[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary/rec surveillance...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary/rec surveillance... |
Date: |
Fri, 5 Oct 2018 14:13:15 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/05 14:13:15
Modified files:
server/staging/proprietary/rec: surveillance-stub.html
insecurity-stub.html
Log message:
Add a paragraph about tethers.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/surveillance-stub.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/insecurity-stub.html?cvsroot=www&r1=1.3&r2=1.4
Patches:
Index: surveillance-stub.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/rec/surveillance-stub.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- surveillance-stub.html 30 Sep 2018 21:34:47 -0000 1.8
+++ surveillance-stub.html 5 Oct 2018 18:13:14 -0000 1.9
@@ -7,13 +7,13 @@
}
#surveillance div.toc {
width: 24.5em; max-width: 94%;
- margin-bottom: 1em;
+ margin: 1em 0;
}
@media (min-width: 48em) {
#surveillance div.toc {
float: left;
width: auto; max-width: 48%;
- margin: .2em 0 1em;
+ margin: 1.2em 0 1em;
}
#surveillance .medium {
width: 43%;
@@ -27,27 +27,32 @@
<h2>Proprietary Surveillance</h2>
+<p><a href="/proprietary/proprietary.html">
+ Other examples of proprietary malware</a></p>
+
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
href="/philosophy/free-software-even-more-important.html">that is the
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
+</div>
-<div class="announcement">
<p>This document attempts to
track <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>.</p>
-<p><a href="/proprietary/proprietary.html">
- Other examples of proprietary malware</a></p>
+<p>The tethered appliances and applications are by nature doing
+surveillance. We are not listing them here because they have their own
+page: <a href="/proprietary/proprietary-tethers.html">Proprietary
+Tethers</a>.</p>
<p>If you know of an example that ought to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
+here, please write to <a
+href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
-</div>
<div id="surveillance">
@@ -411,7 +416,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/30 21:34:47 $
+$Date: 2018/10/05 18:13:14 $
<!-- timestamp end -->
</p>
</div>
Index: insecurity-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/insecurity-stub.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- insecurity-stub.html 24 Sep 2018 21:04:41 -0000 1.3
+++ insecurity-stub.html 5 Oct 2018 18:13:14 -0000 1.4
@@ -13,6 +13,7 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -20,10 +21,6 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
-
<p>It is incorrect to compare free software with a fictitious idea of
proprietary software as perfect, but the press often implicitly does
that whenever a security hole in a free program is discovered. The
@@ -38,6 +35,17 @@
introduce them deliberately. In any case, they keep users
<em>helpless to fix any security problems that arise</em>. Keeping the
users helpless is what's culpable about proprietary software.</p>
+</div>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p>
+
+<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
+and applications</a> are intrinsically insecure because there is always
+a chance that the server will go offline accidentally, making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition to the fact that they are tethered.</p>
<p>If you know of an example that ought to be in this page but isn't
here, please write
@@ -103,7 +111,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/24 21:04:41 $
+$Date: 2018/10/05 18:13:14 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/server/staging/proprietary/rec surveillance...,
Therese Godefroy <=