www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary proprietary-back...


From: Therese Godefroy
Subject: www/server/staging/proprietary proprietary-back...
Date: Tue, 2 Oct 2018 16:35:59 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/02 16:35:59

Modified files:
        server/staging/proprietary: proprietary-back-doors.html 
                                    proprietary-censorship.html 
                                    proprietary-surveillance.html 
        server/staging/proprietary/rec: propr-blurbs.rec 
                                        proprietary-stub.html 

Log message:
        Reformat the toc; add explanations.rec/proprietary-stub.html

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.4&r2=1.5

Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-back-doors.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-back-doors.html 24 Sep 2018 21:26:47 -0000      1.4
+++ proprietary-back-doors.html 2 Oct 2018 20:35:58 -0000       1.5
@@ -42,7 +42,8 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-  <li id="M201706070">
+<!-- INSERT spy -->
+  <li id="M201706202">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and <a
@@ -51,14 +52,26 @@
 
     <p>Since these accounts with hard-coded passwords are impossible
     to delete, this problem is not merely an insecurity; it amounts to
-    a back door that can be used by the manufacturer (and government)
-    to spy on users.</p>
+    a back door that can be used by the manufacturer (and
+    government) to spy on users.</p>
+  </li>
+
+  <li id="M201701130">
+    <p>WhatsApp has a feature that <a
+    
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+    has been described as a &ldquo;back door&rdquo;</a> because it would
+    enable governments to nullify its encryption.</p>
+
+    <p>The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.</p>
   </li>
 
   <li id="M201512280">
-    <p><a
+    <p>Microsoft has <a
     
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-    Microsoft has backdoored its disk encryption</a>.</p>
+    backdoored its disk encryption</a>.</p>
   </li>
 
   <li id="M201409220">
@@ -78,6 +91,7 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
+<!-- INSERT alter-data -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -96,9 +110,9 @@
 
   <li id="M201604250">
     <p>A pregnancy test controller application not only can <a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>spy
-    on many sorts of data in the phone, and in server accounts, it can
-    alter them too</a>.</p>
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too</a>.</p>
   </li>
 
   <li id="M201512074">
@@ -164,9 +178,9 @@
     <p>Amazon responded to criticism by saying it
     would delete books only following orders from the
     state.  However, that policy didn't last.  In 2012 it <a
-    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
-    a user's Kindle-Swindle and deleted her account</a>, then offered
-    her kafkaesque &ldquo;explanations.&rdquo;</p>
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    wiped a user's Kindle-Swindle and deleted her account</a>, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;</p>
 
     <p>Do other ebook readers have back doors in their nonfree software? We
     don't know, and we have no way to find out.  There is no reason to
@@ -185,10 +199,11 @@
 <h3 id='install-delete'>Installing or deleting programs</h3>
 
 <ul class="blurbs">
+<!-- INSERT install-delete -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>load
-    downgrades that install a surveillance app</a>.</p>
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
 
     <p>We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
@@ -207,9 +222,10 @@
   </li>
 
   <li id="M201112080">
-    <p><a
+    <p> In addition to its <a href="#windows-update">universal back
+    door</a>, Windows 8 has a back door for <a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
-    Windows 8 also has a back door for remotely deleting apps</a>.</p>
+    remotely deleting apps</a>.</p>
 
     <p>You might well decide to let a security service that you trust
     remotely <em>deactivate</em> programs that it considers malicious.
@@ -253,6 +269,7 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
+<!-- INSERT universal -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -269,17 +286,17 @@
   </li>
 
   <li id="M201709091">
-    <p>Tesla used software to limit the
-    part of the battery that was available to customers, and <a
+    <p>Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
     a universal back door in the software</a> to temporarily increase
     this limit.</p>
 
     <p>While remotely allowing car &ldquo;owners&rdquo; to use the
-    whole battery capacity did not do them any harm, the same back door
-    would permit Tesla (perhaps under the command of some government)
-    to remotely order the car to use none of its battery. Or perhaps to
-    drive its passenger to a torture prison.</p>
+    whole battery capacity did not do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
+    perhaps to drive its passenger to a torture prison.</p>
   </li>
 
   <li id="M201702061">
@@ -306,16 +323,16 @@
     any change whatsoever can be imposed on the users</a>.</p>
 
     <p>This was <a
-    
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>reported
-    in 2007</a> for XP and Vista, and it seems
+    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
-    
href="server/staging/proprietary/malware-microsoft.html#windows10-forcing">Windows
-    10 downgrade</a> to computers running Windows 7 and 8.</p>
+    href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+    Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
 
