www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec adobe-stub.h...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec adobe-stub.h...
Date: Sun, 7 Oct 2018 18:12:36 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/07 18:12:35

Modified files:
        server/staging/proprietary/rec: adobe-stub.html amazon-stub.html 
                                        apple-stub.html 
                                        appliances-stub.html 
                                        back-doors-stub.html 
                                        cars-stub.html 
                                        censorship-stub.html 
                                        coverups-stub.html 
                                        deception-stub.html 
                                        drm-stub.html games-stub.html 
                                        google-stub.html 
                                        incompatibility-stub.html 
                                        insecurity-stub.html 
                                        interference-stub.html 
                                        jails-stub.html 
                                        microsoft-stub.html 
                                        mobiles-stub.html 
                                        potential-stub.html 
                                        sabotage-stub.html 
                                        subscriptions-stub.html 
                                        surveillance-stub.html 
                                        tethers-stub.html 
                                        tyrants-stub.html 

Log message:
        Update keywords; fix and restyle intro.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/adobe-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/amazon-stub.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/apple-stub.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/appliances-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/back-doors-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/cars-stub.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/censorship-stub.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/coverups-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/deception-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/drm-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/games-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/google-stub.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/incompatibility-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/insecurity-stub.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/interference-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/jails-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/microsoft-stub.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/mobiles-stub.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/potential-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/sabotage-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/subscriptions-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/surveillance-stub.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/tethers-stub.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/tyrants-stub.html?cvsroot=www&r1=1.2&r2=1.3

Patches:
Index: adobe-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/adobe-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- adobe-stub.html     19 Sep 2018 20:56:38 -0000      1.2
+++ adobe-stub.html     7 Oct 2018 22:12:35 -0000       1.3
@@ -14,7 +14,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -32,12 +32,15 @@
 any malicious functionalities tempts the developer to impose some.
 </p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT adobe.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -97,7 +100,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:38 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: amazon-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/amazon-stub.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- amazon-stub.html    30 Sep 2018 21:33:08 -0000      1.6
+++ amazon-stub.html    7 Oct 2018 22:12:35 -0000       1.7
@@ -8,23 +8,12 @@
 <title>Amazon's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-amazon.translist" -->
-<style type="text/css" media="print,screen"><!--
-div.toc { width: 100%; padding: 1.3em 3%; }
-div.toc h3 { display: inline; margin: 0 1.5%; }
-div.toc ul { display: inline; margin: 0; }
-div.toc li {
-   display: inline;
-   list-style: none;
-   font-size: 1.3em;
-   margin: 0 1.5%;
-}
---></style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Amazon's Software Is Malware</h2>
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 Malware and nonfree software are two different issues.  Malware means
 the program is designed to mistreat or harm users when it runs.  The
@@ -37,21 +26,22 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 </p>
+
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
-
-<div class="toc c">
-  <h3>Type&nbsp;of product:</h3>
-  <ul>
-    <li><a href="#swindle">Kindle&nbsp;Swindle</a></li>
-    <li><a href="#echo">Echo</a></li>
-  </ul>
 </div>
 
+<p class="c" style="font-size: 1.2em">
+&nbsp;<a href="#swindle">Kindle&nbsp;Swindle</a>&nbsp;
+&nbsp;<a href="#echo">Echo</a>&nbsp;
+&nbsp;<a href="#misc">Other&nbsp;products</a>&nbsp;
+</p>
+
 <h3 id="swindle">Malware in the Kindle Swindle</h3>
 
 <p>We refer to this product as the
@@ -60,23 +50,28 @@
 management (DRM)</a>  and <a href="/philosophy/ebooks.html">
 other malicious functionalities</a>.</p>
 
-<h4 id="back-doors">Amazon Kindle Swindle Back Doors</h4>
-<!-- INSERT swindle-backdoor.list -->
+<h4 id="back-doors">Back Doors</h4>
+<!-- INSERT swindle-back-door.list -->
 
-<h4 id="surveillance">Amazon Kindle Swindle Surveillance</h4>
+<h4 id="surveillance">Surveillance</h4>
 <!-- INSERT swindle-surv.list -->
 
