www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-interference.html p...


From: Therese Godefroy
Subject: www/proprietary proprietary-interference.html p...
Date: Fri, 5 Oct 2018 07:26:55 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/05 07:26:55

Modified files:
        proprietary    : proprietary-interference.html 
                         proprietary-sabotage.html 
                         proprietary-back-doors.html 
                         malware-microsoft.html 

Log message:
        Rewrite the Windows-10-forcing story; add missing items,
        and items in RT #1324120, 1322798 & 1320871); regenerate from recfile.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.76&r2=1.77

Patches:
Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-interference.html       27 Jul 2018 02:38:54 -0000      1.33
+++ proprietary-interference.html       5 Oct 2018 11:26:54 -0000       1.34
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Interference - GNU Project - Free Software 
Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-interference.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -24,106 +29,118 @@
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 
-<ul>
-<li><p>Pearson's proprietary educational software <a
-href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
-did an experiment on real students</a>, treating students differently to
-observe the results.</p></li>
+<ul class="blurbs">
+<!-- INSERT interference -->
+  <li id="M201809120">
+    <p>One version of Windows 10 <a
+    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+    harangues users if they try to install Firefox (or Chrome)</a>.</p>
+  </li>
+
+  <li id="M201804180">
+    <p>Pearson's proprietary educational software <a
+    
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
+    did an experiment on real students</a>, treating students differently
+    to observe the results.</p>
+  </li>
 
-  <li><p>Microsoft is planning to make Windows <a
+  <li id="M201803190">
+    <p>Microsoft is planning to make Windows <a
       
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
       impose use of its browser, Edge, in certain circumstances</a>.</p>
-    <p>The reason Microsoft can force things on users is that Windows is
-      nonfree.</p></li>
-
-  <li><p>Windows displays
-      <a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
-       intrusive ads for Microsoft products and its
-       partners' products</a>.</p>
-    <p>The article's author starts from the premise that Microsoft
-      has a right to control what Windows does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.</p></li>
-  
-  <li><p>Microsoft inserts <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts";>
-      annoying advertisements inside of the File Explorer</a> to nag
-      users to buy subscriptions for the OneDrive service.</p></li>
-
-<li><p>An upgrade package for Acrobat
-Reader <a 
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
-alters Chrome</a>.</p>
-</li>
-
-<li>In order to increase Windows 10's install base, Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
-blatantly disregards user choice and privacy</a>.
-</li>
-
-<li>
-<p>Microsoft has
-started <a
-href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
-nagging users obnoxiously and repeatedly to install Windows 10</a>.</p>
-</li>
-
-<li><p>Microsoft
-    <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>is
-      tricking users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
-into replacing Windows 7 with Windows 10</a>.</p></li>
-
-<li><p>Microsoft has made companies' Windows machines managed by the
-company's
-sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
-users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
-10</a>.</p></li>
-
-<li><p>Apple forced millions of iThings to <a 
href="https://discussions.apple.com/thread/7256669?tstart=0";>download a system 
upgrade
-without asking the users.</a> Apple did not forcibly install the upgrade
-but the downloading alone caused lots of trouble.</p></li>
-
-<li><p>Adobe nonfree software may halt all other work and freeze a computer <a
-href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
-to perform a license check</a>, at a random time every 30 days.</p></li>
-
-<li><p>Microsoft
-has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
-all future Intel CPUs for Windows 7 and 8</a>. Those machines will be
-stuck with the nastier Windows 10.
-<a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
-AMD and Qualcomm CPUs, too</a>.
-</p>
-<p>Of course, Windows 7 and 8 are unethical too, because they are
-proprietary software.  But this example of Microsoft's wielding its
-power demonstrates the power it holds.
-</p>
-<p>Free software developers also stop maintaining old versions of their
-programs, but this is not unfair to users because the users of free
-software have control over it.  If it is important enough to you, you
-and other users can hire someone to support the old version on your
-  future platforms.
-</p></li>
-
-<li><p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will
-<a 
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
-change the user's initial web page, and default search engine, to Yahoo</a>
-unless the user intervenes to stop it.</p></li>
-
-<li><p>
-Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-repeatedly nagging many users to install Windows 10</a>.
-</p></li>
-
-<li><p>
-Microsoft was for months <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
-tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they
-fail to notice and say no.
-</p></li>
 
+    <p>The reason Microsoft can force things on users is that Windows
+    is nonfree.</p>
+  </li>
+
+  <li id="M201712060">
+    <p>Learn how <a
+    
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
+    gratis-to-play-and-not-win-much games manipulate their useds
+    psychologically</a>.</p>
+
+    <p>These manipulative behaviors are malicious functionalities, and they
+    are possible because the game is proprietary. If it were free, people
+    could publish a non-manipulative version and play that instead.</p>
+  </li>
+
+  <li id="M201703170">
+    <p>Windows displays <a
+    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    intrusive ads for Microsoft products and its partners'
+    products</a>.</p>
+
+    <p>The article's author starts from the premise that Microsoft has
+    a right to control what Windows does to users, as long as it doesn't
+    go &ldquo;too far&rdquo;. We disagree.</p>
+  </li>
+
+  <li id="M201701110">
+    <p>An upgrade package for Acrobat Reader <a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
+    alters Chrome</a>.</p>
+  </li>
+
+  <li id="M201608170">
+    <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
+    on computers that were running Windows 7 and 8, Microsoft <a
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    repeatedly switched on a flag that urged users to
+    &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
+    it off, in the hope that some day they would fail to say no.
+    To do this, Microsoft used <a
+    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    malware techniques</a>.</p>
+
+    <p>A detailed <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    analysis of Microsoft's scheme</a> is available on the Electronic
+    Frontier Foundation's website.</p>
+  </li>
+
+  <li id="M201603090">
+    <p>Microsoft has made companies'
+    Windows machines managed by the company's sysadmins <a
+    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
+    to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    <p>Microsoft has <a
+    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    all future Intel CPUs for Windows 7 and 8</a>. Those
+    machines will be stuck with the nastier Windows 10.  <a
+    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    AMD and Qualcomm CPUs, too</a>.</p>
+
+    <p>Of course, Windows 7 and 8 are unethical too, because they are
+    proprietary software.  But this example of Microsoft's wielding its
+    power demonstrates the power it holds.</p>
+
+    <p>Free software developers also stop maintaining old versions of
+    their programs, but this is not unfair to users because the users of
+    free software have control over it.  If it is important enough to you,
+    you and other users can hire someone to support the old version on
+    your future platforms.</p>
+  </li>
+
+  <li id="M201510220">
+    <p>Adobe nonfree software may halt
+    all other work and freeze a computer <a
+    href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
+    to perform a license check</a>, at a random time every 30 days.</p>
+  </li>
+
+  <li id="M201506260">
+    <p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will <a
+    
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
+    change the user's initial web page, and default search engine, to
+    Yahoo</a> unless the user intervenes to stop it.</p>
+  </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -181,7 +198,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/27 02:38:54 $
+$Date: 2018/10/05 11:26:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-sabotage.html   19 Sep 2018 13:08:16 -0000      1.58
+++ proprietary-sabotage.html   5 Oct 2018 11:26:54 -0000       1.59
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.85 -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -23,330 +28,428 @@
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
 
-<ul>
-  <li>
-    <p>Apple has <a 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
+<ul class="blurbs">
+<!-- INSERT sabotage -->
+  <li id="M201807050">
+    <p>The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the company shut down and made the app stop working. <a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which";>All
+    the existing trackers stopped working forever</a>.</p>
+
+    <p>The article focuses on a further nasty fillip, that sales of the
+    broken devices continued. But I think that is a secondary issue;
+    it made the nasty consequences extend to some additional people.
+    The fundamental wrong was to design the devices to depend on something
+    else that didn't respect users' freedom.</p>
+  </li>
+
+  <li id="M201805310">
+    <p>Apple has <a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
     Telegram from upgrading its app for a month</a>.</p>
 
-    <p>This evidently has to do with Russia's command to Apple to
-    block Telegram in Russia.</p>
+    <p>This evidently has to do with Russia's command to Apple to block
+    Telegram in Russia.</p>
 
-    <p>The Telegram client is free software on other platforms, but
-      not on iThings. Since <a 
href="/proprietary/proprietary-jails.html#apple">they
-      are jails</a>, they don't permit any app to be free
-      software.</p>
+    <p>The Telegram client is free software on other platforms, but not on
+    iThings. Since <a href="/proprietary/proprietary-jails.html#apple">they
+    are jails</a>, they don't permit any app to be free software.</p>
   </li>
 