     <p>In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
-    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>forcibly
-    and immediately imposed</a>.</p>
+    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    forcibly and immediately imposed</a>.</p>
   </li>
 
   <li id="M201606060">
@@ -372,6 +389,7 @@
 <h3 id='other'>Other or undefined</h3>
 
 <ul class="blurbs">
+<!-- INSERT other -->
   <li id="M201711204">
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -497,7 +515,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/24 21:26:47 $
+$Date: 2018/10/02 20:35:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-censorship.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-censorship.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-censorship.html 16 Apr 2018 09:56:52 -0000      1.2
+++ proprietary-censorship.html 2 Oct 2018 20:35:58 -0000       1.3
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -22,160 +27,64 @@
 company to impose censorship ought to be forbidden by law, but it
 isn't.</p>
 
-<p class="c">
-   <a href="#apple">Apple&nbsp;products</a> |
-   <a href="#google">Google&nbsp;products</a> |
-   <a href="#other">Other</a>
-</p>
-
-<h3 id="apple">Apple products</h3>
-
-<ul>
-  <li>
-    <p>Apple <a
-      
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
-      deleted several VPNs from its app store for China</a>, thus using
-      its own censorship power to strengthen that of the Chinese
-      government.</p>
-  </li>
-
-  <li>
-    <p>Apple is <a
-      
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
-      censoring apps for the US government too</a>. Specifically, it
-      is deleting apps developed by Iranians.</p>
-    <p>The root of these wrongs are in Apple. If Apple had not designed
-      the iMonsters to let Apple censor applications, Apple would not have
-      had the power to stop users from installing whatever kind of apps.</p>
-  </li>
-
-  <li>
-    <p>Apple used its censorship system to enforce Russian surveillance <a
-      
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
-      by blocking distribution of the LinkedIn app in Russia</a>.</p>
-    <p>This is ironic because LinkedIn is a surveillance system itself.
-      While subjecting its users to its own surveillance, it tries to
-      protect its users from Russian surveillance, and is therefore
-      subject to Russian censorship.</p>
-    <p>However, the point here is the wrong of Apple's censorship of
-      apps.</p>
-  </li>
-
-  <li>
-    <p>Apple used its censorship system to enforce China's censorship <a 
-      
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>
-      by blocking distribution of the New York Times app</a>.</p>
-  </li>
-
-  <li>
-    <p>Apple censors games, <a
-    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
-    banning some games from the cr&hellip;app store</a> because of which
-    political points they suggest. Some political points are apparently
-    considered acceptable.</p>
-  </li>
-
-  <li>
-    <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
-      banned a program from the App Store</a> because its developers
-      committed the enormity of disassembling some iThings.</p>
-    </li>
-
-  <li>
-    <p>As of 2015, Apple <a
-      
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
-      systematically bans apps that endorse abortion rights or would help
-      women find abortions</a>.</p>
-    <p>This particular political slant <a
-      
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
-      affects other Apple services</a>.</p>
-  </li>
-
-  <li>
-    <p>Apple has banned iThing applications that show the confederate flag.
-      <a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
-      Not only those that use it as a symbol of racism</a>, but even
-      strategic games that use it to represent confederate army units
-      fighting in the Civil War.</p>
-    <p>This ludicrous rigidity illustrates the point that Apple should not
-      be allowed to censor apps.  Even if Apple carried out this act of
-      censorship with some care, it would still be wrong.  Whether racism
-      is bad, whether educating people about drone attacks is bad, are not
-      the real issue.  Apple should not have the power to impose its views
-      about either of these questions, or any other.</p>
-  </li>
-
-  <li>
-    <p>Apple rejected an app that displayed the locations of US drone
-      assassinations, giving various excuses. Each time the developers
-      fixed one &ldquo;problem&rdquo;, Apple complained about another.
-      After the fifth rejection, Apple <a 
-      href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
-      admitted it was censoring the app based on the subject
-      matter</a>.</p>
-  </li>
-
-  <li>
-    <p>Apple used this censorship power in 2014 to <a
-      
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
-      ban all bitcoin apps</a> for the iThings for a time.  It also <a
-      
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
-      banned a game about growing marijuana</a>, while permitting games
-      about other crimes such as killing people.  Perhaps Apple considers
-      killing more acceptable than marijuana.</p>
-  </li>
-
-  <li>
-    <p><a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
-      More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
-  </li>
-</ul>
-
-<h3 id="google">Google products</h3>
-
-<ul>
-  <li><p>Google <a
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
+
+<h3>Apple</h3>
+
+<p>Apple mainly uses iOS, which is a typical jail, to impose censorship
+through the Apple Store. Please refer to <a
+href="/proprietary/proprietary-jails.html#apple">Proprietary Jails</a>
+for more information.</p>
+
+<h3>Google</h3>
+
+<ul class="blurbs">
+  <li id="M201703160">
+    <p>Google <a
       