-<h4 id="drm">Amazon Kindle Swindle DRM</h4>
-<!-- INSERT swindle-drm.list -->
+<h4 id="drm">DRM</h4>
+<!-- INSERT swindle-dr.list -->
+
 
 <h3 id="echo">Malware in the Echo</h3>
 
-<h4>Amazon Echo Back Doors</h4>
-<!-- INSERT echo-backdoor.list -->
+<h4>Back Doors</h4>
+<!-- INSERT echo-back-door.list -->
 
-<h4>Amazon Echo Surveillance</h4>
+<h4>Surveillance</h4>
 <!-- INSERT echo-surv.list -->
 
+
+<h3 id="misc"> Malware in other products</h3>
+<!-- INSERT amazon-misc.list -->
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -134,7 +129,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/30 21:33:08 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: apple-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/apple-stub.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- apple-stub.html     5 Oct 2018 21:13:46 -0000       1.8
+++ apple-stub.html     7 Oct 2018 22:12:35 -0000       1.9
@@ -13,7 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -32,14 +32,17 @@
 because the developer's awareness that the users would be powerless to fix
 any malicious functionalities tempts the developer to impose some.
 </p>
+
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Type&nbsp;of malware</h3>
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
@@ -63,7 +66,7 @@
 </div>
 
 <h3 id="back-doors">Apple Back Doors</h3>
-<!-- INSERT backdoor.list -->
+<!-- INSERT apple-back-door.list -->
 
 <h3 id="censorship">Apple Censorship</h3>
 
@@ -72,10 +75,10 @@
 section for more information.</p>
 
 <h3 id="deception">Apple Deception</h3>
-<!-- INSERT deception.list -->
+<!-- INSERT apple-decept.list -->
 
 <h3 id="drm">Apple DRM</h3>
-<!-- INSERT DRM.list -->
+<!-- INSERT apple-dr.list -->
 
 <h3 id="incompatibility">Apple Incompatibility</h3>
 
@@ -83,7 +86,7 @@
 hinder users from switching to any alternative program&mdash;and, in
 particular, from switching to free software which can liberate the device
 the software runs on.</p>
-<!-- INSERT incompatibility.list -->
+<!-- INSERT apple-incompat.list -->
 
 <h3 id="insecurity">Apple Insecurity</h3>
 
@@ -120,24 +123,24 @@
 big enough to mean that the iThings are no longer jails.</p>
 
 <h4>Examples of censorship by Apple jails</h4>
-<!-- INSERT jails.list -->
+<!-- INSERT apple-jail.list -->
 
 <h3 id="pressuring">Apple Pressuring</h3>
 
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
-<!-- INSERT pressuring.list -->
+<!-- INSERT apple-press.list -->
 
 <h3 id="sabotage">Apple Sabotage</h3>
 
 <p>These are situations in which Apple employs its power over users
 to directly intervene in ways that harm them or block their work.</p>
-<!-- INSERT sabotage.list -->
+<!-- INSERT apple-sab.list -->
 
 <h3 id="surveillance">Apple Surveillance</h3>
 <!-- INSERT apple-surv.list -->
 
 <h3 id="tyrants">Apple Tyrants</h3>
-<!-- INSERT tyrants.list -->
+<!-- INSERT apple-tyrant.list -->
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -196,7 +199,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 21:13:46 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: appliances-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/appliances-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- appliances-stub.html        19 Sep 2018 20:56:39 -0000      1.2
+++ appliances-stub.html        7 Oct 2018 22:12:35 -0000       1.3
@@ -14,7 +14,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -31,14 +31,18 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 </p>
+
+<p>Some examples of malware in appliances are listed below.</p>
+
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
-
-<p>Here are examples of malware in appliances.</p>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT appliances.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -98,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:39 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: back-doors-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/back-doors-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- back-doors-stub.html        19 Sep 2018 20:56:40 -0000      1.2
+++ back-doors-stub.html        7 Oct 2018 22:12:35 -0000       1.3
@@ -12,6 +12,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -24,18 +25,21 @@
 that allow full control over the operating system are said to be
 &ldquo;universal&rdquo;.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
 
