[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary proprietary-back...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary proprietary-back... |
Date: |
Tue, 2 Oct 2018 16:35:59 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/02 16:35:59
Modified files:
server/staging/proprietary: proprietary-back-doors.html
proprietary-censorship.html
proprietary-surveillance.html
server/staging/proprietary/rec: propr-blurbs.rec
proprietary-stub.html
Log message:
Reformat the toc; add explanations.rec/proprietary-stub.html
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-back-doors.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-back-doors.html 24 Sep 2018 21:26:47 -0000 1.4
+++ proprietary-back-doors.html 2 Oct 2018 20:35:58 -0000 1.5
@@ -42,7 +42,8 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706070">
+<!-- INSERT spy -->
+ <li id="M201706202">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -51,14 +52,26 @@
<p>Since these accounts with hard-coded passwords are impossible
to delete, this problem is not merely an insecurity; it amounts to
- a back door that can be used by the manufacturer (and government)
- to spy on users.</p>
+ a back door that can be used by the manufacturer (and
+ government) to spy on users.</p>
+ </li>
+
+ <li id="M201701130">
+ <p>WhatsApp has a feature that <a
+
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described as a “back door”</a> because it would
+ enable governments to nullify its encryption.</p>
+
+ <p>The developers say that it wasn't intended as a back door, and that
+ may well be true. But that leaves the crucial question of whether it
+ functions as one. Because the program is nonfree, we cannot check by
+ studying it.</p>
</li>
<li id="M201512280">
- <p><a
+ <p>Microsoft has <a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft has backdoored its disk encryption</a>.</p>
+ backdoored its disk encryption</a>.</p>
</li>
<li id="M201409220">
@@ -78,6 +91,7 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
+<!-- INSERT alter-data -->
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -96,9 +110,9 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server accounts, it can
- alter them too</a>.</p>
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
<li id="M201512074">
@@ -164,9 +178,9 @@
<p>Amazon responded to criticism by saying it
would delete books only following orders from the
state. However, that policy didn't last. In 2012 it <a
-
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
- a user's Kindle-Swindle and deleted her account</a>, then offered
- her kafkaesque “explanations.”</p>
+
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ wiped a user's Kindle-Swindle and deleted her account</a>, then
+ offered her kafkaesque “explanations.”</p>
<p>Do other ebook readers have back doors in their nonfree software? We
don't know, and we have no way to find out. There is no reason to
@@ -185,10 +199,11 @@
<h3 id='install-delete'>Installing or deleting programs</h3>
<ul class="blurbs">
+<!-- INSERT install-delete -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">load
- downgrades that install a surveillance app</a>.</p>
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
@@ -207,9 +222,10 @@
</li>
<li id="M201112080">
- <p><a
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8 has a back door for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
- Windows 8 also has a back door for remotely deleting apps</a>.</p>
+ remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers malicious.
@@ -253,6 +269,7 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+<!-- INSERT universal -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -269,17 +286,17 @@
</li>
<li id="M201709091">
- <p>Tesla used software to limit the
- part of the battery that was available to customers, and <a
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
this limit.</p>
<p>While remotely allowing car “owners” to use the
- whole battery capacity did not do them any harm, the same back door
- would permit Tesla (perhaps under the command of some government)
- to remotely order the car to use none of its battery. Or perhaps to
- drive its passenger to a torture prison.</p>
+ whole battery capacity did not do them any harm, the same back
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car to use none of its battery. Or
+ perhaps to drive its passenger to a torture prison.</p>
</li>
<li id="M201702061">
@@ -306,16 +323,16 @@
any change whatsoever can be imposed on the users</a>.</p>
<p>This was <a
-
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">reported
- in 2007</a> for XP and Vista, and it seems
+ href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
-
href="server/staging/proprietary/malware-microsoft.html#windows10-forcing">Windows
- 10 downgrade</a> to computers running Windows 7 and 8.</p>
+ href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+ Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
-
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
- and immediately imposed</a>.</p>
+
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
+ forcibly and immediately imposed</a>.</p>
</li>
<li id="M201606060">
@@ -372,6 +389,7 @@
<h3 id='other'>Other or undefined</h3>
<ul class="blurbs">
+<!-- INSERT other -->
<li id="M201711204">