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
       offers censorship software</a>, ostensibly for parents to put into
       their children's computers.</p>
   </li>
 
-  <li>
-    <p><a 
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
-      Google censored installation of Samsung's ad-blocker,</a> saying
-      that blocking ads is &ldquo;interference&rdquo; with the sites that
-      advertise (and surveil users through ads).</p>
+  <li id="M201701180">
+    <p>On Windows and MacOS, Chrome <a
+    
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq";>
+    disables extensions</a> that are not hosted in the Chrome Web
+    Store.</p>
+
+    <p>For example, an extension was <a
+    
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
+    banned from the Chrome Web Store, and permanently disabled</a> on
+    more than 40,000 computers.</p>
+  </li>
+
+  <li id="M201602030">
+    <p><a
+    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
+    Google censored installation of Samsung's ad-blocker</a> on Android
+    phones, saying that blocking ads is &ldquo;interference&rdquo; with
+    the sites that advertise (and surveil users through ads).</p>
+
     <p>The ad-blocker is proprietary software, just like the program
-      (Google Play) that Google used to deny access to install it. Using a
-      nonfree program gives the owner power over you, and Google has
+    (Google Play) that Google used to deny access to install it. Using
+    a nonfree program gives the owner power over you, and Google has
       exercised that power.</p>
-    <p>Google's censorship, unlike that of Apple and Microsoft, is not
-      total: Android allows users to install apps in other ways. You can
-      install free programs from f-droid.org.</p>
-  </li>
 
-  <li>
-    <p>Chrome <a
-      href="https://support.google.com/chrome/answer/6261569?hl=en";>
-      censors downloads of software</a>.</p>
-    <p>Helping users avoid malicious software downloads is useful,
-      but forcibly stopping them is wrong.</p>
-  </li>
-
-  <li>
-    <p>Chrome, on Windows, now <a
-      
href="https://thenextweb.com/google/2014/05/27/google-starts-blocking-extensions-chrome-web-store-windows-users-disables-installed-ones/";>
-      censors extensions</a>.</p>
-    <p>Google said it would <a
-      href="/proprietary/proprietary-back-doors.html#chrome-erase-addons">
-      force-delete unauthorized extensions</a>.</p>
+    <p>Google's censorship, unlike that of Apple, is not total: Android
+    allows users to install apps in other ways. You can install free
+    programs from f-droid.org.</p>
   </li>
 </ul>
 
-<h3 id="other">Other</h3>
 
-<ul>
-  <li>
+<h3>Game consoles</h3>
+
+<ul class="blurbs">
+  <li id="M201408290">
     <p>The <a
       
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
       Nintendo 3DS</a> censors web browsing; it is possible to turn off
@@ -184,6 +93,7 @@
     </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -234,14 +144,14 @@
 <p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
-Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/04/16 09:56:52 $
+$Date: 2018/10/02 20:35:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-surveillance.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-surveillance.html       24 Sep 2018 21:48:53 -0000      1.7
+++ proprietary-surveillance.html       2 Oct 2018 20:35:58 -0000       1.8
@@ -88,6 +88,7 @@
       <li><a href="#SpywareInTVSets">TV Sets</a></li>
       <li><a href="#SpywareInCameras">Cameras</a></li>
       <li><a href="#SpywareInToys">Toys</a></li>
+      <li><a href="#SpywareInDrones">Drones</a></li>
       <li><a href="#SpywareAtHome">Other Appliances</a></li>
       <li><a href="#SpywareOnWearables">Wearables</a>
         <ul>
@@ -95,7 +96,6 @@
         </ul>
       </li>
       <li><a href="#SpywareInVehicles">Vehicles</a></li>
-      <li><a href="#SpywareInDrones">Drones</a></li>
       <li><a href="#SpywareInVR">Virtual Reality</a></li>
     </ul>
   </li>
@@ -352,13 +352,12 @@
   </li>
 