-  <li>
-    <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html";>
-    changes the file system from HFS+ to APFS</a>, which cannot be accessed
-    from GNU/Linux, Windows or even older versions of MacOS.</p>
-  </li>
-
-  <li>
-    <p>Logitech will sabotage all Harmony Link household control devices by
-<a 
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
+  <li id="M201711080">
+    <p>Logitech will sabotage
+    all Harmony Link household control devices by <a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
       turning off the server through which the products' supposed owners
       communicate with them</a>.</p>
+
     <p>The owners suspect this is to pressure them to buy a newer model. If
       they are wise, they will learn, rather, to distrust any product that
       requires users to talk with them through some specialized service.</p>
   </li>
 
-  <li>
-    <p>Tesla used software to limit customers to using just <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>part
 of the battery of some
-    cars</a>.</p>
+  <li id="M201710044">
+    <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html";>
+    changes the file system from HFS+  to APFS</a>, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+  </li>
+
+  <li id="M201710041">
+    <p>The Canary home surveillance
+    camera has been sabotaged by its manufacturer, <a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+    turning off many features unless the user starts paying for a
+    subscription</a>.</p>
+
+    <p>With manufacturers like these, who needs security breakers?</p>
+
+    <p>The purchasers should learn the larger lesson and reject connected
+    appliances with embedded proprietary software. Every such product is
+    a temptation to commit sabotage.</p>
   </li>
 
-  <li>
-    <p>Sonos
-    <a 
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
-    told all its customers, &ldquo;Agree&rdquo; to snooping or the product 
will stop working</a>.
-    <a 
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321";>Another
 article</a> says they won't forcibly change the software, but people won't be
-    able to get any upgrades and eventually it will stop working.
-    </p>
+  <li id="M201709090">
+    <p>Tesla used software to limit customers to using just <a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>part
+    of the battery of some cars</a>.</p>
   </li>
-  <li>
-    <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo;
-      operations: switching the lights, operate motion sensors, regulating
-      temperature, etc. On May 15th, 2016, Google said it would shut down the
-      service linked to the device, making it unusable.</p>
-    <p>Although you may own the device, its functioning depended on the server
-      that never belonged to you. So you never really had control of it. This
-      unjust design is called
-      <a href="/philosophy/network-services-arent-free-or-nonfree.html">
-      Service as a Software Substitute (SaaSS)</a>. That is what gave the
-      company the power to convert it into a $300 out-of-warranty brick, for
-      your &ldquo;dumb home&rdquo;.</p>
+
+  <li id="M201708230">
+    <p>Sonos <a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working</a>.  <a
+    
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321";>Another
+    article</a> says they won't forcibly change the software, but
+    people won't be able to get any upgrades and eventually it will
+    stop working.</p>
   </li>
-  <li>
-    <p>Apple will stop <a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>fixing
 bugs for older
-    model iThings</a>.</p>
+
+  <li id="M201706060">
+    <p>Apple will stop <a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>fixing
+    bugs for older model iThings</a>.</p>
 
     <p>Meanwhile, Apple stops people from fixing problems themselves;
     that's the nature of proprietary software.</p>
   </li>
 
-  <li><p> Microsoft
-      <a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
+  <li id="M201705180">
+    <p>Bird and rabbit pets were implemented for Second
+    Life by a company that tethered their food to a server.  <a
+    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    It shut down the server and the pets more or less died</a>.</p>
+  </li>
+
+  <li id="M201704194">
+    <p>Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, <a
+    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    forcing their owners to switch to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704130">
+    <p>Microsoft <a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
        has dropped support for Windows 7 and 8 on recent processors</a>
       in a big hurry.</p>
+
     <p>It makes no difference what legitimate reasons Microsoft might
-      have for not doing work to support them. If it doesn't want to
-      do this work, it should let users do the work.</p>
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.</p>
   </li>
 
-  <li>
-  <p>Anova sabotaged users' cooking devices with a downgrade that
-  tethered them to a remote server. <a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>Unless
 users create an account on Anova's servers, their
-  cookers won't function.</a></p>
+  <li id="M201704120">
+    <p>Anova sabotaged users' cooking devices
+    with a downgrade that tethered them to a remote server. <a
+    
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>Unless
+    users create an account on Anova's servers, their cookers won't
+    function</a>.</p>
   </li>
 
-  <li>
-  <p>The iPhone 7 contains DRM specifically designed to <a
+  <li id="M201704070">
+    <p id="iphone7-sabotage">The
+    iPhone 7 contains DRM specifically designed to <a
   
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
-  <p>The article uses the term &ldquo;lock&rdquo; to describe the DRM,
-  but we prefer to use the term <a
-  href="/philosophy/words-to-avoid.html#DigitalLocks">
-  digital handcuffs</a>.</p>
+    <p>The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term <a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+    handcuffs</a>.</p>
   </li>
 
-  <li>
-    <p>Microsoft has made Windows 7 and 8 cease to
-      function on certain new computers,
-      <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
-      forcing their owners to switch to Windows 10</a>.</p>
-  </li>
-
-  <li>
-    <p> The developer of Ham Radio
-        Deluxe <a 
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
+  <li id="M201612200">
+    <p>The developer of Ham Radio Deluxe <a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
         a customer's installation as punishment for posting a negative
-        review</a>.
-    </p>
+    review</a>.</p>
+
     <p>Most proprietary software companies don't use their power so
       harshly, but it is an injustice that they all <em>have</em> such
       power.</p>
   </li>
 
-  <li>
-    <p>HP's firmware downgrade <a 
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
-        DRM on some printers, which now refuse to function with
-        third-party ink cartridges</a>.</p>
+  <li id="M201609200">
+    <p>HP's firmware downgrade <a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
+    DRM on some printers, which now refuse to function with third-party
+    ink cartridges</a>.</p>
+  </li>
+
+  <li id="M201606270">
+    <p id="windows10-forcing">In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to <a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+    silently download&hellip; the whole of Windows 10</a>! Apparently,
+    this was done through a <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">
+    universal back door</a>. Not only did the unwanted downloads <a
+    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    use up much needed resources</a>, but many of the people who let
+    installation proceed found out that this “upgrade” was in fact a <a
+    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    downgrade</a>.</p>
   </li>
 
-  <li>
+  <li id="M201606080">
+    <p>Apple <a
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+    stops users from fixing the security bugs in Quicktime for Windows</a>,
+    while refusing to fix them itself.</p>
+  </li>
+
+  <li id="M201606010">
+    <p>Once Microsoft has tricked a user
+    into accepting installation of Windows 10, <a
+    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+    find that they are denied the option to cancel or even postpone the
+    imposed date of installation</a>.</p>
+
+    <p>This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.</p>
+  </li>
 
-    <p>Once Microsoft has tricked a user into accepting installation
-      of Windows
-      10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
-      find that they are denied the option to cancel or even postpone
-      the imposed date of installation</a>.</p>
+  <li id="M201605150">
+    <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo;
+    operations: switching the lights, operate motion sensors, regulating
+    temperature, etc. On May 15th, 2016, Google said it would shut down
+    the service linked to the device, making it unusable.</p>
 
-      <p>This demonstrates what we've said for years: using
-      proprietary software means letting someone have power over you,
-      and you're going to get screwed sooner or later.</p>
+    <p>Although you may own the device, its functioning depended
+    on the server that never belonged to you. So you never
+    really had control of it. This unjust design is called <a
+    href="/philosophy/network-services-arent-free-or-nonfree.html">
+    Service as a Software Substitute (SaaSS)</a>. That is what gave the
+    company the power to convert it into a $300 out-of-warranty brick,
+    for your &ldquo;dumb home&rdquo;.</p>
   </li>
 
-  <li>
-    <p>The Apple Music client
-      program <a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
-      the user's file system for music files, copies them to an Apple
-      server, and deletes them</a>.</p>
+  <li id="M201605040">
+    <p>The Apple Music client program <a
+    
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them</a>.</p>
   </li>
 
-  <li>
-    <p>Apple <a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
-stops users from fixing the security bugs in Quicktime for
-      Windows</a>, while refusing to fix them itself.</p>
+  <li id="M201604050">
+    <p>Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
+    intentionally broke Revolv home automatic control products that
+    depended on a server</a> to function, by shutting down the server.
+    The lesson is, reject all such products.  Insist on self-contained
+    computers that run free software!</p>
   </li>
 
-  <li>
-    <p>iOS version 9 for
-    iThings <a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair";>sabotages
+  <li id="M201602050">
+    <p>iOS version 9 for iThings <a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair";>sabotages
     them irreparably if they were repaired by someone other than
     Apple</a>. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that
-    this was wrong.</p>
+    criticism from the users. However, it has not acknowledged that this
+    was wrong.</p>
   </li>
 
-  <li>
-  <p>Phillips &ldquo;smart&rdquo; lightbulbs had initially been 
+  <li id="M201601310">
+    <p>FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to <a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    alternative compatible chips</a>
+    so that they no longer work. Microsoft is <a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
+  </li>
+
+  <li id="M201512140">
+    <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
   designed to interact with other companies' smart light bulbs, but <a 
   