<p>Intel's intentional “management engine” back door has <a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
@@ -497,7 +515,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/24 21:26:47 $
+$Date: 2018/10/02 20:35:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-censorship.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-censorship.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-censorship.html 16 Apr 2018 09:56:52 -0000 1.2
+++ proprietary-censorship.html 2 Oct 2018 20:35:58 -0000 1.3
@@ -1,5 +1,10 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -22,160 +27,64 @@
company to impose censorship ought to be forbidden by law, but it
isn't.</p>
-<p class="c">
- <a href="#apple">Apple products</a> |
- <a href="#google">Google products</a> |
- <a href="#other">Other</a>
-</p>
-
-<h3 id="apple">Apple products</h3>
-
-<ul>
- <li>
- <p>Apple <a
-
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs from its app store for China</a>, thus using
- its own censorship power to strengthen that of the Chinese
- government.</p>
- </li>
-
- <li>
- <p>Apple is <a
-
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for the US government too</a>. Specifically, it
- is deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are in Apple. If Apple had not designed
- the iMonsters to let Apple censor applications, Apple would not have
- had the power to stop users from installing whatever kind of apps.</p>
- </li>
-
- <li>
- <p>Apple used its censorship system to enforce Russian surveillance <a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
- by blocking distribution of the LinkedIn app in Russia</a>.</p>
- <p>This is ironic because LinkedIn is a surveillance system itself.
- While subjecting its users to its own surveillance, it tries to
- protect its users from Russian surveillance, and is therefore
- subject to Russian censorship.</p>
- <p>However, the point here is the wrong of Apple's censorship of
- apps.</p>
- </li>
-
- <li>
- <p>Apple used its censorship system to enforce China's censorship <a
-
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of the New York Times app</a>.</p>
- </li>
-
- <li>
- <p>Apple censors games, <a
-
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning some games from the cr…app store</a> because of which
- political points they suggest. Some political points are apparently
- considered acceptable.</p>
- </li>
-
- <li>
- <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
- banned a program from the App Store</a> because its developers
- committed the enormity of disassembling some iThings.</p>
- </li>
-
- <li>
- <p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps that endorse abortion rights or would help
- women find abortions</a>.</p>
- <p>This particular political slant <a
-
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p>
- </li>
-
- <li>
- <p>Apple has banned iThing applications that show the confederate flag.
- <a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as a symbol of racism</a>, but even
- strategic games that use it to represent confederate army units
- fighting in the Civil War.</p>
- <p>This ludicrous rigidity illustrates the point that Apple should not
- be allowed to censor apps. Even if Apple carried out this act of
- censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either of these questions, or any other.</p>
- </li>
-
- <li>
- <p>Apple rejected an app that displayed the locations of US drone
- assassinations, giving various excuses. Each time the developers
- fixed one “problem”, Apple complained about another.
- After the fifth rejection, Apple <a
- href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
- matter</a>.</p>
- </li>
-
- <li>
- <p>Apple used this censorship power in 2014 to <a
-
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned a game about growing marijuana</a>, while permitting games
- about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p>
- </li>
-
- <li>
- <p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
- </li>
-</ul>
-
-<h3 id="google">Google products</h3>
-
-<ul>
- <li><p>Google <a
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
+
+<h3>Apple</h3>
+
+<p>Apple mainly uses iOS, which is a typical jail, to impose censorship
+through the Apple Store. Please refer to <a
+href="/proprietary/proprietary-jails.html#apple">Proprietary Jails</a>
+for more information.</p>
+
+<h3>Google</h3>
+
+<ul class="blurbs">
+ <li id="M201703160">
+ <p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
offers censorship software</a>, ostensibly for parents to put into
their children's computers.</p>
</li>
- <li>
- <p><a
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
- Google censored installation of Samsung's ad-blocker,</a> saying
- that blocking ads is “interference” with the sites that
- advertise (and surveil users through ads).</p>
+ <li id="M201701180">
+ <p>On Windows and MacOS, Chrome <a
+
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq">
+ disables extensions</a> that are not hosted in the Chrome Web
+ Store.</p>
+
+ <p>For example, an extension was <a
+
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
+ banned from the Chrome Web Store, and permanently disabled</a> on
+ more than 40,000 computers.</p>
+ </li>
+
+ <li id="M201602030">
+ <p><a
+
