[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy malware-apple.html malware-kindl...
From: |
Dora Scilipoti |
Subject: |
www/philosophy malware-apple.html malware-kindl... |
Date: |
Wed, 04 Jun 2014 06:46:40 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 14/06/04 06:46:40
Removed files:
philosophy : malware-apple.html malware-kindle-swindle.html
malware-microsoft.html malware-mobiles.html
proprietary.html proprietary-back-doors.html
proprietary-drm.html
proprietary-insecurity.html
proprietary-jails.html
proprietary-sabotage.html
proprietary-surveillance.html
proprietary-tyrants.html
Log message:
Remove files moved to /philosophy/proprietary/ (RT# 914790).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-apple.html?cvsroot=www&r1=1.9&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-kindle-swindle.html?cvsroot=www&r1=1.6&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-microsoft.html?cvsroot=www&r1=1.14&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-mobiles.html?cvsroot=www&r1=1.5&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary.html?cvsroot=www&r1=1.21&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-back-doors.html?cvsroot=www&r1=1.19&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-drm.html?cvsroot=www&r1=1.9&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.html?cvsroot=www&r1=1.27&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-jails.html?cvsroot=www&r1=1.12&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-sabotage.html?cvsroot=www&r1=1.21&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-surveillance.html?cvsroot=www&r1=1.31&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-tyrants.html?cvsroot=www&r1=1.8&r2=0
Patches:
Index: malware-apple.html
===================================================================
RCS file: malware-apple.html
diff -N malware-apple.html
--- malware-apple.html 30 May 2014 06:49:30 -0000 1.9
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,152 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Apple's Operating Systems are Malware
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-apple.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Apple's Operating Systems Are Malware</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user. (This does not include accidental errors.)
-This page explains how the software in Apple's computer products are
-malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues. The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>. It's
-not directly a question of what the program <em>does</em> when it
-runs. However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
-
-<p>Here's how Apple's systems are malware.</p>
-
-<ul>
- <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
- iOS, the operating system of the Apple iThings, is a jail for
- users.</a> That means it imposes censorship of application programs.</p>
-
- <p>Apple has used this power
- to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a> for the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of general purpose
- computers that are jails, and the term comes from iThing users, who
- referred to escaping from the censorship as
- “jailbreaking.”</p>
-
- <p>Here is an article about the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to jail the user.</p></li>
-
- <li><p>The iThings are tyrant devices: they do not permit
- installing a different or modified operating system. There is a
- port of Android to the iThings, but installing it
- requires <a href="http://www.idroidproject.org/wiki/Status">
- finding a bug or “exploit”</a> to make it possible to
- install a different system.</p></li>
-
- <li><p><a
-
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article focuses on
the fact that a new model of
- Macbook introduced a requirement for monitors to have malicious
- hardware, but DRM software in MacOS is involved in activating the
- hardware. The software for accessing iTunes is also responsible.</p></li>
-
- <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p></li>
-
- <li><p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have this power
- because of course we can trust Apple.</p></li>
-
- <li><p><a
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones">
- An Apple firmware “upgrade” bricked iPhones that had been
- unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a href="/philosophy/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p></li>
-
- <li><p>
- Apple can, and regularly
- does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">remotely
- extract some data from iPhones for the state</a>.
- </p></li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:30 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: malware-kindle-swindle.html
===================================================================
RCS file: malware-kindle-swindle.html
diff -N malware-kindle-swindle.html
--- malware-kindle-swindle.html 30 May 2014 06:49:31 -0000 1.6
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,111 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Malware in the Kindle Swindle
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-kindle-swindle.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Malware in the Kindle Swindle</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>We refer to this product as the
-<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
-management (DRM)</a> and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.</p>
-
-<p>
-Malware and nonfree software are two different issues. Malware means
-the program is designed to mistreat or harm users when it runs. The
-difference between <a href="/philosophy/free-sw.html">free
-software</a> and nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>. It's
-not directly a question of what the program <em>does</em> when it
-runs. However, in practice nonfree software is often malware, because
-the developer's awareness that the users would be powerless to fix any
-malicious functionalities tempts the developer to impose some.