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
-  later the company updated the firmware to disallow interoperability</a>.</p>
+    later the company updated the firmware to disallow
+    interoperability</a>.</p>
 
-  <p>If a product is &ldquo;smart&rdquo;, and you didn't build it, it is 
-  cleverly serving its manufacturer <em>against you</em>.</p>
+    <p>If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer <em>against you</em>.</p>
   </li>
 
-  <li>
-    <p>Microsoft
-    is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
-    forcibly
-    pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>Windows
-    update to its version 10</a>, ignoring the flag on Windows 7 or 8
-    that you could set to not upgrade.  This reaffirms the presence of
-    a <a href="/proprietary/proprietary-back-doors.html">universal
-    back door in Windows</a> 7 and 8.</p>
+  <li id="M201511244">
+    <p>Google has long had <a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    back door to remotely unlock an Android device</a>, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).</p>
   </li>
 
-  <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
+  <li id="M201511240">
+    <p>Windows 10 &ldquo;upgrades&rdquo; <a
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
       delete applications</a> without asking permission.</p>
   </li>
-  <li><p>Google has long had <a
-      
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
-      back door to remotely unlock an Android device</a>, unless its
-      disk is encrypted (possible since Android 5.0 Lollipop, but
-      still not quite the default).</p></li>
-<li><p>
-Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
-Microsoft is forcing them to replace Windows 7 and 8 with
-all-spying Windows 10</a>.</p>
-
-<p>
-This seems to involve use of a back door in Windows 7 and 8.
-</p></li>
-
-<li><p>
-<a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-
-<li><p>Vizio
-<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
-used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users 
watch</a>.
-The TVs did not do that when first sold.
-</p></li>
-
-<li><p>Amazon
-<a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
-downgraded the software in users' Swindles</a>
-so that those already rooted would cease to function at all.</p></li>
-
-<li><p>Apple <a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>deleted
-from iPods the music that users had got from internet music stores
-that competed with iTunes</a>.
-</p></li>
-
-<li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
-informs the NSA of bugs in Windows before fixing them.</a>
-</p></li>
-
-<li><p>
-<a 
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>Nintendo
-remotely sabotaged all Wiis, making them refuse to work unless the
-user agrees to a new EULA.</a>
-</p>
-<p>We can be quite sure this EULA is is unjust because injustice is
-the only motive for imposing an EULA.
-</p></li>
-
-<li><p>
-FTDI's proprietary driver for its USB-to-serial chips has been
-designed to
-<a 
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
-alternative compatible chips</a> so that they no longer work. Microsoft is <a 
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
 this automatically</a> as an
-&ldquo;upgrade&rdquo;.
-</p></li>
-
-<li><p>
-<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
-cut off security fixes for Windows XP, except to some big
-    users that pay exorbitantly.</a></p>
-
-<p>Microsoft is going to
-  <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
-    cut off support for some Internet Explorer versions</a> in the same 
way.</p>
-
-<p>A person or company has the right to cease to work on a
-particular program; the wrong here is Microsoft does this after having
-made the users dependent on Microsoft, because they are not free to ask
-anyone else to work on the program for them.
-</p></li>
-
-<li><p>
-<a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
-NSA has put back doors into nonfree encryption software.</a>
-We don't know which ones they are, but we can be sure they include
-some widely used systems.  This reinforces the point that you can never
-trust the security of nonfree software.
-</p></li>
-
-<li><p>
-<a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>An
-Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-not approved by <a href="/proprietary/proprietary-jails.html">Apple
-censorship</a>.  All this was apparently intentional.
-</p></li>
-
-<li><p>
-Some
-proprietary <a 
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>games
-lure children to spend their parents' money</a>.
-</p></li>
-
-<li><p>
-Adobe applications have time bombs:
-they <a 
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>stop
-working after a certain time</a>, after which the user must pay to
-extend the time.</p>
-
-<p>Once there was a problem with the servers that these programs use
-to check who has paid, and
-<a 
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>the
 applications refused to work for anyone</a>.
-</p></li>
-
-<li><p>
-Sony <a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
-the Playstation 3</a> with a firmware downgrade that removed the
-feature that allowed users to run GNU/Linux on it.</p>
-
-<p>Sony subsequently sent police after Geohot, after he cracked the
-code that blocked users from changing the firmware, and we responded by
-calling for a <a href="http://boycottsony.org";>boycott of
-Sony </a>.
-</p>
 
-<p>In a court settlement Sony is <a 
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
-now paying for the sabotage</a>.</p></li>
+  <li id="M201510020">
+    <p>Apple forced millions of iThings to <a
+    href="https://discussions.apple.com/thread/7256669?tstart=0";>download
+    a system upgrade without asking the users</a>. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.</p>
+  </li>
+
+  <li id="M201509220">
+    <p><a
+    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+    Lenovo stealthily installed crapware and spyware via
+    BIOS</a> on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since <a
+    href="/proprietary/malware-microsoft.html">Microsoft puts in its
+    own malware</a>.</p>
+  </li>
+
+  <li id="M201504300">
+    <p>Vizio <a
+    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch</a>.  The TVs did not do that when first sold.</p>
+  </li>
+
+  <li id="M201504090">
+    <p>Mac OS X had an <a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
+  </li>
+
+  <li id="M201503260">
+    <p><a
+    
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
+    cut off security fixes for Windows XP, except to some big users that
+    pay exorbitantly</a>.</p>
+
+    <p>Microsoft is going to <a
+    
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+    cut off support for some Internet Explorer versions</a> in the same
+    way.</p>
+
+    <p>A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for them.</p>
+  </li>
+
+  <li id="M201503210">
+    <p>Amazon <a
+    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    downgraded the software in users' Swindles</a> so that those already
+    rooted would cease to function at all.</p>
+  </li>
+
+  <li id="M201412040">
+    <p>Apple <a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+    deleted from iPods the music that users had got from internet music
+    stores that competed with iTunes</a>.</p>
+  </li>
+
+  <li id="M201410130">
+    <p><a
+    
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>Nintendo
+    remotely sabotaged all Wiis, making them refuse to work unless the
+    user agrees to a new EULA</a>.</p>
 
-<li><p>
-LG <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>disabled
-network features</a> on <em>previously purchased</em>
-&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.
-</p></li>
-
-<li><p>Oracle's nonfree Java plug-in for browsers <a
-href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
 installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary software.  
For
-instance, it regards the inclusion of proprietary Flash Player (which  has a <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
 feature</a> and DRM) in Chrome as a good thing.  Chrome
-is a proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we present it
-as a factual reference.</p>
-
-<p>In 2014, <a
-href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>Oracle
 insisted on continuing
-this practice.</a></p>
-</li>
+    <p>We can be quite sure this EULA is unjust because injustice is the
+    only motive for imposing an EULA.</p>
+  </li>
+
+  <li id="M201405201">
+    <p>LG <a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    disabled network features</a> on <em>previously purchased</em>
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.</p>
+  </li>
+
+  <li id="M201401190">
+    <p>Some proprietary <a
+    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    games lure children to spend their parents' money</a>.</p>
+  </li>
+
+  <li id="M201309054">
+    <p><a
+    
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
+    NSA has put back doors into nonfree encryption software</a>. We don't
+    know which ones they are, but we can be sure they include some widely
+    used systems.  This reinforces the point that you can never trust
+    the security of nonfree software.</p>
+  </li>
+
+  <li id="M201306220">
+    <p><a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+    informs the NSA of bugs in Windows before fixing them</a>.</p>
+  </li>
+
+  <li id="M201305060">
+    <p>Adobe applications have time bombs: they <a
+    
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+    stop working after a certain time</a>, after which the user
+    must pay to extend the time.</p>
+
+    <p>Once there was a problem with the servers
+    that these programs use to check who has paid, and <a
+    
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
+    the applications refused to work for anyone</a>.</p>
+  </li>
+
+  <li id="M201301280">
+    <p>Oracle's nonfree Java plug-in for browsers <a
+    
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
+    installs other annoying proprietary software</a>.</p>
+
+    <p>That article disregards all other bad things
+    about proprietary software.  For instance, it regards
+    the inclusion of proprietary Flash Player (which has a <a
+    
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
+    feature</a> and DRM) in Chrome as a good thing.  Chrome is a
+    proprietary browser with a universal back door.</p>
+
+    <p>We don't agree with the article's views on those issues, but we
+    present it as a factual reference.</p>
+
+    <p>In 2014, <a
+    
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>
+    Oracle insisted on continuing this practice</a>.</p>
+  </li>
+
+  <li id="M201003300">
+    <p>Sony <a
+    
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
+    the Playstation 3</a> with a firmware downgrade that removed the
+    feature that allowed users to run GNU/Linux on it.</p>
+
+    <p>Sony subsequently sent police after Geohot, after he cracked the
+    code that blocked users from changing the firmware, and we responded by
+    calling for a <a href="http://boycottsony.org";>boycott of Sony</a>.</p>
+
+    <p>In a court settlement Sony is <a
+    
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+    now paying for the sabotage</a>.</p>
+  </li>
+
+  <li id="M200709270">
+    <p><a
+    
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked</a>.  The &ldquo;upgrade&rdquo; also deactivated applications
+    not approved by <a href="/proprietary/proprietary-jails.html">Apple
+    censorship</a>.  All this was apparently intentional.</p>
+  </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -404,7 +507,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 13:08:16 $
+$Date: 2018/10/05 11:26:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-back-doors.html 25 Jul 2018 01:48:56 -0000      1.67
+++ proprietary-back-doors.html 5 Oct 2018 11:26:55 -0000       1.68
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.85 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -33,41 +38,47 @@
    <a href="#other">Other/undefined</a>
 </p>
 