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
+ Google censored installation of Samsung's ad-blocker</a> on Android
+ phones, saying that blocking ads is “interference” with
+ the sites that advertise (and surveil users through ads).</p>
+
<p>The ad-blocker is proprietary software, just like the program
- (Google Play) that Google used to deny access to install it. Using a
- nonfree program gives the owner power over you, and Google has
+ (Google Play) that Google used to deny access to install it. Using
+ a nonfree program gives the owner power over you, and Google has
exercised that power.</p>
- <p>Google's censorship, unlike that of Apple and Microsoft, is not
- total: Android allows users to install apps in other ways. You can
- install free programs from f-droid.org.</p>
- </li>
- <li>
- <p>Chrome <a
- href="https://support.google.com/chrome/answer/6261569?hl=en">
- censors downloads of software</a>.</p>
- <p>Helping users avoid malicious software downloads is useful,
- but forcibly stopping them is wrong.</p>
- </li>
-
- <li>
- <p>Chrome, on Windows, now <a
-
href="https://thenextweb.com/google/2014/05/27/google-starts-blocking-extensions-chrome-web-store-windows-users-disables-installed-ones/">
- censors extensions</a>.</p>
- <p>Google said it would <a
- href="/proprietary/proprietary-back-doors.html#chrome-erase-addons">
- force-delete unauthorized extensions</a>.</p>
+ <p>Google's censorship, unlike that of Apple, is not total: Android
+ allows users to install apps in other ways. You can install free
+ programs from f-droid.org.</p>
</li>
</ul>
-<h3 id="other">Other</h3>
-<ul>
- <li>
+<h3>Game consoles</h3>
+
+<ul class="blurbs">
+ <li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
Nintendo 3DS</a> censors web browsing; it is possible to turn off
@@ -184,6 +93,7 @@
</li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -234,14 +144,14 @@
<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
-Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/16 09:56:52 $
+$Date: 2018/10/02 20:35:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-surveillance.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-surveillance.html 24 Sep 2018 21:48:53 -0000 1.7
+++ proprietary-surveillance.html 2 Oct 2018 20:35:58 -0000 1.8
@@ -88,6 +88,7 @@
<li><a href="#SpywareInTVSets">TV Sets</a></li>
<li><a href="#SpywareInCameras">Cameras</a></li>
<li><a href="#SpywareInToys">Toys</a></li>
+ <li><a href="#SpywareInDrones">Drones</a></li>
<li><a href="#SpywareAtHome">Other Appliances</a></li>
<li><a href="#SpywareOnWearables">Wearables</a>
<ul>
@@ -95,7 +96,6 @@
</ul>
</li>
<li><a href="#SpywareInVehicles">Vehicles</a></li>
- <li><a href="#SpywareInDrones">Drones</a></li>
<li><a href="#SpywareInVR">Virtual Reality</a></li>
</ul>
</li>
@@ -352,13 +352,12 @@
</li>
<li id="M201410300">
- <p><a
-
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends to Apple
- servers unsaved documents being edited</a>. The <a
+ <p> MacOS automatically <a
+
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ sends to Apple servers unsaved documents being edited</a>. The
+ things you have not decided to save are <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
- things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p>
+ even more sensitive</a> than the things you have stored in files.</p>
</li>
<li id="M201410220">
@@ -509,9 +508,9 @@
<p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
- <p> iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices. Any edits you make
- are automatically updated everywhere. […]</p>
+ <blockquote><p> iCloud Photo Library stores every photo and video you
+ take, and keeps them up to date on all your devices. Any edits you
+ make are automatically updated everywhere. […] </p></blockquote>
<p>(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -994,9 +993,9 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server accounts, it can
- alter them too</a>.</p>
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
<li id="M201601130">
@@ -1239,8 +1238,8 @@
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term “<a
- href="/philosophy/words-to-avoid.html#Monetize">monetize</a>”.</p>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1258,8 +1257,8 @@
<ul class="blurbs">
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">load
- downgrades that install a surveillance app</a>.</p>
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
@@ -1284,8 +1283,8 @@
on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
- tracking</a>.</p>
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
</li>
<li id="M201511060">
@@ -1306,9 +1305,9 @@
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
-
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
- TV advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p>
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
@@ -1318,10 +1317,10 @@
</li>
<li id="M201505290">
- <p><a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
- cable TV snoops on what programs people watch, and even what they
- wanted to record</a>.</p>
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
<li id="M201504300">
@@ -1333,8 +1332,8 @@
<li id="M201502090">
<p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
- users' voice on the internet to another company, Nuance</a>.