-<p class="c">
-   <a href="#spy">Spying</a> |
-   <a href="#alter-data">Altering&nbsp;user's&nbsp;data/settings</a> |
-   <a href="#install-delete">Installing/deleting&nbsp;programs</a> |
-   <a href="#universal">Full&nbsp;control</a> |
-   <a href="#other">Other/undefined</a>
+<p class="c" style="font-size: 1.1em">
+&nbsp;<a href="#spy">Spying</a>&nbsp;
+&nbsp;<a href="#alter-data">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp;
+&nbsp;<a href="#install-delete">Installing/deleting&nbsp;programs</a>&nbsp;
+&nbsp;<a href="#universal">Full&nbsp;control</a>&nbsp;
+&nbsp;<a href="#other">Other/undefined</a>&nbsp;
 </p>
 
 
@@ -98,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: cars-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/cars-stub.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- cars-stub.html      19 Sep 2018 20:56:40 -0000      1.3
+++ cars-stub.html      7 Oct 2018 22:12:35 -0000       1.4
@@ -11,17 +11,38 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware In Cars</h2>
 
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues.  The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>.  It's
+not directly a question of what the program <em>does</em> when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some examples of malware in cars are listed below.</p>
+
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
-
-<p>Here are examples of malware in cars.</p>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT cars.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -81,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: censorship-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/censorship-stub.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- censorship-stub.html        19 Sep 2018 20:56:40 -0000      1.3
+++ censorship-stub.html        7 Oct 2018 22:12:35 -0000       1.4
@@ -10,6 +10,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Censorship</h2>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -27,23 +28,32 @@
 company to impose censorship ought to be forbidden by law, but it
 isn't.</p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+
+<p class="c" style="font-size: 1.1em">
+&nbsp;<a href="#apple">Apple</a>&nbsp;
+&nbsp;<a href="#google">Google</a>&nbsp;
+&nbsp;<a href="#consoles">Game&nbsp;consoles</a>&nbsp;
+</p>
 
-<h3>Apple</h3>
+<h3 id="apple">Apple</h3>
 
 <p>Apple mainly uses iOS, which is a typical jail, to impose censorship
 through the Apple Store. Please refer to <a
 href="/proprietary/proprietary-jails.html#apple">Proprietary Jails</a>
 for more information.</p>
 
-<h3>Google</h3>
+<h3 id="google">Google</h3>
 <!-- INSERT google.list -->
 
-<h3>Game consoles</h3>
+<h3 id="consoles">Game consoles</h3>
 <!-- INSERT consoles.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -103,7 +113,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: coverups-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/coverups-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- coverups-stub.html  19 Sep 2018 20:56:40 -0000      1.2
+++ coverups-stub.html  7 Oct 2018 22:12:35 -0000       1.3
@@ -13,6 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -24,11 +25,15 @@
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT coverups.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -88,7 +93,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: deception-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/deception-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- deception-stub.html 19 Sep 2018 20:56:40 -0000      1.2
+++ deception-stub.html 7 Oct 2018 22:12:35 -0000       1.3
@@ -13,6 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -23,11 +24,15 @@
 <p>This document reports instances where proprietary software is
   dishonest or conceals deception or trickery.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT deception.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -87,7 +92,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: drm-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/drm-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- drm-stub.html       19 Sep 2018 20:56:40 -0000      1.2
+++ drm-stub.html       7 Oct 2018 22:12:35 -0000       1.3
@@ -12,6 +12,7 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -32,6 +33,16 @@
 Please support our campaign
 to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
 </p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT drm.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -91,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: games-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/games-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- games-stub.html     19 Sep 2018 20:56:40 -0000      1.2
+++ games-stub.html     7 Oct 2018 22:12:35 -0000       1.3
@@ -14,7 +14,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -31,14 +31,18 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 </p>
+
+<p>Some examples of malware in games are listed below.</p>
+
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
-
-<p>Here are examples of malware in games.</p>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT games.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -98,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: google-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/google-stub.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- google-stub.html    5 Oct 2018 18:13:46 -0000       1.8
+++ google-stub.html    7 Oct 2018 22:12:35 -0000       1.9
@@ -15,7 +15,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -33,14 +33,16 @@
 any malicious functionalities tempts the developer to impose some.
 </p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3><strong>Type&nbsp;of malware</strong></h3>
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
@@ -61,13 +63,13 @@
 </div>
 