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
-<h3 id="spy">Spying</h3>
+<h3 id='spy'>Spying</h3>
 
-<ul>
-  <li>
+<ul class="blurbs">
+<!-- INSERT spy -->
+  <li id="M201706202">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
-      cameras contain a glaring back door&mdash;they have login accounts
-      with hard-coded passwords, which can't be changed, and <a
+    cameras contain a glaring back door&mdash;they have login
+    accounts with hard-coded passwords, which can't be changed, and <a
       
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
       there is no way to delete these accounts either</a>.</p>
-    <p>Since these accounts with hard-coded passwords are impossible to
-      delete, this problem is not merely an insecurity; it amounts to a
-      back door that can be used by the manufacturer (and government) to
-      spy on users.</p>
+
+    <p>Since these accounts with hard-coded passwords are impossible
+    to delete, this problem is not merely an insecurity; it amounts to
+    a back door that can be used by the manufacturer (and
+    government) to spy on users.</p>
   </li>
 
-  <li>
-    <p>WhatsApp <a
-      
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages";>
-      has a back door that the company can use to read the plaintext
-      of messages</a>.</p>
-    <p>This should not come as a surprise. Nonfree software for
-      encryption is never trustworthy.</p>
+  <li id="M201701130">
+    <p>WhatsApp has a feature that <a
+    
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+    has been described as a &ldquo;back door&rdquo;</a> because it would
+    enable governments to nullify its encryption.</p>
+
+    <p>The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.</p>
   </li>
 
-  <li>
-    <p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-      Microsoft has already backdoored its disk encryption</a>.</p>
+  <li id="M201512280">
+    <p>Microsoft has <a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+    backdoored its disk encryption</a>.</p>
   </li>
 
-  <li>
+  <li id="M201409220">
     <p>Apple can, and regularly does, <a
       
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
       remotely extract some data from iPhones for the state</a>.</p>
+
     <p>This may have improved with <a
       
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
       iOS 8 security improvements</a>; but <a
@@ -76,95 +87,107 @@
   </li>
 </ul>
 
-<h3 id="alter-data">Altering user's data or settings</h3>
 
-<ul>
-  <li>
-    <p>A pregnancy test controller application not only can <a
-      
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
-      spy on many sorts of data in the phone, and in server accounts, it
-      can alter them too</a>.</p>
+<h3 id='alter-data'>Altering user's data or settings</h3>
+
+<ul class="blurbs">
+<!-- INSERT alter-data -->
+  <li id="M201809140">
+    <p>Android has a <a
+    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
+
+    <p>The article suggests it might be a universal back door, but this
+    isn't clear.</p>
   </li>
 
-  <li>
+  <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
       
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
       takes control of user interface items after luring the user into
       entering an admin password</a>.</p>
   </li>
 
-  <li>
-    <p>Users reported that <a 
-      
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
-      Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
-      Windows 10</a>.</p>
-    <p>Microsoft was in fact <a 
-      
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
-      attacking computers that run Windows 7 and 8</a>, switching on a flag 
-      that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
-      had turned it off.</p>
-    <p>Later on, Microsoft published instructions on <a 
-      
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
-      how to permanently reject the downgrade to Windows 10</a>.</p>
-    <p>This seems to involve use of a back door in Windows 7 and 8.</p>
+  <li id="M201604250">
+    <p>A pregnancy test controller application not only can <a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too</a>.</p>
+  </li>
+
+  <li id="M201512074">
+    <p><a
+    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+    Some D-Link routers</a> have a back door for changing settings in a
+    dlink of an eye.</p>
+
+    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
+    router has a back door</a>.</p>
+
+    <p><a href="https://github.com/elvanderb/TCP-32764";>Many models of
+    routers have back doors</a>.</p>
+  </li>
+
+  <li id="M201511244">
+    <p>Google has long had <a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    back door to remotely unlock an Android device</a>, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).</p>
   </li>
 
-  <li>
+  <li id="M201511194">
     <p>Caterpillar vehicles come with <a
       
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
       a back door to shutoff the engine</a> remotely.</p>
   </li>
 
-  <li>
-    <p>Modern gratis game cr&hellip;apps
-      <a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+  <li id="M201509160">
+    <p>Modern gratis game cr&hellip;apps <a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
       collect a wide range of data about their users and their users' 
       friends and associates</a>.</p>
+
     <p>Even nastier, they do it through ad networks that merge the data
       collected by various cr&hellip;apps and sites made by different 
       companies.</p>
-    <p>They use this data to manipulate people to buy things, and hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
-      also use a back door to manipulate the game play for specific 
players.</p>
+
+    <p>They use this data to manipulate people to buy things, and hunt for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.</p>
+
     <p>While the article describes gratis games, games that cost money 
       can use the same tactics.</p>
   </li>
 
-  <li>
-    <p><a id="samsung"
+  <li id="M201403121">
+    <p id="samsung"><a
       
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
       Samsung Galaxy devices running proprietary Android versions come with
       a back door</a> that provides remote access to the files stored on
       the device.</p>
   </li>
 
-  <li>
-    <p><a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
-      Some D-Link routers</a> have a back door for changing settings in a
-      dlink of an eye.</p>
-    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";>
-      The TP-Link router has a back door</a>.</p>
-    <p><a href="https://github.com/elvanderb/TCP-32764";>Many models of routers
-      have back doors</a>.</p>
-  </li>
-
-  <li id="swindle-eraser">
-    <p>The Amazon Kindle-Swindle has a back door that has been used to <a
+  <li id="M201210220">
+    <p id="swindle-eraser">The Amazon
+    Kindle-Swindle has a back door that has been used to <a
       
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-      remotely erase books</a>.  One of the books erased was 1984, by George
-      Orwell.</p>
-    <p>Amazon responded to criticism by saying it would delete books only
-      following orders from the state.  However, that policy didn't last.
-      In 2012 it <a
+    remotely erase books</a>.  One of the books erased was
+    <cite>1984</cite>, by George Orwell.</p>
+
+    <p>Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it <a
       
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
       wiped a user's Kindle-Swindle and deleted her account</a>, then
       offered her kafkaesque &ldquo;explanations.&rdquo;</p>
-    <p>Do other ebook readers have back doors in their nonfree software?
-      We don't know, and we have no way to find out.  There is no reason
-      to assume that they don't.</p>
+
+    <p>Do other ebook readers have back doors in their nonfree software? We
+    don't know, and we have no way to find out.  There is no reason to
+    assume that they don't.</p>
   </li>
 
-  <li>
+  <li id="M201011220">
     <p>The iPhone has a back door for <a
       
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
       remote wipe</a>.  It's not always enabled, but users are led into
@@ -172,78 +195,82 @@
   </li>
 </ul>
 
-<h3 id="install-delete">Installing or deleting programs</h3>
 
-<ul>
-  <li><p>Some &ldquo;Smart&rdquo; TVs
-      automatically <a 
href="https://news.ycombinator.com/item?id=16727319";>load
-      downgrades that install a surveillance app</a>.</p>
-
-    <p>We link to the article for the facts it presents. It is too bad
-      that the article finishes by advocating the moral weakness of
-      surrendering to Netflix. The Netflix
-      app <a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+<h3 id='install-delete'>Installing or deleting programs</h3>
+
+<ul class="blurbs">
+<!-- INSERT install-delete -->
+  <li id="M201804010">
+    <p>Some &ldquo;Smart&rdquo; TVs automatically <a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
+
+    <p>We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app <a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
       malware too</a>.</p>
   </li>
 
-  <li>
+  <li id="M201511090">
     <p>Baidu's proprietary Android library, Moplus, has a back door that <a
       
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>
-      can &ldquo;upload files&rdquo; as well as forcibly install apps</a>.</p>
+    can &ldquo;upload files&rdquo; as well as forcibly install
+    apps</a>.</p>
+
     <p>It is used by 14,000 Android applications.</p>
   </li>
   