-</p>
-
-<ul>
- <li><p>The Amazon Kindle has a back door that has been used to <a
-
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>.</p></li>
-
- <li><p><a href="http://science.opposingviews.com/kindle-drm-17841.html">
- The Amazon Kindle has DRM</a>. That article is flawed in that it
- fails to treat DRM as an ethical question; it takes for granted that
- whatever Amazon might do to its users is legitimate. It refers to DRM
- as digital “rights” management, which is the spin term
- used to promote DRM. Nonetheless it serves as a reference for the
- facts.</p></li>
-
- <li><p>The Electronic Frontier Foundation has examined and found <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012">various kinds of
- surveillance in the Swindle and other e-readers</a>.</p></li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:31 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: malware-microsoft.html
===================================================================
RCS file: malware-microsoft.html
diff -N malware-microsoft.html
--- malware-microsoft.html 30 May 2014 12:05:50 -0000 1.14
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,162 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Microsoft's Software Is Malware
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-microsoft.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Microsoft's Software is Malware</h2>
-
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
-malware</a></p>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user. (This does not include accidental errors.)
-This page explains how Microsoft software is malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues. The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>. It's
-not directly a question of what the program <em>does</em> when it
-runs. However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
-
-<ul>
- <li><p>Microsoft Windows has a universal back door through which <a
-
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
- any change whatsoever can be imposed on the users</a>.</p>
-
- <p>More information on when <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- this was used</a>.</p></li>
-
- <li><p><a
-
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps">
- Windows 8 also has a back door for remotely deleting apps</a>.</p>
-
- <p>You might well decide to let a security service that you trust
- remotely <em>deactivate</em> programs that it considers malicious.
- But there is no excuse for <em>deleting</em> the programs, and you
- should have the right to decide who (if anyone) to trust in this
way.</p></li>
-
- <li><p>Windows 8's back doors are so gaping that <a
-
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
- the German government has decided it can't be trusted</a>.</p></li>
-
- <li><p><a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail</a>: it censors the
- user's choice of application programs.</p></li>
-
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>: they block
- users from installing other or modified operating systems.</p></li>
-
- <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM (digital restrictions mechanisms) in Windows</a>, introduced to
- cater to <a href="/philosophy/proprietary-drm.html#bluray">Bluray</a> disks.
- (The article also talks about how the same malware would later be introduced
- in MacOS.)</p></li>
-
- <li>Spyware in Windows: <a
- href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
- Windows Update snoops on the user.</a>
- <a
-
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
- Windows 8.1 snoops on local searches.</a> And there's a
- <a href="http://www.marketoracle.co.uk/Article40836.html">
- secret NSA key in Windows</a>, whose functions we don't know.</li>
-
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
- Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
- <li><p>
- <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
- </li>
-
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
- Microsoft cut off security fixes for Windows XP, except to some big users
- that pay exorbitantly.</a></p>
-
- <p>I think a person or company has the right to cease to work on a
- particular program; the wrong here is Microsoft does this after having
- made the users dependent on Microsoft, so they are not free to ask
- someone else to work on the program for them.</p></li>
-</ul>
-
-<p>As this page shows, if you do want to clean your computer of malware,
-the first software to delete is Windows.</p>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 12:05:50 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: malware-mobiles.html
===================================================================
RCS file: malware-mobiles.html
diff -N malware-mobiles.html
--- malware-mobiles.html 30 May 2014 06:49:33 -0000 1.5
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,159 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Malware in Mobile Devices
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-mobiles.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Malware in Mobile Devices</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user. (This does not include accidental errors.)
-</p>
-
-<p>
-Malware and nonfree software are two different issues. The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>. It's
-not directly a question of what the program <em>does</em> when it
-runs. However, in practice nonfree software is often malware, because
-the developer's awareness that the users would be powerless to fix any
-malicious functionalities tempts the developer to impose some.
-</p>
-
-<p>Here are examples of malware in mobile devices. See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple
-iThings.</p>
-
-<ul>
- <li><p>Portable phones with GPS will send their GPS location on remote
- command and users cannot stop them: <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones to have
- GPS.)</p></li>
-
- <li><p>Most mobile phones have a universal back door, which has been used to
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p></li>
-
- <li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come with a back
- door</a> that provides remote access to the data stored on the
device.</p></li>
-
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it seems that this
- does not operate via the universal back door that we know nearly all
- portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones: <a
- href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones and
- laptops</a>. (I suspect this means Windows laptops.) Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p></li>
-
- <li>
- <p>In
- Android, <a
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1">Google
- has a back door to remotely delete apps.</a> (It is in the nonfree
- program Google Play, which was formerly known as Android Market.)
