www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec surveillance...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec surveillance...
Date: Fri, 5 Oct 2018 14:13:15 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/05 14:13:15

Modified files:
        server/staging/proprietary/rec: surveillance-stub.html 
                                        insecurity-stub.html 

Log message:
        Add a paragraph about tethers.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/surveillance-stub.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/insecurity-stub.html?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: surveillance-stub.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/rec/surveillance-stub.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- surveillance-stub.html      30 Sep 2018 21:34:47 -0000      1.8
+++ surveillance-stub.html      5 Oct 2018 18:13:14 -0000       1.9
@@ -7,13 +7,13 @@
 }
 #surveillance div.toc {
    width: 24.5em; max-width: 94%;
-   margin-bottom: 1em;
+   margin: 1em 0;
 }
 @media (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
-      margin: .2em 0 1em;
+      margin: 1.2em 0 1em;
    }
    #surveillance .medium {
       width: 43%;
@@ -27,27 +27,32 @@
 
 <h2>Proprietary Surveillance</h2>
 
+<p><a href="/proprietary/proprietary.html">
+   Other examples of proprietary malware</a></p>
+
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
 href="/philosophy/free-software-even-more-important.html">that is the
 basic injustice</a>. The developers often exercise that power to the
 detriment of the users they ought to serve.</p>
+</div>
 
-<div  class="announcement">
 <p>This document attempts to
 track <strong>clearly established cases of proprietary software that
 spies on or tracks users</strong>.</p>
 
-<p><a href="/proprietary/proprietary.html">
-   Other examples of proprietary malware</a></p>
+<p>The tethered appliances and applications are by nature doing
+surveillance. We are not listing them here because they have their own 
+page: <a href="/proprietary/proprietary-tethers.html">Proprietary
+Tethers</a>.</p>
 
 <p>If you know of an example that ought to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+here, please write to <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
-</div>
 
 <div id="surveillance">
 
@@ -411,7 +416,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/30 21:34:47 $
+$Date: 2018/10/05 18:13:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: insecurity-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/insecurity-stub.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- insecurity-stub.html        24 Sep 2018 21:04:41 -0000      1.3
+++ insecurity-stub.html        5 Oct 2018 18:13:14 -0000       1.4
@@ -13,6 +13,7 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -20,10 +21,6 @@
 basic injustice</a>. The developers often exercise that power to the
 detriment of the users they ought to serve.</p>
 
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
-
 <p>It is incorrect to compare free software with a fictitious idea of
 proprietary software as perfect, but the press often implicitly does
 that whenever a security hole in a free program is discovered.  The
@@ -38,6 +35,17 @@
 introduce them deliberately.  In any case, they keep users
 <em>helpless to fix any security problems that arise</em>.  Keeping the
 users helpless is what's culpable about proprietary software.</p>
+</div>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p>
+
+<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
+and applications</a> are intrinsically insecure because there is always
+a chance that the server will go offline accidentally, making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition to the fact that they are tethered.</p>
 
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
@@ -103,7 +111,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/24 21:04:41 $
+$Date: 2018/10/05 18:13:14 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]