   <li id="M201410300">
-    <p><a
-    
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
-    MacOS automatically sends to Apple
-    servers unsaved documents being edited</a>. The <a
+    <p> MacOS automatically <a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
+    sends to Apple servers unsaved documents being edited</a>. The
+    things you have not decided to save are <a
     
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/";>
-    things you have not decided to save are even more sensitive than the
-    things you have stored in files</a>.</p>
+    even more sensitive</a> than the things you have stored in files.</p>
   </li>
 
   <li id="M201410220">
@@ -509,9 +508,9 @@
     <p>iThings automatically upload to Apple's servers all the photos
     and videos they make.</p>
 
-    <p> iCloud Photo Library stores every photo and video you take,
-    and keeps them up to date on all your devices. Any edits you make
-    are automatically updated everywhere. [&hellip;]</p>
+    <blockquote><p> iCloud Photo Library stores every photo and video you
+    take, and keeps them up to date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] </p></blockquote>
 
     <p>(From <a href="https://www.apple.com/icloud/photos/";>Apple's iCloud
     information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -994,9 +993,9 @@
 
   <li id="M201604250">
     <p>A pregnancy test controller application not only can <a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>spy
-    on many sorts of data in the phone, and in server accounts, it can
-    alter them too</a>.</p>
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too</a>.</p>
   </li>
 
   <li id="M201601130">
@@ -1239,8 +1238,8 @@
 
     <p>Don't be a sucker&mdash;reject all the stings.</p>
 
-    <p>It is unfortunate that the article uses the term &ldquo;<a
-    href="/philosophy/words-to-avoid.html#Monetize">monetize</a>&rdquo;.</p>
+    <p>It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
   </li>
 </ul>
 
@@ -1258,8 +1257,8 @@
 <ul class="blurbs">
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>load
-    downgrades that install a surveillance app</a>.</p>
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
 
     <p>We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
@@ -1284,8 +1283,8 @@
     on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other <a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>cross-device
-    tracking</a>.</p>
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+    cross-device tracking</a>.</p>
   </li>
 
   <li id="M201511060">
@@ -1306,9 +1305,9 @@
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now <a
-    
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>correlate
-    TV advertisement with online purchases</a>, exposing all users to
-    new combined surveillance by default.</p>
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+    correlate TV advertisement with online purchases</a>, exposing all
+    users to new combined surveillance by default.</p>
   </li>
 
   <li id="M201507240">
@@ -1318,10 +1317,10 @@
   </li>
 
   <li id="M201505290">
-    <p><a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>Verizon
-    cable TV snoops on what programs people watch, and even what they
-    wanted to record</a>.</p>
+    <p>Verizon cable TV <a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+    snoops on what programs people watch, and even what they wanted to
+    record</a>.</p>
   </li>
 
   <li id="M201504300">
@@ -1333,8 +1332,8 @@
 
   <li id="M201502090">
     <p>The Samsung &ldquo;Smart&rdquo; TV <a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>transmits
-    users' voice on the internet to another company, Nuance</a>.
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
+    transmits users' voice on the internet to another company, Nuance</a>.
     Nuance can save it and would then have to give it to the US or some
     other government.</p>
 
@@ -1348,8 +1347,8 @@
   </li>
 
   <li id="M201411090">
-    <p>The Amazon &ldquo;Smart&rdquo; TV <a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>is
+    <p>The Amazon &ldquo;Smart&rdquo; TV is <a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
     snooping all the time</a>.</p>
   </li>
 
@@ -1372,12 +1371,11 @@
   </li>
 
   <li id="M201405200">
-    <p>Spyware in <a
+    <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
-    LG &ldquo;smart&rdquo; TVs</a> reports what the user watches, and the
-    switch to turn this off has no effect.  (The fact that the transmission
-    reports a 404 error really means nothing; the server could save that
-    data anyway.)</p>
+    reports what the user watches, and the switch to turn this off has
+    no effect</a>.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)</p> 
 
     <p>Even worse, it <a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
@@ -1434,8 +1432,8 @@
   </li>
 
   <li id="M201603220">
-    <p>Over 70 brands of network-connected surveillance cameras <a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>have
+    <p>Over 70 brands of network-connected surveillance cameras have <a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
     security bugs that allow anyone to watch through them</a>.</p>
   </li>
 
@@ -1540,6 +1538,21 @@
 
 
 <div class="big-subsection">
+  <h4 id="SpywareInDrones">Drones</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201708040">
+    <p>While you're using a DJI drone
+    to snoop on other people, DJI is in many cases <a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>snooping
+    on you</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
   <h4 id="SpywareAtHome">Other Appliances</h4><span 
class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span>
 </div>
 