- </p>
-
- <p>
- Although Google's <em>exercise</em> of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to let a
- security service remotely <em>deactivate</em> programs that it
- considers malicious. But there is no excuse for allowing it
- to <em>delete</em> the programs, and you should have the right to
- decide who (if anyone) to trust in this way.
- </p>
- </li>
-
- <li><p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
- Some Android phones are tyrants</a> (though someone found a way to crack
- the restriction). Fortunately, most Android devices are not tyrants.</p></li>
-
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>. <a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail.</a></p></li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary.html
===================================================================
RCS file: proprietary.html
diff -N proprietary.html
--- proprietary.html 30 May 2014 05:47:56 -0000 1.21
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,138 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Software
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary.translist" -->
-<style type="text/css" media="print,screen">
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
-<!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
--->
-</style>
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Software</h2>
-
-<p>Proprietary software, nonfree software, means software that doesn't
-<a href="/philosophy/free-sw.html">respect users' freedom and
-community</a>. The developer or owner has power over its users.
-<a href="/philosophy/free-software-even-more-important.html">
-Proprietary software is itself an injustice</a>, although most users
-don't recognize it as such. The point of this page is that the one
-injustice often leads to further injustice.</p>
-
-<p>Power corrupts, so the proprietary program's developer is tempted
-to design the program to mistreat its users—that is, to make
-it <em>malware</em>. (Malware means software whose functioning
-mistreats the user.) Of course, the developer usually does not do
-this out of malice, but rather to put the users at a disadvantage.
-That does not make it any less nasty or more legitimate.</p>
-
-<p>Yielding to that temptation has become ever more frequent; nowadays
-it is standard practice. Modern proprietary software is software for
-suckers!</p>
-
-<div class="toc">
-<div class="companies">
-<ul>
- <li><strong>Company or type of product</strong></li>
- <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
- <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
- <li><a href="/philosophy/malware-mobiles.html">Malware in mobile
devices</a></li>
- <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
- Swindle</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<ul>
-<li><strong>Type of malware</strong></li>
-<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
-<li><a href="/philosophy/proprietary-drm.html">Digital restrictions
- management</a> or “DRM” means functionalities designed
- to restrict what users can do with the data in their computers.</li>
-<li><a href="/philosophy/proprietary-jails.html">Jails</a>—systems
- that impose censorship on application programs.</li>
-<li><a href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
- manufacturer.</li>
-</ul>
-</div>
-</div>
-
-<p>Users of proprietary software are defenseless against these forms
-of mistreatment. The way to avoid them is by insisting on
-<a href="/philosophy/free-software-even-more-important.html">free
-(freedom-respecting) software.</a> Since free software is controlled
-by its users, they have a pretty good defense against malicious
-software functionality.</p>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2013, 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 05:47:56 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
-
Index: proprietary-back-doors.html
===================================================================
RCS file: proprietary-back-doors.html
diff -N proprietary-back-doors.html
--- proprietary-back-doors.html 30 May 2014 06:49:33 -0000 1.19
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,200 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-back-doors.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Back Doors</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>Here are examples of demonstrated back doors in proprietary software.</p>
-
-<ul>
-
-<li>
-<p>Microsoft Windows has a universal back door through which
-<a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-</li>
-
-<li>
-<p>Windows 8's back doors are so gaping that
-<a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government
-has decided it can't be trusted</a>.
-</p>
-</li>
-
-<li>
-<p>The iPhone has a back
-door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple to remotely delete apps</a> which Apple considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p>
-</li>
-
-<li>
-<p><a
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps">Windows
-8 also has a back door for remotely deleting apps</a>.
-</p>
-
-<p>
-You might well decide to let a security service that you trust
-remotely <em>deactivate</em> programs that it considers malicious.
-But there is no excuse for <em>deleting</em> the programs, and you
-should have the right to decide who (if anyone) to trust in this way.
-</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
-</li>
-
-<li>
-<p>In
-Android, <a
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1">Google
-has a back door to remotely delete apps.</a> (It is in the nonfree
-program Google Play, which was formerly known as Android Market.)
-</p>
-
-<p>
-Although Google's <em>exercise</em> of this power has not been
-malicious so far, the point is that nobody should have such power,
-which could also be used maliciously. You might well decide to let a
-security service remotely <em>deactivate</em> programs that it
-considers malicious. But there is no excuse for allowing it
-to <em>delete</em> the programs, and you should have the right to
-decide who (if anyone) to trust in this way.