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company, Nuance</a>.
Nuance can save it and would then have to give it to the US or some
other government.</p>
@@ -1348,8 +1347,8 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1372,12 +1371,11 @@
</li>
<li id="M201405200">
- <p>Spyware in <a
+ <p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches, and the
- switch to turn this off has no effect. (The fact that the transmission
- reports a 404 error really means nothing; the server could save that
- data anyway.)</p>
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
@@ -1434,8 +1432,8 @@
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras <a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
+ <p>Over 70 brands of network-connected surveillance cameras have <a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -1540,6 +1538,21 @@
<div class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
<h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
@@ -1692,21 +1705,6 @@
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
<h4 id="SpywareInVR">Virtual Reality</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
@@ -1912,9 +1910,9 @@
</li>
<li id="M201212290">
- <p>The Cisco <a
-
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">TNP
- IP phones contain a spyware</a>.</p>
+ <p>The Cisco TNP IP phones are <a
+ href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ spying devices</a>.</p>
</li>
</ul>
@@ -1977,7 +1975,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/24 21:48:53 $
+$Date: 2018/10/02 20:35:58 $
<!-- timestamp end -->
</p>
</div>
Index: rec/propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- rec/propr-blurbs.rec 1 Oct 2018 21:25:09 -0000 1.18
+++ rec/propr-blurbs.rec 2 Oct 2018 20:35:59 -0000 1.19
@@ -1067,7 +1067,7 @@
Section: apple DRM
Keyword: sabotage
Blurb: <p>DRM makes the iPhone 7 nearly <a
-+ href="iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
++ href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
Id: -201704070
PubDate: 2017-04-07
@@ -1683,20 +1683,15 @@
+
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+ blatantly disregards user choice and privacy</a>.</p>
-Id: -201608170
+Id: -201606270
PubDate: 2015-09-11
PubDate: 2016-06-03
PubDate: 2016-06-27
-PubDate: 2015-12-07
-PubDate: 2016-03-17
-PubDate: 2016-01-14
-PubDate: 2016-08-17
Section: sabotage microsoft
Keyword: windows
-Blurb: <p id="windows10-forcing">In 2015, Microsoft committed acts of sabotage
to trick
-+ users of Windows 7 and 8 into installing all-spying Windows 10
-+ against their will. Among other things, Microsoft forced their
-+ computers to <a
+Blurb: <p id="windows10-forcing">In its efforts to trick users of Windows
++ 7 and 8 into installing all-spying Windows 10 against their
++ will, Microsoft forced their computers to <a
+
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ silently download… the whole of Windows 10</a>! Apparently,
+ this was done through a <a
@@ -1707,19 +1702,22 @@
+ installation proceed found out that this âupgradeâ was in fact a <a
+
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ downgrade</a>.</p>
-+
-+ <p>Then Microsoft attacked the
-+ computers that were still running Windows 7 or 8 by <a
+
+Id: -201608170
+PubDate: 2015-12-07
+PubDate: 2016-03-17
+PubDate: 2016-08-17
+Section: interference microsoft
+Keyword: windows
+Blurb: <p> After <a href="#windows10-forcing">forcing the download of Windows
10</a>
++ on computers that were running Windows 7 and 8, Microsoft <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
-+ repeatedly switching on a flag that urged users to
++ repeatedly switched on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
+ it off, in the hope that some day they would fail to say no.
