[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary malware-microsof...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary malware-microsof... |
Date: |
Tue, 2 Oct 2018 05:49:49 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/02 05:49:49
Modified files:
server/staging/proprietary: malware-microsoft.html
Log message:
Move windows10 nagging to interference.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/malware-microsoft.html?cvsroot=www&r1=1.11&r2=1.12
Patches:
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/malware-microsoft.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-microsoft.html 27 Sep 2018 08:32:35 -0000 1.11
+++ malware-microsoft.html 2 Oct 2018 09:49:49 -0000 1.12
@@ -65,6 +65,7 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
+<!-- INSERT backdoor -->
<li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
@@ -114,11 +115,12 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
+<!-- INSERT DRM -->
<li id="M200708131">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
- href="/proprietary/proprietary-drm.html#bluray">Bluray</a>
- disks. (The article talks about how the same malware would later be
+ href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
+ (The article talks about how the same malware would later be
introduced in MacOS. That had not been done at the time, but it was
done subsequently.)</p>
</li>
@@ -133,6 +135,7 @@
bugs.</p>
<ul class="blurbs">
+<!-- INSERT insecurity -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -166,6 +169,7 @@
section describes examples of Microsoft committing interference.</p>
<ul class="blurbs">
+<!-- INSERT interference -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -192,6 +196,23 @@
go “too far”. We disagree.</p>
</li>
+ <li id="M201608170">
+ <p> After <a href="#windows10-forcing">forcing the download of Windows
10</a>
+ on computers that were running Windows 7 and 8, Microsoft <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
+ it off, in the hope that some day they would fail to say no.
+ This was done through <a
+
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+ malware techniques</a>.</p>
+
+ <p>A detailed <a
+
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+ analysis of Microsoft's scheme</a> is available on the Electronic
+ Frontier Foundation's website.</p>
+ </li>
+
<li id="M201603090">
<p>Microsoft has made companies'
Windows machines managed by the company's sysadmins <a
@@ -224,6 +245,7 @@
<h3 id="jails">Microsoft Jails</h3>
<ul class="blurbs">
+<!-- INSERT jails -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -254,6 +276,7 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
+<!-- INSERT sabotage -->
<li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
@@ -272,39 +295,20 @@
this work, it should let users do the work.</p>
</li>
- <li id="M201608170">
- <p id="windows10-forcing">In 2015, Microsoft committed acts of sabotage to
trick
- users of Windows 7 and 8 into installing all-spying Windows 10
- against their will. Among other things, Microsoft forced their
- computers to <a
+ <li id="M201606270">
+ <p id="windows10-forcing">In its efforts to trick users of Windows
+ 7 and 8 into installing all-spying Windows 10 against their
+ will, Microsoft forced their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
silently download… the whole of Windows 10</a>! Apparently,
this was done through a <a
- href="#windows-update">
+ href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
use up much needed resources</a>, but many of the people who let
installation proceed found out that this âupgradeâ was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
-
- <p>Then Microsoft attacked the
- computers that were still running Windows 7 or 8 by <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switching on a flag that urged users to
- “upgrade” to Windows 10</a> when they had turned
- it off, in the hope that some day they would fail to say no.
- This was done through <a
-
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
- deviant use of Windows Update</a>. (Later on, Microsoft published
- instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.)</p>
-
- <p>A detailed <a
-
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis of Microsoft's scheme</a> is available on the Electronic
- Frontier Foundation's website.</p>
</li>
<li id="M201606010">
@@ -363,6 +367,7 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
+<!-- INSERT subscriptions -->
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
@@ -374,6 +379,7 @@
<h3 id="surveillance">Microsoft Surveillance</h3>
<ul class="blurbs">
+<!-- INSERT surveillance -->
<li id="M201710134">
<p>Windows 10 telemetry program sends information to Microsoft about
the user's computer and their use of the computer.</p>
@@ -394,10 +400,10 @@
</li>
<li id="M201702020">
- <p>DRM-restricted files <a
-
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
- be used to identify people browsing through Tor</a>. The vulnerability
- exists only if you use Windows.</p>
+ <p>DRM-restricted files can be used to <a
+
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">
+ identify people browsing through Tor</a>. The vulnerability exists
+ only if you use Windows.</p>
</li>
<li id="M201611240">
@@ -427,6 +433,12 @@
running</a>.</p>
</li>
+ <li id="M201512280">
+ <p>Microsoft has <a
+
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ backdoored its disk encryption</a>.</p>
+ </li>
+
<li id="M201511264">
<p>A downgrade to Windows 10 deleted surveillance-detection
applications. Then another downgrade inserted a general spying
@@ -521,6 +533,7 @@
<h3 id="tyrants">Microsoft Tyrants</h3>
<ul class="blurbs">
+<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -598,7 +611,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/27 08:32:35 $
+$Date: 2018/10/02 09:49:49 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/server/staging/proprietary malware-microsof...,
Therese Godefroy <=