-</p>
-</li>
-
-<li>
-<p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come with
-a back door</a> that provides remote access to the data stored on the
-device.
-</p>
-</li>
-
-<li>
-<p>Most mobile phones have a universal back door, which has
-been used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p>The Amazon Kindle has a back door that has been used
-to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
-remotely erase books</a>.
-</p>
-</li>
-
-<li>
-<p>HP “storage appliances” that use the proprietary
-“Left Hand” operating system have back doors that give
-HP <a
href="https://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">remote
-login access</a> to them. HP claims that this does not give HP access
-to the customer's data, but if the back door allows installation of
-software changes, a change could be installed that would give access
-to the customer's data.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">Some
Dlink routers</a>
-have a back door for changing settings in a dlink of an eye.
-</p>
-
-<p>
-<a href="https://github.com/elvanderb/TCP-32764">Many models of router
-have back doors</a>.</p>
-</li>
-
-<li>
-<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">Some
applications come with MyFreeProxy,
-which is a universal back door that can download programs and run them.</a>
-</p>
-</li>
-</ul>
-
-<p>Here is a big problem whose details are still secret.</p>
-
-<ul>
-<li>
-<p><a href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">
-The FBI asks lots of companies to put back doors in proprietary programs.
-</a> We don't know of specific cases where this was done, but every
-proprietary program for encryption is a possibility.</p>
-</li>
-</ul>
-
-<p>Here is a suspicion that we can't prove, but is worth thinking
-about.</p>
-
-<ul>
-<li>
-<p><a
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">Writable
-microcode for Intel and AMD microprocessors</a> may be a vehicle for
-the NSA to invade computers, with the help of Microsoft, say respected
-security experts.
-</p>
-</li>
-</ul>
-
-
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-drm.html
===================================================================
RCS file: proprietary-drm.html
diff -N proprietary-drm.html
--- proprietary-drm.html 30 May 2014 06:49:33 -0000 1.9
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,159 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary DRM - GNU Project - Free Software Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-drm.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary DRM</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>Here are examples of proprietary programs and systems that
-implement <em>digital restrictions management</em> (DRM):
-functionalities designed intentionally to restrict what users can do.
-These functionalities are also called <em>digital handcuffs</em>.
-</p>
-
-<p>DRM is reinforced by
-<a
href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management">
-censorship laws</a> that ban software (and hardware) that can break
-the handcuffs. Instead of these laws, DRM ought to be illegal. Please
-support our campaign
-to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
-</p>
-
-<ul>
-<li>
-<p><a href="http://science.opposingviews.com/kindle-drm-17841.html">
-The Amazon Kindle has DRM</a>. That article is flawed in that it
-fails to treat DRM as an ethical question; it takes for granted that
-whatever Amazon might do to its users is legitimate. It refers to DRM
-as digital “rights” management, which is the spin term
-used to promote DRM. Nonetheless it serves as a reference for the
-facts.
-</p>
-
-<p>
-We refer to that product as the
-<a href="/philosophy/why-call-it-the-swindle.html"> Amazon Swindle </a>
-because of this and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.
-</p>
-</li>
-
-<li>
-<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
-in Windows</a>, introduced to cater to <a href="#bluray">Bluray</a>
-disks. (The article talks about how the same malware would later be
-introduced in MacOS. That had not been done at the time, but it was
-done subsequently.)
-</p>
-</li>
-
-<li>
-<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">DRM
-in MacOS</a>. This article focuses on the fact that a new model of
-Macbook introduced a requirement for monitors to have malicious
-hardware, but DRM software in MacOS is involved in activating the
-hardware. The software for accessing iTunes is also responsible.
-</p>
-</li>
-
-<li>
-<p><a href="https://www.eff.org/deeplinks/2008/02/adobe-pushes-drm-flash">
-DRM in Flash Player</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and <span id="bluray">Bluray</span> disks have DRM</a>.
-</p>
-
-<p>That page uses spin terms that favor DRM,
-including <a href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
-and it claims that “artists” (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is a reference for the facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!
-</p>
-</li>
-
-<li>
-<p><a
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
-DRM in Cars Will Drive Consumers Crazy</a>.