 <h3 id="back-doors">Google Back Doors</h3>
-<!-- INSERT backdoor.list -->
+<!-- INSERT google-back-door.list -->
 
 <h3 id="censorship">Google Censorship</h3>
-<!-- INSERT censorship.list -->
+<!-- INSERT google-censor.list -->
 
 <h3 id="drm">Google DRM</h3>
-<!-- INSERT DRM.list -->
+<!-- INSERT google-dr.list -->
 
 <h3 id="insecurity">Google Insecurity</h3>
 
@@ -83,13 +85,13 @@
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Google
 actions that harm the users of specific Google software.</p>
-<!-- INSERT sabotage.list -->
+<!-- INSERT google-sab.list -->
 
 <h3 id="surveillance">Google Surveillance</h3>
 <!-- INSERT google-surv.list -->
 
 <h3 id="tyrants">Google Tyrants</h3>
-<!-- INSERT tyrants.list -->
+<!-- INSERT google-tyrant.list -->
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -148,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 18:13:46 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: incompatibility-stub.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/rec/incompatibility-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- incompatibility-stub.html   19 Sep 2018 20:56:40 -0000      1.2
+++ incompatibility-stub.html   7 Oct 2018 22:12:35 -0000       1.3
@@ -13,6 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>The &ldquo;incompatibility&rdquo; category includes the use of secret
 formats or protocols in proprietary software. This directly blocks or
 hinders users from switching to any alternative program&mdash;and, in
@@ -29,11 +30,15 @@
 other system so cumbersome or so slow that it isn't doable for more than
 a small amount of data.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT incompatibility.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -93,7 +98,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: insecurity-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/insecurity-stub.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- insecurity-stub.html        5 Oct 2018 18:13:14 -0000       1.4
+++ insecurity-stub.html        7 Oct 2018 22:12:35 -0000       1.5
@@ -35,23 +35,20 @@
 introduce them deliberately.  In any case, they keep users
 <em>helpless to fix any security problems that arise</em>.  Keeping the
 users helpless is what's culpable about proprietary software.</p>
-</div>
 
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
 
-<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
-and applications</a> are intrinsically insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+here, please write to <a 
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT insecurity.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -111,7 +108,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 18:13:14 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: interference-stub.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/rec/interference-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- interference-stub.html      19 Sep 2018 20:56:40 -0000      1.2
+++ interference-stub.html      7 Oct 2018 22:12:35 -0000       1.3
@@ -10,6 +10,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Interference</h2>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -24,10 +25,15 @@
 wrong.
 </p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
-here, please write to <a 
href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+here, please write to <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT interference.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -87,7 +93,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: jails-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/jails-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- jails-stub.html     19 Sep 2018 20:56:40 -0000      1.2
+++ jails-stub.html     7 Oct 2018 22:12:35 -0000       1.3
@@ -12,6 +12,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -27,19 +28,22 @@
 <!-- embed http://i.imgur.com/ZRViDum.jpg here -->
 <!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
 
-<p>We also include specific examples of apps that were blocked using
-that censorship power.  If you know of additional examples, please
-email the specifics to webmasters@ our domain.</p>
-
 <p>These systems are platforms for censorship imposed by the company
 that owns the system.  Selling products designed as platforms for a
 company to impose censorship ought to be forbidden by law, but it
 isn't.</p>
 
+<div class="important">
+<p>We also include specific examples of apps that were blocked using
+that censorship power.  If you know of additional examples, please
+email the specifics to webmasters@ our domain.</p>
+</div>
+</div>
+
 <p class="c">
-   <a href="#apple">Apple&nbsp;jails</a> |
-   <a href="#microsoft">Microsoft&nbsp;jails</a> |
-   <a href="#consoles">Game consoles</a>
+&nbsp;<a href="#apple">Apple&nbsp;jails</a>&nbsp;
+&nbsp;<a href="#microsoft">Microsoft&nbsp;jails</a>&nbsp;
+&nbsp;<a href="#consoles">Game consoles</a>&nbsp;
 </p>
 