-  <li>
+  <li id="M201112080">
+    <p> In addition to its <a href="#windows-update">universal back
+    door</a>, Windows 8 has a back door for <a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    remotely deleting apps</a>.</p>
+
+    <p>You might well decide to let a security service that you trust
+    remotely <em>deactivate</em> programs that it considers malicious.
+    But there is no excuse for <em>deleting</em> the programs, and you
+    should have the right to decide whom (if anyone) to trust in this
+    way.</p>
+  </li>
+
+  <li id="M201103070">
     <p>In Android, <a
       
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-      Google has a back door to remotely delete apps.</a>  (It was in a
+    Google has a back door to remotely delete apps</a>. (It was in a
       program called GTalkService, which seems since then to have been
       merged into Google Play.)</p>
+
     <p>Google can also <a
       
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-      forcibly and remotely install apps</a> through GTalkService.
-      This is not equivalent to a universal back door, but permits various
-      dirty tricks.</p>
+    forcibly and remotely install apps</a> through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.</p>
+
     <p>Although Google's <em>exercise</em> of this power has not been
       malicious so far, the point is that nobody should have such power,
-      which could also be used maliciously.  You might well decide to let a
-      security service remotely <em>deactivate</em> programs that it
-      considers malicious.  But there is no excuse for allowing it
-      to <em>delete</em> the programs, and you should have the right to
-      decide who (if anyone) to trust in this way.</p>
-  </li>
-
-  <li>
-    <p><a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
-      Windows 8 also has a back door for remotely deleting apps</a>.</p>
-    <p>You might well decide to let a security service that you trust
-      remotely <em>deactivate</em> programs that it considers malicious.
-      But there is no excuse for <em>deleting</em> the programs, and you
-      should have the right to decide whom (if anyone) to trust in this
-      way.</p>
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely <em>deactivate</em> programs that
+    it considers malicious.  But there is no excuse for allowing it to
+    <em>delete</em> the programs, and you should have the right to decide
+    who (if anyone) to trust in this way.</p>
   </li>
 
-  <li>
+  <li id="M200808110">
     <p>The iPhone has a back door <a
       
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
       that allows Apple to remotely delete apps</a> which Apple considers
-      &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have this
-      power because of course we can trust Apple.</p>
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.</p>
   </li>
 </ul>
 
 
-<h3 id="universal">Full control</h3>
-
-<ul>
-  <li>
-    <p>ChromeOS has a universal back door. At least, Google says
-      it does&mdash;in <a
-      href="https://www.google.com/intl/en/chromebook/termsofservice.html";>
-      section 4 of the EULA</a>.</p>
-  </li>
+<h3 id='universal'>Full control</h3>
 
-  <li>
+<ul class="blurbs">
+<!-- INSERT universal -->
+  <li id="M201711244">
     <p>The Furby Connect has a <a
       
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
       universal back door</a>. If the product as shipped doesn't act as a
@@ -251,144 +278,163 @@
       into one.</p>
   </li>
 
-  <li>
+  <li id="M201711010">
     <p>Sony has brought back its robotic pet Aibo, this time <a
       
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
-      with a universal back door, and tethered to a server that requires a
-      subscription</a>.</p>
+    with a universal back door, and tethered to a server that requires
+    a subscription</a>.</p>
   </li>
 
-  <li>
-    <p>Tesla cars have a <a
+  <li id="M201709091">
+    <p>Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and <a
       
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
-      universal back door</a>.</p>
-    <p>While remotely allowing car &ldquo;owners&rdquo; to use the whole
-      battery capacity did not do them any harm, the same back door would
-      permit Tesla (perhaps under the command of some government) to
-      remotely order the car to use none of its battery. Or perhaps to drive
-      its passenger to a torture prison.</p>
+    a universal back door in the software</a> to temporarily increase
+    this limit.</p>
+
+    <p>While remotely allowing car &ldquo;owners&rdquo; to use the
+    whole battery capacity did not do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
+    perhaps to drive its passenger to a torture prison.</p>
   </li>
 
-  <li>
+  <li id="M201702061">
     <p>Vizio &ldquo;smart&rdquo; TVs <a
       
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
       have a universal back door</a>.</p>
   </li>
 
-  <li>
-    <p>The Amazon Echo appears to have a universal back door, since <a
-      href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
-      it installs &ldquo;updates&rdquo; automatically</a>.</p>
-    <p>We have found nothing explicitly documenting the lack of any way to
-      disable remote changes to the software, so we are not completely sure
-      there isn't one, but it seems pretty clear.</p>
-  </li>
-
-  <li>
+  <li id="M201609130">
     <p>Xiaomi phones come with <a
       
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>
-      a universal back door in the application processor, for
-      Xiaomi's use</a>.</p>
+    a universal back door in the application processor, for Xiaomi's
+    use</a>.</p>
+
     <p>This is separate from <a href="#universal-back-door-phone-modem">the
-      universal back door in the modem processor that the local
-      phone company can use</a>.</p>
+    universal back door in the modem processor that the local phone
+    company can use</a>.</p>
   </li>
 
-  <li>
-    <p>Microsoft Windows has a universal back door through which <a
-      
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263";>
+  <li id="M201608172">
+    <p id="windows-update">Microsoft
+    Windows has a universal back door through which <a
+    
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
       any change whatsoever can be imposed on the users</a>.</p>
-    <p>More information on when <a
+
+    <p>This was <a
       href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
-      this was used</a>.</p>
-    <p>In Windows 10, the universal back door is no longer hidden; all
-      &ldquo;upgrades&rdquo; will be <a
+    reported in 2007</a> for XP and Vista, and it seems
+    that Microsoft used the same method to push the <a
+    href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+    Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
+
+    <p>In Windows 10, the universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
       
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
       forcibly and immediately imposed</a>.</p>
   </li>
 
-  <li>
-    <p><a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
+  <li id="M201606060">
+    <p>The Amazon Echo appears to have a universal back door, since <a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
+    it installs &ldquo;updates&rdquo; automatically</a>.</p>
+
+    <p>We have found nothing explicitly documenting the lack of any way
+    to disable remote changes to the software, so we are not completely
+    sure there isn't one, but this seems pretty clear.</p>
+  </li>
+
+  <li id="M201412180">
+    <p><a
+    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
       A Chinese version of Android has a universal back door</a>. Nearly
       all models of mobile phones have a <a href="#universal-back-door">
       universal back door in the modem chip</a>. So why did Coolpad bother
       to introduce another? Because this one is controlled by Coolpad.</p>
   </li>
 
-  <li>
-    <p><a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
-      Some applications come with MyFreeProxy, which is a universal back door
-      that can download programs and run them.</a></p>
+  <li id="M201311300">
+    <p><a
+    
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
+    Some applications come with MyFreeProxy, which is a universal back
+    door</a> that can download programs and run them.</p>
   </li>
 
-  <li>
-    <p id="universal-back-door">Almost every phone's communication
-      processor has a universal back door which is <a
-      
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-      often used to make a phone transmit all conversations it hears</a>.</p>
-    <p>The back door <a
-      
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
-      may take the form of bugs that have gone 20 years unfixed</a>.
-      The choice to leave the security holes in place is morally
-      equivalent to writing a back door.</p>
-    <p>The back door is in the &ldquo;modem processor&rdquo;, whose
-      job is to communicate with the radio network.  In most phones,
-      the modem processor controls the microphone.  In most phones it
-      has the power to rewrite the software for the main processor
-      too.</p>
-    <p>A few phone models are specially designed so that the modem
-      processor does not control the microphone, and so that it can't
-      change the software in the main processor.  They still have the
-      back door, but at least it is unable to turn the phone unto a
-      listening device.</p>
-    <p>The universal back door is apparently also used to make phones <a
-      
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-      transmit even when they are turned off</a>.  This means their
-      movements are tracked, and may also make the listening feature
-      work.</p>
-  </li>
-
-  <li>
-    <p>In addition to its <a href="#swindle-eraser">book eraser</a>, the
-      Kindle-Swindle has a <a
+  <li id="M201202280">
+    <p>ChromeOS has a universal back
+    door. At least, Google says it does&mdash;in <a
+    href="https://www.google.com/intl/en/chromebook/termsofservice.html";>
+    section 4 of the EULA</a>.</p>
+  </li>
+
+  <li id="M200700001">
+    <p>In addition to its <a href="#swindle-eraser">book
+    eraser</a>, the Kindle-Swindle has a <a
       
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
       universal back door</a>.</p>
   </li>
+
+  <li id="M200612050">
+    <p>Almost every phone's communication
+    processor has a universal back door which is <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+    often used to make a phone transmit all conversations it hears</a>. See
+    <a href="/proprietary/malware-mobiles.html#universal-back-door">Malware
+    in Mobile Devices</a> for more info.</p>
+  </li>
 </ul>
 