-</p>
-</li>
-
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-insecurity.html
===================================================================
RCS file: proprietary-insecurity.html
diff -N proprietary-insecurity.html
--- proprietary-insecurity.html 30 May 2014 06:49:33 -0000 1.27
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,185 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Insecurity
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-insecurity.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Insecurity</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
-
-<p>It would be incorrect to compare proprietary software with a
-fictitious idea of free software as perfect. Every nontrivial program
-has bugs, and any system, free or proprietary, may have security
-holes. But proprietary software developers frequently disregard
-gaping holes, or even introduce them deliberately, and <em>the users
-are helpless to fix them</em>.</p>
-
-<ul>
-<li>
-<p>
-<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
-The NSA can tap data in smart phones, including iPhones, Android, and
-BlackBerry</a>. While there is not much detail here, it seems that
-this does not operate via the universal back door that we know nearly
-all portable phones have. It may involve exploiting various bugs.
-There
-are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
-lots of bugs in the phones' radio software</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The
-<a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a>
-makes eavesdropping a snap.</p>
-</li>
-
-<li>
-<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company for making webcams with bad security so
-that it was easy for anyone to watch them</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
-It is possible to take control of some car computers through malware
-in music files</a>.
-Also <a href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">by
-radio</a>. Here is <a href="http://www.autosec.org/faq.html">more
-information</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-It is possible to kill people by taking control of medical implants by
-radio</a>. Here
-is <a href="http://www.bbc.co.uk/news/technology-17631838">more
-information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
-</p>
-</li>
-
-<li>
-<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
-</p>
-</li>
-
-<li>
-<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers</a>.
-</p>
-</li>
-
-<li>
-<p>An app to prevent “identity theft” (access to personal data)
-by storing users' data on a special server
-<a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
-deactivated by its developer</a> which had discovered a security flaw.
-</p>
-
-<p>
-That developer seems to be conscientious about protecting personal
-data from third parties in general, but it can't protect that data
-from the state. Quite the contrary: confiding your data to someone
-else's server, if not first encrypted by you with free software,
-undermines your rights.
-</p>
-</li>
-
-<li>
-<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
-memories have modifiable software</a>, which makes them vulnerable to
-viruses.</p>
-
-<p>We don't call this a “back door” because it is normal
-that you can install a new system in a computer given physical access
-to it. However, memory sticks and cards should not be modifiable in
-this way.</p>
-</li>
-
-<li>
-<p><a href="http://spritesmods.com/?art=hddhack&page=6"> Replaceable
-nonfree software in disk drives can be written by a nonfree
-program.</a> This makes any system vulnerable to persistent attacks
-that normal forensics won't detect.</p>
-</li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-jails.html
===================================================================
RCS file: proprietary-jails.html
diff -N proprietary-jails.html
--- proprietary-jails.html 30 May 2014 06:49:34 -0000 1.12
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,114 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Jails - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-jails.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Jails</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>Here are examples of proprietary systems that are
-<em>jails</em>—they do not allow the user to freely install
-applications. The <a href="http://i.imgur.com/ZRViDum.jpg">image of
-the iPrison</a> illustrates this issue.</p>
-<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
-<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
-
-<p>These systems are platforms for censorship by the company that owns
-the system. Selling products designed in this way as platforms for
-censorship ought to be forbidden by law.</p>
-
-<ul>
-<li>
-<p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
-iOS, the operating system of the Apple iThings, is a jail.</a> Apple
-has used its power
-to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
-censor all bitcoin apps</a> for the iThings.</p>
-
-<p>Here is an article about
-the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">code
-signing</a> that the iThings use to lock up the user.</p>
-</li>
-
-<li>
-<p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 on “mobile devices” is a jail.</a>
-</p>
-</li>
-
-<li>
-<p>Game consoles are jails, too: no game can run on the console unless
-the console's manufacturer has authorized it. Alas, I can't find a
-article to cite as a reference for this fact. Please inform us if you
-know of one.
-</p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-sabotage.html
===================================================================
RCS file: proprietary-sabotage.html
diff -N proprietary-sabotage.html
--- proprietary-sabotage.html 30 May 2014 06:49:34 -0000 1.21
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,162 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-sabotage.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Sabotage</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>Here are examples of proprietary software that has something
-worse than a back door.</p>
-
-<ul>
-<li>
-<p><a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
-Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-</p>
-</li>
-
-<li>
-<p><a
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
-Microsoft cut off security fixes for Windows XP, except to some big
-users that pay exorbitantly.</a></p>
-
-<p>I think a person or company has the right to cease to work on a
-particular program; the wrong here is Microsoft does this after having
-made the users dependent on Microsoft, so they are not free to ask
-someone else to work on the program for them.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
-The NSA has put back doors into nonfree encryption software.</a>
-We don't know which ones they are, but we can be sure they include
-some widely used systems. This reinforces the point that you can never
-trust the security of nonfree software.
