoft-stub.html 16 Sep 2018 19:29:13 -0000 1.2
@@ -39,27 +39,30 @@
<div class="summary" style="margin-top: 2em">
<h3>Type of malware</h3>
<ul>
-<li><a href="#back-doors">Back doors</a></li>
+ <li><a href="#back-doors">Back doors</a></li>
<!--<li><a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
+ <li><a href="#drm">Digital restrictions
+ management</a> or “DRM”—functionalities designed
to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>—systems
+ <li><a href="#insecurity">Insecurity</a></li>
+ <li><a href="#interference">Interference</a></li>
+ <li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>—systems
+ <li><a href="#sabotage">Sabotage</a></li>
+ <li><a href="#subscriptions">Subscriptions</a></li>
+ <li><a href="#surveillance">Surveillance</a></li>
+ <li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
-<li><a href="#subscriptions">Subscriptions</a></li>
</ul>
</div>
<h3 id="back-doors">Microsoft Back Doors</h3>
<!-- INSERT back-doors.list -->
+<h3 id="drm">Microsoft DRM</h3>
+<!-- INSERT drm.list -->
+
<h3 id="insecurity">Microsoft Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
@@ -68,6 +71,16 @@
bugs.</p>
<!-- INSERT insecurity.list -->
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They are like
sabotage, but they are not grave enough to qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+interference.</p>
+<!-- INSERT interference.list -->
+
+<h3 id="jails">Microsoft Jails</h3>
+<!-- INSERT jails.list -->
+
<h3 id="sabotage">Microsoft Sabotage</h3>
<p>The wrongs in this section are not precisely malware, since they do
@@ -76,28 +89,15 @@
actions that harm to the users of specific Microsoft software.</p>
<!-- INSERT sabotage.list -->
-<h3 id="interference">Microsoft Interference</h3>
-
-<p>Various proprietary programs often mess up the user's system. They are like
sabotage, but they are not grave enough to qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
-interference.</p>
-<!-- INSERT interference.list -->
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<!-- INSERT subscriptions.list -->
<h3 id="surveillance">Microsoft Surveillance</h3>
<!-- INSERT surveillance.list -->
-<h3 id="drm">Microsoft DRM</h3>
-<!-- INSERT drm.list -->
-
-<h3 id="jails">Microsoft Jails</h3>
-<!-- INSERT jails.list -->
-
<h3 id="tyrants">Microsoft Tyrants</h3>
<!-- INSERT tyrants.list -->
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
-<!-- INSERT subscriptions.list -->
-
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -158,7 +158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/server/staging/proprietary/rec README apple...,
Therese Godefroy <=