 <h3 id="apple">Apple jails</h3>
@@ -132,7 +136,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: microsoft-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/microsoft-stub.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- microsoft-stub.html 5 Oct 2018 18:10:56 -0000       1.7
+++ microsoft-stub.html 7 Oct 2018 22:12:35 -0000       1.8
@@ -15,7 +15,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -34,14 +34,16 @@
 any malicious functionalities tempts the developer to impose some.
 </p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Type&nbsp;of malware</h3>
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
@@ -63,10 +65,10 @@
 </div>
 
 <h3 id="back-doors">Microsoft Back Doors</h3>
-<!-- INSERT backdoor.list -->
+<!-- INSERT microsoft-back-door.list -->
 
 <h3 id="drm">Microsoft DRM</h3>
-<!-- INSERT DRM.list -->
+<!-- INSERT microsoft-dr.list -->
 
 <h3 id="insecurity">Microsoft Insecurity</h3>
 
@@ -74,7 +76,7 @@
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.</p>
-<!-- INSERT insecurity.list -->
+<!-- INSERT microsoft-insec.list -->
 
 <h3 id="interference">Microsoft Interference</h3>
 
@@ -82,10 +84,7 @@
 are like sabotage, but they are not grave enough to qualify for the word
 &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This
 section describes examples of Microsoft committing interference.</p>
-<!-- INSERT interference.list -->
-
-<h3 id="jails">Microsoft Jails</h3>
-<!-- INSERT jails.list -->
+<!-- INSERT microsoft-interf.list -->
 
 <h3 id="sabotage">Microsoft Sabotage</h3>
 
@@ -93,16 +92,19 @@
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Microsoft
 actions that harm the users of specific Microsoft software.</p>
-<!-- INSERT sabotage.list -->
+<!-- INSERT microsoft-sab.list -->
 
 <h3 id="subscriptions">Microsoft Subscriptions</h3>
-<!-- INSERT subscriptions.list -->
+<!-- INSERT microsoft-subscript.list -->
 
 <h3 id="surveillance">Microsoft Surveillance</h3>
 <!-- INSERT microsoft-surv.list -->
 
+<h3 id="jails">Microsoft Jails</h3>
+<!-- INSERT microsoft-jail.list -->
+
 <h3 id="tyrants">Microsoft Tyrants</h3>
-<!-- INSERT tyrants.list -->
+<!-- INSERT microsoft-tyrant.list -->
 
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
@@ -164,7 +166,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 18:10:56 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: mobiles-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/mobiles-stub.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- mobiles-stub.html   5 Oct 2018 18:10:56 -0000       1.7
+++ mobiles-stub.html   7 Oct 2018 22:12:35 -0000       1.8
@@ -40,21 +40,24 @@
 <p>Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
 is why we call them &ldquo;Stalin's dream&rdquo;.</p>
-</div>
 
 <p>The malware we list here is present in every phone, or in software
-that is not made by Apple or Google (including its subsidiaries, for
-instance Motorola between 2011 and 2014). Malware that these companies
-are (or were) directly responsible for is listed in dedicated pages: <a
+that is not made by Apple or Google (including its subsidiaries).
+Malicious functionalities in mobile software released by Apple or
+Google are listed in dedicated pages, <a
 href="/proprietary/malware-apple.html">Apple's Operating Systems are
-Malware</a>, and <a href="/proprietary/malware-google.html">Google's
-Software Is Malware</a>.</p>
+Malware</a> and <a href="/proprietary/malware-google.html">Google's
+Software Is Malware</a> respectively.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 
 <ul class="blurbs">
   <li><p>The phone network
@@ -93,10 +96,6 @@
   </li>
 </ul>
 
-<p>Here are examples of malware in mobile devices.  See also
-the <a href="/proprietary/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple iThings.</p>
-
 <div class="summary" style="margin-top: 1em">
 <h3>Type&nbsp;of malware</h3>
 <ul>
@@ -107,10 +106,10 @@
     to restrict what users can do with the data in their computers.</li>
   <li><a href="#insecurity">Insecurity</a></li>
 <!--<li><a href="#interference">Interference</a></li>-->
-  <li><a href="#jails">Jails</a>&mdash;systems
-    that impose censorship on application programs.</li>
 <!--<li><a href="#sabotage">Sabotage</a></li>-->
   <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>
   <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
@@ -126,10 +125,10 @@
       them into full-time listening devices.</p>
   </li>
 </ul>
-<!-- INSERT backdoor.list -->
+<!-- INSERT mobiles-back-door.list -->
 