+ This was done through <a
+
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-+ deviant use of Windows Update</a>. (Later on, Microsoft published
-+ instructions on <a
-+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
-+ how to permanently reject the downgrade to Windows 10</a>.)</p>
++ malware techniques</a>.</p>
+
+ <p>A detailed <a
+
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
Index: rec/proprietary-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/proprietary-stub.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- rec/proprietary-stub.html 19 Sep 2018 20:56:40 -0000 1.4
+++ rec/proprietary-stub.html 2 Oct 2018 20:35:59 -0000 1.5
@@ -1,4 +1,4 @@
-<!--#include virtual="/server/header.html" -->
+<!--#include virtual="/server/html5-header.html" -->
<!-- Parent-Version: 1.84 -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -12,19 +12,28 @@
div.companies { float: right; margin-bottom: .5em; }
div.malfunctions { max-width: 27em; }
<!--
-.button { float: left; margin: 0 .5em; }
+.button { float: left; margin: .5em; }
.button a { display: inline-block; }
+
+div.toc ol { margin-bottom: 0; }
+div.toc ul li { list-style: none; margin-right: 1em; }
+div.toc ol li { margin: .5em 1em 0; }
div.toc h3 {
- text-align: left;
font-size: 1.2em;
- padding: 0 .83em;
- margin: .5em 1.5% 1em;
-}
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc p { margin: 0 3%; }
-div.toc { margin-top: 1em; }
---></style>
+ padding: .8em .83em 0;
+ margin: 0 1.5% 1em;
+}
+.toc h3 span { font-weight: normal; }
+.list { padding-bottom: .5em; }
+.toc .left, .toc .left .list { float: left; }
+.toc .right, .toc .right .list { float: right; }
+div.toc .right h3,
+ div.toc .right ul {text-align: right; }
+-->
+.toc .left { width: 55%; }
+.toc .right { width: 45%; }
+</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -55,56 +64,88 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of September, 2018, the files in this directory list over 350
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.</p>
+<p>As of September, 2018, the pages in this directory list nearly 350
+instances of malicious functionalities (with close to 400 references to
+back them up), but there are surely thousands more we don't know about.</p>
<div class="toc" id="TOC">
-<div class="companies">
-<h3>Company or type of product</h3>
+<div class="left">
+<div class="list">
+<h3>Injustices</h3>
<ul>
- <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
- <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
- <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
- <li><a href="/proprietary/malware-google.html">Google Malware</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
- <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
- <li><a href="/proprietary/malware-cars.html">Malware in cars</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
- <li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
- <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<h3>Type of malware</h3>
-<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
<li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
<li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
- <li><a href="/proprietary/proprietary-drm.html">Digital restrictions
- management</a> (1)</li>
<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a> (2)</li>
<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (3)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (4)</li>
- <li><a href="/proprietary/potential-malware.html">Potential Malware</a></li>
</ul>
</div>
-
-<p>(1) Digital restrictions management, or “DRM”: functionalities
-designed to restrict what users can do with the data in their computers.<br />
- (2) Jails: systems that impose censorship on application programs.<br />
- (3) Tethers: functionalities that require permanent (or very frequent)
-connection to a server.<br />
- (4) Tyrants: systems that reject any operating system not
-“authorized” by the manufacturer.</p>
+<div class="list">
+<h3>Techniques <span>(1)</span></h3>
+<ul>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (2)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a> (3)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a> (4)</li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (5)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (6)</li>
+ <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+</ul>
+</div>
+</div>
+<div class="right">
+<div class="list">
+<h3>Companies</h3>
+<ul>
+ <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a href="/proprietary/malware-google.html">Google</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+</ul>
+</div>
+<div class="list">
+<h3>Products</h3>
+<ul>
+ <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a href="/proprietary/malware-games.html">Games</a></li>
+ <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
+</ul>
+</div>
+</div>
+<div style="clear:both"></div>
+<hr />
+<ol>
+<li>These are only a few of the techniques that are used to turn proprietary
+software into malware. Each technique is tightly associatd with one or more
+injustices. Back doors mean insecurity (and surveillance, most often),
+tethers imply surveillance and insecurity, jails and tyrants are instruments
+of censorship, DRM does censorship and/or sabotage, and subscriptions imply
+interference. We don't list each example of malware in all the categories it
+belongs to.</li>
+
+<li><em>Back door:</em> any mechanism that provides a way of modifying
+files in a computer without the user being aware of it and willing to do the
+modification, whether this mechanism is documented or not.
+
+<li><em>Digital restrictions management, or “DRM”:</em>
+functionalities designed to restrict what users can do with the data in their
+computers.</li>
+
+<li><em>Jails:</em> systems that impose censorship on application
+programs.</li>
+
+<li><em>Tethers:</em> functionalities that require permanent (or very
+frequent) connection to a server.</li>
+
+<li><em>Tyrants:</em> systems that reject any operating system not
+“authorized” by the manufacturer.</li>
+</ol>
</div>
<p>Users of proprietary software are defenseless against these forms
@@ -175,7 +216,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/02 20:35:59 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/server/staging/proprietary proprietary-back...,
Therese Godefroy <=