-</p>
-</li>
-
-<li>
-<p><a
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones">
-An Apple firmware “upgrade” bricked iPhones that had been
-unlocked.</a> The “upgrade” also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
-censorship</a>. All this was apparently intentional.
-</p>
-</li>
-
-<li>
-<p>Some
-proprietary <a
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">games
-lure children to spend their parents' money</a>.</p>
-</li>
-
-<li>
-<p>Sony <a
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">
-sabotaged the Playstation 3</a> with a firmware downgrade that removed
-the feature that allowed users to run GNU/Linux on it.</p>
-
-<p>Sony subsequently sent police after Geohot, after he cracked the
-code that blocked users from changing the firmware, and we responded by
-calling for a <a href="http://boycottsony.org"> boycott of
-Sony </a>.</p>
-</li>
-
-<li>
-<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">disabled
-network features</a> on <em>previously purchased</em>
-“smart” TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.
-</p>
-</li>
-
-<li>
-<p>Oracle's nonfree Java plug-in for browsers <a
-href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539">
-sneakily installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software. For instance, it regards the inclusion of proprietary Flash
-Player (which has a <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
-surveillance feature </a> and DRM) in Chrome as a good thing. Chrome
-is a proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java">Oracle
-insisted on continuing this practice.</a></p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-surveillance.html
===================================================================
RCS file: proprietary-surveillance.html
diff -N proprietary-surveillance.html
--- proprietary-surveillance.html 30 May 2014 06:49:34 -0000 1.31
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,235 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Surveillance - GNU Project - Free Software
Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-surveillance.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Surveillance</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>Clearly established cases of proprietary software that spies on or
-tracks users:</p>
-
-<ul>
-<li>Spyware in Windows: <a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
-Windows Update snoops on the user.</a>
-<a
href="https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
8.1 snoops on local searches.</a>.
-And there's a <a href="http://www.marketoracle.co.uk/Article40836.html">secret
NSA key in Windows</a>, whose functions we don't know.
-</li>
-<li>Spyware in iThings: the <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">iBeacon</a>
lets stores
-determine exactly where the iThing is, and get other info too.
-<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
-<p>
-There is also a feature for web sites to track users, which is
-<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
-enabled by default</a>. (That article talks about iOS 6, but it is still
-true in iOS 7.)</p>
-<p>
-The iThing
-also <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">tells
-Apple its geolocation</a> by default, though that can be turned off.
-</p>
-<p>
-Apple can, and regularly
-does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">remotely
-extract some data from iPhones for the state</a>.
-</p>
-<p>
-<a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
-Either Apple helps the NSA snoop on all the data in an iThing, or it
-is totally incompetent.</a>
-</p>
-</li>
-<li> Angry Birds
- <a
-href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
-to spy through it too</a>.
-Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps </a>.
-<a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
-More about NSA app spying</a>.
-</li>
-<li>Spyware in many e-readers—not only the Kindle: <a
-href="https://www.eff.org/pages/reader-privacy-chart-2012">
-they report even which page the user reads at what time</a>.
-</li>
-<li>Spyware
-in <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-LG “smart” TVs</a> reports what the user watches, and the
-switch to turn this off has no effect. (The fact that the transmission
reports a 404 error really means nothing;
-the server could save that data anyway.)
-<p> Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-snoops on
-other devices</a> on the user's local network.
-</p>
-<p>
-LG later said it installed a patch to stop this, but it can happen in
-any product.
-</p>
-
-<p>However, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">do
lots of spying anyway</a>
-</p>
-</li>
-
-<li>
-<a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
-Rent-to-own computers were programmed to spy on their renters</a>.
-</li>
-<li>Spyware in Skype: <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">specifically
for spying</a>.
-</li>
-<li>Flash Player's feature that helps web sites track visitors: <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
-http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/</a>
-<p>
-It is also used for
-<a
-href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
-“fingerprinting” devices </a> to identify users.