-<h3 id="other">Other or undefined</h3>
 
-<ul>
-  <li>
+<h3 id='other'>Other or undefined</h3>
+
+<ul class="blurbs">
+<!-- INSERT other -->
+  <li id="M201711204">
+    <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
+    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+    unintended back doors</a> too.</p>
+  </li>
+
+  <li id="M201609240">
     <p>A Capcom's Street Fighter V update <a
       href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>
-      installed a driver that could be used as a back door by any
-      application installed on a Windows computer</a>, but was <a
+    installed a driver that could be used as a back door by
+    any application installed on a Windows computer</a>, but was <a
       
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack";>
       immediately rolled back</a> in response to public outcry.</p>
   </li>
 
-  <li>
+  <li id="M201511260">
+    <p>Dell computers, shipped with
+    Windows, had a bogus root certificate that <a
+    
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
+    allowed anyone (not just Dell) to remotely authorize any software to
+    run</a> on the computer.</p>
+  </li>
+
+  <li id="M201511198">
     <p>ARRIS cable modem has a <a
       
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
       back door in the back door</a>.</p>
   </li>
 
-  <li>
-    <p>Dell computers, shipped with Windows, had a bogus root certificate
-      that <a
-      
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
-      allowed anyone (not just Dell) to remotely authorize any software to
-      run</a> on the computer.</p>
+  <li id="M201510200">
+    <p>&ldquo;Self-encrypting&rdquo; disk drives
+    do the encryption with proprietary firmware so you
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives <a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+    have a back door</a>.</p>
   </li>
 
-  <li>
+  <li id="M201504090">
     <p>Mac OS X had an <a
       
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
-      intentional local back door for 4 years</a>.</p>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
   </li>
 
-  <li>
+  <li id="M201309110">
     <p>Here is a big problem whose details are still secret: <a
       href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";>
       The FBI asks lots of companies to put back doors in proprietary
@@ -396,38 +442,39 @@
       but every proprietary program for encryption is a possibility.</p>
   </li>
 
-  <li>
-    <p>German government <a
-      
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
-      veers away from Windows 8 computers with TPM 2.0 due to potential back
-      door capabilities of the TPM 2.0 chip</a>.</p>
+  <li id="M201308230">
+    <p>The German government <a
+    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
+    away from Windows 8 computers with TPM 2.0</a>, due to potential back
+    door capabilities of the TPM 2.0 chip.</p>
   </li>
 
-  <li>
-    <p>Here is a suspicion that we can't prove, but is worth thinking
-      about: <a
-      
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+  <li id="M201307300">
+    <p>Here is a suspicion that
+    we can't prove, but is worth thinking about: <a
+    
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
       Writable microcode for Intel and AMD microprocessors</a> may be a
       vehicle for the NSA to invade computers, with the help of Microsoft,
       say respected security experts.</p>
   </li>
 
-  <li>
-    <p>HP &ldquo;storage appliances&rdquo; that use the proprietary
-      &ldquo;Left Hand&rdquo; operating system have back doors that give HP <a
+  <li id="M201307114">
+    <p>HP &ldquo;storage appliances&rdquo; that
+    use the proprietary &ldquo;Left Hand&rdquo;
+    operating system have back doors that give HP <a
       
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
-      remote login access</a> to them.  HP claims that this does not give HP
-      access to the customer's data, but if the back door allows
+    remote login access</a> to them.  HP claims that this does not
+    give HP access to the customer's data, but if the back door allows
       installation of software changes, a change could be installed that
       would give access to the customer's data.</p>
   </li>
 </ul>
 
+
 <p>The EFF has other examples of the <a
 href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones";>
 use of back doors</a>.</p>
 
-
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -468,7 +515,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/25 01:48:56 $
+$Date: 2018/10/05 11:26:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-microsoft.html      25 Jul 2018 01:44:51 -0000      1.76
+++ malware-microsoft.html      5 Oct 2018 11:26:55 -0000       1.77
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
@@ -39,71 +44,89 @@
 <div class="summary" style="margin-top: 2em">
 <h3>Type&nbsp;of malware</h3>
 <ul>
-<li><a href="#back-doors">Back doors</a></li>
+  <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+  <li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>&mdash;systems
+  <li><a href="#insecurity">Insecurity</a></li>
+  <li><a href="#interference">Interference</a></li>
+  <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>&mdash;systems
+  <li><a href="#sabotage">Sabotage</a></li>
+  <li><a href="#subscriptions">Subscriptions</a></li>
+  <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
-<li><a href="#subscriptions">Subscriptions</a></li>
 </ul>
 </div>
 
 <h3 id="back-doors">Microsoft Back Doors</h3>
-<ul>
-  <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-  Microsoft has already backdoored its disk encryption</a>.</p></li>
 
-  <li><p>Microsoft Windows has a universal back door through which <a 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
+<ul class="blurbs">
+<!-- INSERT backdoor -->
+  <li id="M201608172">
+    <p id="windows-update">Microsoft
+    Windows has a universal back door through which <a
+    
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
   any change whatsoever can be imposed on the users</a>.</p>
 
-  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
-  this was used</a>.</p>
+    <p>This was <a
+    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    reported in 2007</a> for XP and Vista, and it seems
+    that Microsoft used the same method to push the <a
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
+    Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
+
+    <p>In Windows 10, the universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
+    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    forcibly and immediately imposed</a>.</p>
+  </li>
+
+  <li id="M201512280">
+    <p>Microsoft has <a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+    backdoored its disk encryption</a>.</p>
+  </li>
 
-  <p>In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be
-  <a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>forcibly
 and immediately imposed</a>.</p></li>
+  <li id="M201308230">
+    <p>The German government <a
+    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
+    away from Windows 8 computers with TPM 2.0</a>, due to potential back
+    door capabilities of the TPM 2.0 chip.</p>
+  </li>
 
-  <li><p><a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
-  Windows 8 also has a back door for remotely deleting apps</a>.</p>
+  <li id="M201112081">
+    <p>Windows 8 also has a back door for <a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    remotely deleting apps</a>.</p>
 
   <p>You might well decide to let a security service that you trust
   remotely <em>deactivate</em> programs that it considers malicious.
   But there is no excuse for <em>deleting</em> the programs, and you
-  should have the right to decide who (if anyone) to trust in this 
way.</p></li>
-
-  <li><p>German government <a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
-      away from Windows 8 computers with TPM 2.0 due to potential back
-      door capabilities of the TPM 2.0 chip</a>.</p>
+    should have the right to decide whom (if anyone) to trust in this
+    way.</p>
   </li>
+</ul>
 
-<li id="windows7-back-door"><p>Users reported that <a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
-    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
-    Windows 10</a>.</p>
-
-    <p>Microsoft was in fact <a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
-    attacking computers that run Windows 7 and 8</a>, switching on a flag 
-    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
-    had turned it off.</p>
-
-    <p>Later on, Microsoft published instructions on <a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
-    how to permanently reject the downgrade to Windows 10</a>.</p>
 
-    <p>This seems to involve use of a back door in Windows 7 and 8.</p>
-</li>
+<h3 id="drm">Microsoft DRM</h3>
 
+<ul class="blurbs">
+<!-- INSERT DRM -->
+  <li id="M200708131">
+    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
+    in Windows</a>, introduced to cater to <a
+    href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
+    (The article talks about how the same malware would later be
+    introduced in MacOS.  That had not been done at the time, but it was
+    done subsequently.)</p>
+  </li>
 </ul>
 
+
 <h3 id="insecurity">Microsoft Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
@@ -111,28 +134,137 @@
   supposition that prestigious proprietary software doesn't have grave
   bugs.</p>
 