@@ -1692,21 +1705,6 @@
 
 
 <div class="big-subsection">
-  <h4 id="SpywareInDrones">Drones</h4>
-  <span class="anchor-reference-id">(<a 
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
-</div>
-
-<ul class="blurbs">
-  <li id="M201708040">
-    <p>While you're using a DJI drone
-    to snoop on other people, DJI is in many cases <a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>snooping
-    on you</a>.</p>
-  </li>
-</ul>
-
-
-<div class="big-subsection">
   <h4 id="SpywareInVR">Virtual Reality</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInVR">#SpywareInVR</a>)</span>
 </div>
@@ -1912,9 +1910,9 @@
   </li>
 
   <li id="M201212290">
-    <p>The Cisco <a
-    
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>TNP
-    IP phones contain a spyware</a>.</p>
+    <p>The Cisco TNP IP phones are <a
+    href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+    spying devices</a>.</p>
   </li>
 </ul>
 
@@ -1977,7 +1975,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/24 21:48:53 $
+$Date: 2018/10/02 20:35:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: rec/propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- rec/propr-blurbs.rec        1 Oct 2018 21:25:09 -0000       1.18
+++ rec/propr-blurbs.rec        2 Oct 2018 20:35:59 -0000       1.19
@@ -1067,7 +1067,7 @@
 Section: apple DRM
 Keyword: sabotage
 Blurb: <p>DRM makes the iPhone 7 nearly <a
-+   href="iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
++   href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
 
 Id: -201704070
 PubDate: 2017-04-07
@@ -1683,20 +1683,15 @@
 +   
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
 +   blatantly disregards user choice and privacy</a>.</p>
 
-Id: -201608170
+Id: -201606270
 PubDate: 2015-09-11
 PubDate: 2016-06-03
 PubDate: 2016-06-27
-PubDate: 2015-12-07
-PubDate: 2016-03-17
-PubDate: 2016-01-14
-PubDate: 2016-08-17
 Section: sabotage microsoft
 Keyword: windows
-Blurb: <p id="windows10-forcing">In 2015, Microsoft committed acts of sabotage 
to trick
-+   users of Windows 7 and 8 into installing all-spying Windows 10
-+   against their will. Among other things, Microsoft forced their
-+   computers to <a
+Blurb: <p id="windows10-forcing">In its efforts to trick users of Windows
++   7 and 8 into installing all-spying Windows 10 against their
++   will, Microsoft forced their computers to <a
 +   
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
 +   silently download&hellip; the whole of Windows 10</a>! Apparently,
 +   this was done through a <a
@@ -1707,19 +1702,22 @@
 +   installation proceed found out that this “upgrade” was in fact a <a
 +   
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
 +   downgrade</a>.</p>
-+ 
-+   <p>Then Microsoft attacked the
-+   computers that were still running Windows 7 or 8 by <a
+
+Id: -201608170
+PubDate: 2015-12-07
+PubDate: 2016-03-17
+PubDate: 2016-08-17
+Section: interference microsoft
+Keyword: windows
+Blurb: <p> After <a href="#windows10-forcing">forcing the download of Windows 
10</a>
++   on computers that were running Windows 7 and 8, Microsoft <a
 +   
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
-+   repeatedly switching on a flag that urged users to
++   repeatedly switched on a flag that urged users to
 +   &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
 +   it off, in the hope that some day they would fail to say no.
 +   This was done through <a
 +   
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
-+   deviant use of Windows Update</a>. (Later on, Microsoft published
-+   instructions on <a
-+   
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
-+   how to permanently reject the downgrade to Windows 10</a>.)</p>
++   malware techniques</a>.</p>
 + 
 +   <p>A detailed <a
 +   
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>

Index: rec/proprietary-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/proprietary-stub.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- rec/proprietary-stub.html   19 Sep 2018 20:56:40 -0000      1.4
+++ rec/proprietary-stub.html   2 Oct 2018 20:35:59 -0000       1.5
@@ -1,4 +1,4 @@
-<!--#include virtual="/server/header.html" -->
+<!--#include virtual="/server/html5-header.html" -->
 <!-- Parent-Version: 1.84 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -12,19 +12,28 @@
 div.companies { float: right; margin-bottom: .5em; }
 div.malfunctions { max-width: 27em; }
 <!--
-.button { float: left; margin: 0 .5em; }
+.button { float: left; margin: .5em; }
 .button a { display: inline-block; }
+
+div.toc ol { margin-bottom: 0; }
+div.toc ul li { list-style: none; margin-right: 1em; }
+div.toc ol li { margin: .5em 1em 0; }
 div.toc h3 {
-   text-align: left;
    font-size: 1.2em;
-   padding: 0 .83em;
-   margin: .5em 1.5% 1em;
-}
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc p { margin: 0 3%; }
-div.toc { margin-top: 1em; }
 