-</p>
-<p>Javascript code is another method of “fingerprinting”
-devices.</p>
-</li>
-
-<li><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
-Baidu's Japanese-input and Chinese-input apps spy on users.</a>
-</li>
-
-<li>FTC says most mobile apps for children don't respect privacy: <a
-href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>
-</li>
-<li>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
-sends user data, including geolocation, for use by companies.</a>
-<p>
-The FTC criticized this app because it asked the user to approve
-sending personal data to the app developer but did not ask about
-sending it to other companies. This shows the weakness of the
-reject-it-if-you-dislike-snooping “solution” to
-surveillance: why should a flashlight app send any information to
-anyone? A free software flashlight app would not.</p>
-</li>
-
-<li>Spyware in Cisco TNP IP
-phones: <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>
-</li>
-<li>Spyware in Android phones (and Windows? laptops): The Wall Street
-Journal (in an article blocked from us by a paywall) reports
-that<a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">the
-FBI can remotely activate the GPS and microphone in Android phones and
-laptops</a>. (I suspect this means Windows laptops.) Here
-is <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more info
-</a>.
-</li>
-<li>Portable phones with GPS will send their GPS location on remote
-command and users cannot stop
-them: <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
-(The US says it will eventually require all new portable phones to
-have GPS.)
-</li>
-<li>The nonfree Snapchat app's principal purpose is to restrict the
-use of data on the user's computer, but it does surveillance too:
-<a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
-it tries to get the user's list of other people's phone numbers.</a>
-</li>
-</ul>
-
-<p>In addition, many web sites spy on their visitors. Web sites are
-not programs, so it <a
-href="/philosophy/network-services-arent-free-or-nonfree.html"> makes
-no sense to call them “free” or
-“proprietary”</a>, but the surveillance is an abuse all
-the same.</p>
-
-<ul>
-<li>Pages that contain “Like” buttons <a
-href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
-enable Facebook to track visitors to those pages</a>—even
-users that don't have Facebook accounts.</li>
-<li>Many web sites rat their visitors to advertising networks that
-track users. Of the top 1000 web sites, <a
-href="http://www.law.berkeley.edu/15402.htm">93% fed their
-visitors third-party cookies, allowing other sites to track them</a>.
-</li>
-<li>Many web sites report all their visitors to Google by using the
-Google Analytics service, which <a
-href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
-tells Google the IP address and the page that was visited.</a></li>
-<li>Many web sites try to collect users' address books (the user's
-list of other people's phone numbers or email addresses). This
-violates the privacy of those other people.</li>
-<li>
-<a href="http://www.itproportal.com/2014/05/14/
-microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft SkyDrive allows
- the NSA to directly examine users' data</a>.
-</li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
Index: proprietary-tyrants.html
===================================================================
RCS file: proprietary-tyrants.html
diff -N proprietary-tyrants.html
--- proprietary-tyrants.html 30 May 2014 06:49:34 -0000 1.8
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,117 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Tyrants - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-tyrants.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Tyrants</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
-
-<p>A <em>tyrant</em> device is one that refuses to allow users to
-install a different operating system or a modified operating
-system. These devices have measures to block execution of anything
-other than the “approved” system versions. We also
-refer to this practice as <em>tivoization</em>.
-</p>
-
-<ul>
-<li>
-<p>The Apple iThings are tyrant devices. There is a port of Android
-to the iThings, but installing it
-requires <a href="http://www.idroidproject.org/wiki/Status"> finding a
-bug or “exploit”</a> to make it possible to install a
-different system.
-</p>
-</li>
-
-<li>
-<p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
-Mobile devices that come with Windows 8 are tyrants.</a>
-</p>
-</li>
-
-<li>
-<p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
-Some Android phones are tyrants</a> (though someone found a way to
-crack the restriction). Fortunately, most Android devices are not tyrants.
-</p>
-</li>
-
-<li>
-<p><a href="http://boycottsony.org">The Playstation 3 is a tyrant</a>.
-</p>
-</li>
-
-<li>
-<p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255">
-Intel processors will have tyrant software built in</a>.
-</p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF & GNU inquiries to
-<a href="mailto:address@hidden"><address@hidden></a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF. Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden"><address@hidden></a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
- replace it with the translation of these two:
-
- We work hard and do our best to provide accurate, good quality
- translations. However, we are not exempt from imperfection.
- Please send your comments and general suggestions in this regard
- to <a href="mailto:address@hidden">
- <address@hidden></a>.</p>
-
- <p>For information on coordinating and submitting translations of
- our web pages, see <a
- href="/server/standards/README.translations.html">Translations
- README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy malware-apple.html malware-kindl...,
Dora Scilipoti <=