-<ul>
-
-<li>
+<ul class="blurbs">
+<!-- INSERT insecurity -->
+  <li id="M201705120">
   <p>Exploits of bugs in Windows, which were developed by the NSA
-       and then leaked by the Shadowbrokers group, are now being used to
-       <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
 a great number
-       of Windows computers with ransomware</a>.
-       </p>
-</li>
-
-    <li><p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
 in Internet Explorer and Edge</a>
-    allows an attacker to retrieve Microsoft account credentials, if
-    the user is tricked into visiting a malicious link.</p>
-    </li>
-<li>
-<p><a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers</a>.
-</p>
-</li>
+    and then leaked by the Shadowbrokers group, are now being used to <a
+    
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
+    a great number of Windows computers with ransomware</a>.</p>
+  </li>
+
+  <li id="M201608020">
+    <p>A <a
+    
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
+    in Internet Explorer and Edge</a> allows an attacker to retrieve
+    Microsoft account credentials, if the user is tricked into visiting
+    a malicious link.</p>
+  </li>
+
+  <li id="M201312040">
+    <p><a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    Point-of-sale terminals running Windows were taken over</a> and
+    turned into a botnet for the purpose of collecting customers' credit
+    card numbers.</p>
+  </li>
+</ul>
+
+
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
+are like sabotage, but they are not grave enough to qualify for the word
+&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This
+section describes examples of Microsoft committing interference.</p>
+
+<ul class="blurbs">
+<!-- INSERT interference -->
+  <li id="M201809120">
+    <p>One version of Windows 10 <a
+    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+    harangues users if they try to install Firefox (or Chrome)</a>.</p>
+  </li>
+
+  <li id="M201803190">
+    <p>Microsoft is planning to make Windows <a
+    
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
+    impose use of its browser, Edge, in certain circumstances</a>.</p>
+
+    <p>The reason Microsoft can force things on users is that Windows
+    is nonfree.</p>
+  </li>
+
+  <li id="M201703170">
+    <p>Windows displays <a
+    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    intrusive ads for Microsoft products and its partners'
+    products</a>.</p>
+
+    <p>The article's author starts from the premise that Microsoft has
+    a right to control what Windows does to users, as long as it doesn't
+    go &ldquo;too far&rdquo;. We disagree.</p>
+  </li>
+
+  <li id="M201608170">
+    <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
+    on computers that were running Windows 7 and 8, Microsoft <a
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    repeatedly switched on a flag that urged users to
+    &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
+    it off, in the hope that some day they would fail to say no.
+    To do this, Microsoft used <a
+    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    malware techniques</a>.</p>
+
+    <p>A detailed <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    analysis of Microsoft's scheme</a> is available on the Electronic
+    Frontier Foundation's website.</p>
+  </li>
+
+  <li id="M201603090">
+    <p>Microsoft has made companies'
+    Windows machines managed by the company's sysadmins <a
+    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
+    to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    <p>Microsoft has <a
+    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    all future Intel CPUs for Windows 7 and 8</a>. Those
+    machines will be stuck with the nastier Windows 10.  <a
+    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    AMD and Qualcomm CPUs, too</a>.</p>
+
+    <p>Of course, Windows 7 and 8 are unethical too, because they are
+    proprietary software.  But this example of Microsoft's wielding its
+    power demonstrates the power it holds.</p>
+
+    <p>Free software developers also stop maintaining old versions of
+    their programs, but this is not unfair to users because the users of
+    free software have control over it.  If it is important enough to you,
+    you and other users can hire someone to support the old version on
+    your future platforms.</p>
+  </li>
+</ul>
+
+
+<h3 id="jails">Microsoft Jails</h3>
+
+<ul class="blurbs">
+<!-- INSERT jails -->
+  <li id="M201706130">
+    <p>Windows 10 S was a jail: <a
+    
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
+    only programs from the Windows Store could be
+    installed and executed</a>. It was however possible to <a
+    
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
+    upgrade to Windows 10 Pro</a>. The successor of Windows
+    10 S is a special configuration of Windows 10 called <a
+    
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
+    S mode</a>. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.</p>
+  </li>
 
+  <li id="M201210080">
+    <p><a
+    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+    Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
+    jail</a>.</p>
+  </li>
 </ul>
 
 
@@ -141,316 +273,278 @@
 <p>The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Microsoft
-actions that harm to the users of specific Microsoft software.</p>
+actions that harm the users of specific Microsoft software.</p>
 
-<ul>
-  <li><p> Microsoft
-      <a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
+<ul class="blurbs">
+<!-- INSERT sabotage -->
+  <li id="M201704194">
+    <p>Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, <a
+    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    forcing their owners to switch to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704130">
+    <p>Microsoft <a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
        has dropped support for Windows 7 and 8 on recent processors</a>
       in a big hurry.</p>
+
     <p>It makes no difference what legitimate reasons Microsoft might
-      have for not doing work to support them. If it doesn't want to
-      do this work, it should let users do the work.</p>
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.</p>
   </li>
 
-  <li>
-    <p>Microsoft has made Windows 7 and 8 cease to function on certain
-      new computers,
-      <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
-      forcing their owners to switch to Windows 10</a>.</p>
+  <li id="M201606270">
+    <p id="windows10-forcing">In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to <a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+    silently download&hellip; the whole of Windows 10</a>! Apparently,
+    this was done through a <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">
+    universal back door</a>. Not only did the unwanted downloads <a
+    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    use up much needed resources</a>, but many of the people who let
+    installation proceed found out that this “upgrade” was in fact a <a
+    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    downgrade</a>.</p>
   </li>
 
-  <li><p>Once Microsoft has tricked a user into accepting installation
-   of Windows
-   10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+  <li id="M201606010">
+    <p>Once Microsoft has tricked a user
+    into accepting installation of Windows 10, <a
+    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
    find that they are denied the option to cancel or even postpone the
-   imposed date of installation</a>.
-   </p>
+    imposed date of installation</a>.</p>
+
    <p>This demonstrates what we've said for years: using proprietary
-   software means letting someone have power over you, and you're
-   going to get screwed sooner or later.</p></li>
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.</p>
+  </li>
 
-  <li><p>Microsoft
-  has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
-  all future Intel CPUs for Windows 7 and 8</a>. Those machines will
-  be stuck with the nastier Windows 10.
-  <a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
-  AMD and Qualcomm CPUs, too</a>.
-  </p>
-  <p>Of course, Windows 7 and 8 are unethical too, because they are
-  proprietary software.  But this example of Microsoft's wielding its
-  power demonstrates the power it holds.
-  </p>
-  <p>Free software developers also stop maintaining old versions of
-  their programs, but this is not unfair to users because the
-  users of free software have control over it.  If it is important
-  enough to you, you and other users can hire someone to support
-  the old version on your future platforms.
-  </p></li>
-
-  <li><p>Microsoft
-    is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
-    forcibly pushing Windows
-    update to its version 10</a>, ignoring the flag on Windows 7 or 8
-    that you could set to not upgrade.  This reaffirms the presence of
-    a <a href="/proprietary/proprietary-back-doors.html">universal
-    back door in Windows</a> 7 and 8.</p></li>
+  <li id="M201601310">
+    <p>FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to <a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    alternative compatible chips</a>
+    so that they no longer work. Microsoft is <a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
+  </li>
 
-  <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
+  <li id="M201511240">
+    <p>Windows 10 &ldquo;upgrades&rdquo; <a
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
-      delete applications</a> without asking permission.</p></li>
+    delete applications</a> without asking permission.</p>
+  </li>
 
-  <li><p>
-  Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-  repeatedly nagging many users to install Windows 10</a>.
-  </p></li>
-
-<li><p>
-Microsoft was for months <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
-tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they
-failed to notice and say no.
-</p></li>
-
-  <li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-  Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
-  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
-  Microsoft cut off security fixes for Windows XP, except to some big users
-  that pay exorbitantly.</a></p>
-
-  <p>Microsoft is going to
-  <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
-  cut off support for some Internet Explorer versions</a> in the same way.</p>
-
-  <p>A person or company has the right to cease to work on a
-  particular program; the wrong here is Microsoft does this after having
-  made the users dependent on Microsoft, because they are not free to ask
-  anyone else to work on the program for them.</p></li>
-</ul>
+  <li id="M201503260">
+    <p><a
+    
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
+    cut off security fixes for Windows XP, except to some big users that
+    pay exorbitantly</a>.</p>
+
+    <p>Microsoft is going to <a
+    
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+    cut off support for some Internet Explorer versions</a> in the same
+    way.</p>
+
+    <p>A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for them.</p>
+  </li>
 
-<h3 id="interference">Microsoft Interference</h3>
+  <li id="M201306220">
+    <p><a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+    informs the NSA of bugs in Windows before fixing them</a>.</p>
+  </li>
+</ul>
 
-<p>Various proprietary programs often mess up the user's system. They are like 
sabotage, but they are not grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.</p>
 
-<ul>
-  <li><p>Microsoft is planning to make Windows <a
-      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
-      impose use of its browser, Edge, in certain circumstances</a>.</p>
-    <p>The reason Microsoft can force things on users is that Windows is
-      nonfree.</p></li>
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
 
-  <li><p>Windows displays
-      <a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
-       intrusive ads for Microsoft products and its
-       partners' products</a>.</p>
-    <p>The article's author starts from the premise that Microsoft
-      has a right to control what Windows does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.</p></li>
-  
-  <li><p>Microsoft inserts <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts";>
-      annoying advertisements inside of the File Explorer</a> to nag
-      users to buy subscriptions for the OneDrive service.</p></li>
-
-<li>In order to increase Windows 10's install base, Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
-blatantly disregards user choice and privacy</a>.
-</li>
-
-<li><p>Microsoft has
-started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>nagging
-users obnoxiously and repeatedly to install Windows 10</a>.</p></li>
-
-  <li><p>Microsoft
-      <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>is
-        tricking
-        users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
-into replacing Windows 7 with Windows 10</a>.</p></li>
-
-  <li><p>Microsoft has made companies' Windows machines managed by the
-company's
-sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
-users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
-10</a>.</p></li>
+<ul class="blurbs">
+<!-- INSERT subscriptions -->
+  <li id="M201507150">
+    <p>Microsoft Office forces users <a
+    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    subscribe to Office 365 to be able to create/edit documents</a>.</p>
+  </li>
 </ul>
 