 <h3 id="drm">Mobile DRM</h3>
-<!-- INSERT DRM.list -->
+<!-- INSERT mobiles-dr.list -->
 
 <h3 id="insecurity">Mobile Insecurity</h3>
 
@@ -139,14 +138,14 @@
   bugs.</p>
 <!-- INSERT mobiles-insec.list -->
 
-<h3 id="jails">Mobile Jails</h3>
-<!-- INSERT jails.list -->
-
 <h3 id="surveillance">Mobile Surveillance</h3>
 <!-- INSERT mobiles-surv.list -->
 
+<h3 id="jails">Mobile Jails</h3>
+<!-- INSERT mobiles-jail.list -->
+
 <h3 id="tyrants">Mobile Tyrants</h3>
-<!-- INSERT tyrants.list -->
+<!-- INSERT mobiles-tyrant.list -->
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -205,7 +204,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 18:10:56 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: potential-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/potential-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- potential-stub.html 19 Sep 2018 20:56:40 -0000      1.2
+++ potential-stub.html 7 Oct 2018 22:12:35 -0000       1.3
@@ -14,11 +14,12 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
   <p>This page describes malicious techniques that proprietary
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
 </div>
+<div class="column-limit"></div>
 <!-- INSERT potential.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -78,7 +79,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: sabotage-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/sabotage-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- sabotage-stub.html  19 Sep 2018 20:56:40 -0000      1.2
+++ sabotage-stub.html  7 Oct 2018 22:12:35 -0000       1.3
@@ -12,6 +12,7 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -19,14 +20,18 @@
 basic injustice</a>. The developers often exercise that power to the
 detriment of the users they ought to serve.</p>
 
+<p>Here are examples of proprietary software that has something worse
+than a back door.</p>
+
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
-
-<p>Here are examples of proprietary software that has something
-worse than a back door.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT sabotage.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -86,7 +91,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: subscriptions-stub.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/rec/subscriptions-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- subscriptions-stub.html     19 Sep 2018 20:56:40 -0000      1.2
+++ subscriptions-stub.html     7 Oct 2018 22:12:35 -0000       1.3
@@ -13,6 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -27,11 +28,15 @@
 server</a>, and that server checks the date.  Either one is a
 malicious functionality.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT subscriptions.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -91,7 +96,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: surveillance-stub.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/rec/surveillance-stub.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- surveillance-stub.html      5 Oct 2018 18:13:14 -0000       1.9
+++ surveillance-stub.html      7 Oct 2018 22:12:35 -0000       1.10
@@ -37,7 +37,6 @@
 href="/philosophy/free-software-even-more-important.html">that is the
 basic injustice</a>. The developers often exercise that power to the
 detriment of the users they ought to serve.</p>
-</div>
 
 <p>This document attempts to
 track <strong>clearly established cases of proprietary software that
@@ -48,11 +47,14 @@
 page: <a href="/proprietary/proprietary-tethers.html">Proprietary
 Tethers</a>.</p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
-here, please write to <a
-href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+here, please write
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
 
 <div id="surveillance">
 
@@ -416,7 +418,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 18:13:14 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: tethers-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/tethers-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- tethers-stub.html   19 Sep 2018 20:56:40 -0000      1.2
+++ tethers-stub.html   7 Oct 2018 22:12:35 -0000       1.3
@@ -13,6 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -24,11 +25,15 @@
 in itself.  This page reports instances where tethering was used to
 harm the users directly.</p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT tethers.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -88,7 +93,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: tyrants-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/tyrants-stub.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- tyrants-stub.html   19 Sep 2018 20:56:40 -0000      1.2
+++ tyrants-stub.html   7 Oct 2018 22:12:35 -0000       1.3
@@ -12,6 +12,7 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<div class="comment">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
@@ -26,11 +27,15 @@
 refer to this practice as <em>tivoization</em>.
 </p>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
 <!-- INSERT tyrants.list -->
 
 </div><!-- for id="content", starts in the include above -->
@@ -90,7 +95,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/19 20:56:40 $
+$Date: 2018/10/07 22:12:35 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]