---></style>
+   padding: .8em .83em 0;
+   margin: 0 1.5% 1em;
+}
+.toc h3 span { font-weight: normal; }
+.list { padding-bottom: .5em; }
+.toc .left, .toc .left .list { float: left; }
+.toc .right, .toc .right .list { float: right; }
+div.toc .right h3,
+ div.toc .right ul {text-align: right; }
+-->
+.toc .left {  width: 55%; }
+.toc .right { width: 45%; }
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software Is Often Malware</h2>
 
@@ -55,56 +64,88 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.</p>
 
-<p>As of September, 2018, the files in this directory list over 350
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.</p>
+<p>As of September, 2018, the pages in this directory list nearly 350
+instances of malicious functionalities (with close to 400 references to
+back them up), but there are surely thousands more we don't know about.</p>
 
 <div class="toc" id="TOC">
-<div class="companies">
-<h3>Company or type of product</h3>
+<div class="left">
+<div class="list">
+<h3>Injustices</h3>
 <ul>
- <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
- <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
- <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
- <li><a href="/proprietary/malware-google.html">Google Malware</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
- <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
- <li><a href="/proprietary/malware-cars.html">Malware in cars</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
- <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
- <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<h3>Type&nbsp;of&nbsp;malware</h3>
-<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
  <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
  <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
  <li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
- <li><a href="/proprietary/proprietary-drm.html">Digital restrictions
-    management</a>&nbsp;(1)</li>
  <li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
  <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
  <li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(2)</li>
  <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
  <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(3)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(4)</li>
- <li><a href="/proprietary/potential-malware.html">Potential Malware</a></li>
 </ul>
 </div>
-
-<p>(1) Digital restrictions management, or &ldquo;DRM&rdquo;: functionalities
-designed to restrict what users can do with the data in their computers.<br />
-   (2) Jails: systems that impose censorship on application programs.<br />
-   (3) Tethers: functionalities that require permanent (or very frequent)
-connection to a server.<br />
-   (4) Tyrants: systems that reject any operating system not
-&ldquo;authorized&rdquo; by the manufacturer.</p>
+<div class="list">
+<h3>Techniques&nbsp;<span>(1)</span></h3>
+<ul>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(2)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(3)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(4)</li>
+ <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(5)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(6)</li>
+ <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+</ul>
+</div>
+</div>
+<div class="right">
+<div class="list">
+<h3>Companies</h3>
+<ul>
+ <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a href="/proprietary/malware-google.html">Google</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+</ul>
+</div> 
+<div class="list">
+<h3>Products</h3>
+<ul>
+ <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a href="/proprietary/malware-games.html">Games</a></li>
+ <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
+</ul>
+</div>
+</div>
+<div style="clear:both"></div>
+<hr />
+<ol>
+<li>These are only a few of the techniques that are used to turn proprietary
+software into malware. Each technique is tightly associatd with one or more
+injustices. Back doors mean insecurity (and surveillance, most often),
+tethers imply surveillance and insecurity, jails and tyrants are instruments
+of censorship, DRM does censorship and/or sabotage, and subscriptions imply
+interference. We don't list each example of malware in all the categories it
+belongs&nbsp;to.</li>
+
+<li><em>Back door:</em>&nbsp; any mechanism that provides a way of modifying
+files in a computer without the user being aware of it and willing to do the
+modification, whether this mechanism is documented or not. 
+
+<li><em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp;
+functionalities designed to restrict what users can do with the data in their
+computers.</li>
+
+<li><em>Jails:</em>&nbsp; systems that impose censorship on application
+programs.</li>
+
+<li><em>Tethers:</em>&nbsp; functionalities that require permanent (or very
+frequent) connection to a server.</li>
+
+<li><em>Tyrants:</em>&nbsp; systems that reject any operating system not
+&ldquo;authorized&rdquo; by the manufacturer.</li>
+</ol>
 </div>
 
 <p>Users of proprietary software are defenseless against these forms
@@ -175,7 +216,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/02 20:35:59 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]