-<h3 id="surveillance">Microsoft Surveillance</h3>
-
-<ul>
 
-<li><p>Windows 10 telemetry program sends information to Microsoft about the
-user's computer and their use of the computer.</p>
+<h3 id="surveillance">Microsoft Surveillance</h3>
 
-<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
-surveillance <a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+<ul class="blurbs">
+<!-- INSERT microsoft-surv -->
+  <li id="M201710134">
+    <p>Windows 10 telemetry program sends information to Microsoft about
+    the user's computer and their use of the computer.</p>
+
+    <p>Furthermore, for users who installed the
+    fourth stable build of Windows 10, called the
+    &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
     by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
-<p>The <a
-href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
+    <p>The <a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
  &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys
- <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
+    engineers to access, among other things, registry keys <a
+    href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
  can contain sensitive information like administrator's login
- password</a>.</p></li>
+    password</a>.</p>
+  </li>
 
-<li><p>Windows DRM
-files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
-be used to identify people browsing through Tor</a>. The vulnerability
-exists only if you use Windows.
-</p></li>
-
-<li><p>By default, Windows 10 <a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
-debugging information to Microsoft, including core dumps</a>. Microsoft
-now distributes them to another company.</p></li>
-
-<li>It appears <a
-href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
-Windows 10 sends data to Microsoft about what applications are 
-running</a>.</li>
-
-<li><p>A downgrade to Windows 10 deleted surveillance-detection
-applications.  Then another downgrade inserted a general spying
-program.  Users noticed this and complained, so Microsoft
-renamed it <a
-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
-to give users the impression it was gone</a>.</p>
-
-<p>To use proprietary software is to invite such treatment.</p></li>
-
-  <li><p>
-  <a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
-  Windows 10 comes with 13 screens of snooping options</a>, all enabled by 
default,
-  and turning them off would be daunting to most users.</p></li>
-
-  <li><p>
-  Windows 10 <a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
-  ships with default settings that show no regard for the
-  privacy of its users</a>, giving Microsoft the &ldquo;right&rdquo;
-  to snoop on the users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.</p>
-
-  <p>We can suppose Microsoft look at users' files for the US government on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on demand?</p></li>
-
-  <li><p>
-  <a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
-  Windows 10 sends identifiable information to Microsoft</a>, even if a user
-  turns off its Bing search and Cortana features, and activates the
-  privacy-protection settings.</p></li>
-
-  <li><p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
-  track the browsing of each specific user.</p></li>
-
-  <li>Spyware in Windows 8: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-  Windows Update snoops on the user.</a>
-  <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
-  Windows 8.1 snoops on local searches.</a> And there's a
-  <a href="http://www.marketoracle.co.uk/Article40836.html";>
-  secret NSA key in Windows</a>, whose functions we don't know.</li>
-
-  <li><p>
-  <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
-  Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
-  </li>
-
-  <li><p>Spyware in Skype:
-      <a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-      Microsoft changed Skype
-      <a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
-      specifically for spying</a>.</p>
+  <li id="M201702020">
+    <p>DRM-restricted files can be used to <a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+    identify people browsing through Tor</a>. The vulnerability exists
+    only if you use Windows.</p>
+  </li>
+
+  <li id="M201611240">
+    <p>By default, Windows 10 <a
+    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
+    debugging information to Microsoft, including core dumps</a>. Microsoft
+    now distributes them to another company.</p>
   </li>
 
-  <li><p>
-  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
-  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
-  encryption <a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+  <li id="M201608171">
+    <p>In order to increase Windows 10's install base, Microsoft <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    blatantly disregards user choice and privacy</a>.</p>
+  </li>
+
+  <li id="M201603170">
+    <p><a
+    
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
+    Windows 10 comes with 13 screens of snooping options</a>, all enabled
+    by default, and turning them off would be daunting to most users.</p>
+  </li>
+
+  <li id="M201601050">
+    <p>It appears <a
+    
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+    Windows 10 sends data to Microsoft about what applications are
+    running</a>.</p>
+  </li>
+
+  <li id="M201511264">
+    <p>A downgrade to Windows 10 deleted surveillance-detection
+    applications.  Then another downgrade inserted a general spying
+    program.  Users noticed this and complained, so Microsoft renamed it <a
+    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+    to give users the impression it was gone</a>.</p>
+
+    <p>To use proprietary software is to invite such treatment.</p>
+  </li>
+
+  <li id="M201508130">
+    <p><a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+    Windows 10 sends identifiable information to Microsoft</a>, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.</p>
+  </li>
+
+  <li id="M201507300">
+    <p>Windows 10 <a
+    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
+    ships with default settings that show no regard for the privacy of
+    its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted ads.</p>
+
+    <p>We can suppose Microsoft look at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
+    on demand?</p>
+  </li>
+
+  <li id="M201506170">
+    <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
+    to overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption <a
+    
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
   gives Microsoft a key</a>.</p>
 
-  <p>Thus, Windows is overt malware in regard to surveillance,
-  as in other issues.</p>
+    <p>Thus, Windows is overt malware in regard to surveillance, as in
+    other issues.</p>
 
-  <p>We can suppose Microsoft look at users' files for the US government on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on demand?</p>
+    <p>We can suppose Microsoft look at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicit
+    say so. Will it look at users' files for the Chinese government
+    on demand?</p>
 
-  <p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
-  track the browsing of each specific user.</p>
+    <p>The unique &ldquo;advertising ID&rdquo; for each user enables
+    other companies to track the browsing of each specific user.</p>
 
   <p>It's as if Microsoft has deliberately chosen to make Windows 10
   maximally evil on every dimension; to make a grab for total power
-  over anyone that doesn't drop Windows now.</p></li>
+    over anyone that doesn't drop Windows now.</p>
+  </li>
 
-</ul>
+  <li id="M201410040">
+    <p>It only gets worse with time.  <a
+    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+    Windows 10 requires users to give permission for total snooping</a>,
+    including their files, their commands, their text input, and their
+    voice input.</p>
+  </li>
 
-<h3 id="drm">Microsoft DRM</h3>
-<ul>
-  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
-  DRM (digital restrictions mechanisms) in Windows</a>, introduced to
-  cater to <a href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
-  (The article also talks about how the same malware would later be introduced
-  in MacOS.)</p></li>
-</ul>
+  <li id="M201405140">
+    <p><a
+    
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data</a>.</p>
+  </li>
 
-<h3 id="jails">Microsoft Jails</h3>
-<ul>
-  <li>
-    <p>Windows 10 S was a jail: <a
-      
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
-      only programs from the Windows Store could be installed and
-      executed</a>. It was however possible to <a
-      
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
-      upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a
-      special configuration of Windows 10 called <a
-      
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
-      S mode</a>. The major difference with Windows 10 S is that there
-      is an easy way to switch out of S mode.</p></li>
+  <li id="M201307110">
+    <p>Skype contains <a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
+    Microsoft changed Skype <a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+    specifically for spying</a>.</p>
+  </li>
 
-  <li>
-    <p><a 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
-      Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
-      jail</a>.</p></li>
+  <li id="M201307080">
+    <p>Spyware in older versions of Windows: <a
+    href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+    Windows Update snoops on the user</a>. <a
+    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    Windows 8.1 snoops on local searches</a>. And there's a <a
+    href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
+    key in Windows</a>, whose functions we don't know.</p>
+  </li>
 </ul>
 
+
 <h3 id="tyrants">Microsoft Tyrants</h3>
-<ul>
-<li>
-<p>Microsoft accidentally left a way for users to install GNU/Linux
-on Windows RT tablets, but now it has <a
-href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
-    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the
-gall to call this &ldquo;protecting&rdquo; the users.  The article
-talks of installing &ldquo;Linux&rdquo;, but the context shows it is
-really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
-install.
-</p>
-</li>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>: they block
-  users from installing other or modified operating systems.</p></li>
-</ul>
 
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<ul class="blurbs">
+<!-- INSERT tyrants -->
+  <li id="M201607150">
+    <p>Microsoft accidentally left a way for users
+    to install GNU/Linux on Windows RT tablets, but now it has <a
+    
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall
+    to call this &ldquo;protecting&rdquo; the users.  The article talks
+    of installing &ldquo;Linux&rdquo;, but the context shows it is really
+    <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users install.</p>
+  </li>
 
-<ul>
-<li><p>Microsoft Office forces
-      users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
-      subscribe to Office 365 to be able to create/edit
-      documents</a>.</p>
-</li>
+  <li id="M201110110">
+    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    Mobile devices that come with Windows 8 are tyrants</a>.</p>
+  </li>
 </ul>
 
+
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
 
@@ -511,7 +605,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/25 01:44:51 $
+$Date: 2018/10/05 11:26:55 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]