www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy malware-apple.html malware-kindl...


From: Dora Scilipoti
Subject: www/philosophy malware-apple.html malware-kindl...
Date: Wed, 04 Jun 2014 06:46:40 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Dora Scilipoti <dora>   14/06/04 06:46:40

Removed files:
        philosophy     : malware-apple.html malware-kindle-swindle.html 
                         malware-microsoft.html malware-mobiles.html 
                         proprietary.html proprietary-back-doors.html 
                         proprietary-drm.html 
                         proprietary-insecurity.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-surveillance.html 
                         proprietary-tyrants.html 

Log message:
        Remove files moved to /philosophy/proprietary/ (RT# 914790).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-apple.html?cvsroot=www&r1=1.9&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-kindle-swindle.html?cvsroot=www&r1=1.6&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-microsoft.html?cvsroot=www&r1=1.14&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-mobiles.html?cvsroot=www&r1=1.5&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary.html?cvsroot=www&r1=1.21&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-back-doors.html?cvsroot=www&r1=1.19&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-drm.html?cvsroot=www&r1=1.9&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.html?cvsroot=www&r1=1.27&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-jails.html?cvsroot=www&r1=1.12&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-sabotage.html?cvsroot=www&r1=1.21&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-surveillance.html?cvsroot=www&r1=1.31&r2=0
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-tyrants.html?cvsroot=www&r1=1.8&r2=0

Patches:
Index: malware-apple.html
===================================================================
RCS file: malware-apple.html
diff -N malware-apple.html
--- malware-apple.html  30 May 2014 06:49:30 -0000      1.9
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,152 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Apple's Operating Systems are Malware
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-apple.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Apple's Operating Systems Are Malware</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user.  (This does not include accidental errors.)
-This page explains how the software in Apple's computer products are
-malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues.  The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>.  It's
-not directly a question of what the program <em>does</em> when it
-runs.  However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
-
-<p>Here's how Apple's systems are malware.</p>
-
-<ul>
-   <li><p><a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>
-   iOS, the operating system of the Apple iThings, is a jail for
-   users.</a>  That means it imposes censorship of application programs.</p>
-
-   <p>Apple has used this power
-   to <a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
-   censor all bitcoin apps</a> for the iThings.</p>
-
-   <p>Apple, in the iThings, pioneered the practice of general purpose
-   computers that are jails, and the term comes from iThing users, who
-   referred to escaping from the censorship as
-   &ldquo;jailbreaking.&rdquo;</p>
-
-   <p>Here is an article about the <a 
-   href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";> 
-   code signing</a> that the iThings use to jail the user.</p></li>
-
-   <li><p>The iThings are tyrant devices: they do not permit
-   installing a different or modified operating system.  There is a
-   port of Android to the iThings, but installing it
-   requires <a href="http://www.idroidproject.org/wiki/Status";>
-   finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to
-   install a different system.</p></li>
-
-   <li><p><a 
-   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
-   DRM (digital restrictions mechanisms) in MacOS</a>. This article focuses on 
the fact that a new model of 
-   Macbook introduced a requirement for monitors to have malicious 
-   hardware, but DRM software in MacOS is involved in activating the 
-   hardware. The software for accessing iTunes is also responsible.</p></li>
-
-   <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
-   DRM that caters to Bluray disks</a>.  (The article focused on Windows
-   and said that MacOS would do the same thing subsequently.)</p></li>
-   
-   <li><p>The iPhone has a back door <a 
-   
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-   that allows Apple to remotely delete apps</a> which Apple considers 
-   &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power 
-   because of course we can trust Apple.</p></li>
-
-  <li><p><a 
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones";>
-   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-   unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-   not approved by <a href="/philosophy/proprietary-jails.html">Apple
-   censorship</a>.  All this was apparently intentional.</p></li>
-
-   <li><p>
-   Apple can, and regularly
-   does, <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>remotely
-   extract some data from iPhones for the state</a>.
-   </p></li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:30 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: malware-kindle-swindle.html
===================================================================
RCS file: malware-kindle-swindle.html
diff -N malware-kindle-swindle.html
--- malware-kindle-swindle.html 30 May 2014 06:49:31 -0000      1.6
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,111 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Malware in the Kindle Swindle
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-kindle-swindle.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Malware in the Kindle Swindle</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>We refer to this product as the 
-<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
-management (DRM)</a>  and <a href="/philosophy/ebooks.html"> 
-other malicious functionalities</a>.</p>
-
-<p>
-Malware and nonfree software are two different issues.  Malware means
-the program is designed to mistreat or harm users when it runs.  The
-difference between <a href="/philosophy/free-sw.html">free
-software</a> and nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>.  It's
-not directly a question of what the program <em>does</em> when it
-runs.  However, in practice nonfree software is often malware, because
-the developer's awareness that the users would be powerless to fix any
-malicious functionalities tempts the developer to impose some.
-</p>
-
-<ul>
-  <li><p>The Amazon Kindle has a back door that has been used to <a 
-  
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-  remotely erase books</a>.</p></li>
-
-  <li><p><a href="http://science.opposingviews.com/kindle-drm-17841.html";>
-  The Amazon Kindle has DRM</a>. That article is flawed in that it
-  fails to treat DRM as an ethical question; it takes for granted that
-  whatever Amazon might do to its users is legitimate. It refers to DRM
-  as digital &ldquo;rights&rdquo; management, which is the spin term
-  used to promote DRM. Nonetheless it serves as a reference for the 
-  facts.</p></li>
-
-  <li><p>The Electronic Frontier Foundation has examined and found <a 
-  href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of 
-  surveillance in the Swindle and other e-readers</a>.</p></li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:31 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: malware-microsoft.html
===================================================================
RCS file: malware-microsoft.html
diff -N malware-microsoft.html
--- malware-microsoft.html      30 May 2014 12:05:50 -0000      1.14
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,162 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Microsoft's Software Is Malware
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-microsoft.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Microsoft's Software is Malware</h2>
-
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
-malware</a></p>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user.  (This does not include accidental errors.)
-This page explains how Microsoft software is malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues.  The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>.  It's
-not directly a question of what the program <em>does</em> when it
-runs.  However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
-
-<ul>
-  <li><p>Microsoft Windows has a universal back door through which <a 
-  
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>
-  any change whatsoever can be imposed on the users</a>.</p>
-
-  <p>More information on when <a 
-  href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
-  this was used</a>.</p></li>
-
-  <li><p><a 
-  
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps";>
-  Windows 8 also has a back door for remotely deleting apps</a>.</p>
-
-  <p>You might well decide to let a security service that you trust
-  remotely <em>deactivate</em> programs that it considers malicious.
-  But there is no excuse for <em>deleting</em> the programs, and you
-  should have the right to decide who (if anyone) to trust in this 
way.</p></li>
-
-  <li><p>Windows 8's back doors are so gaping that <a 
-  
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
-  the German government has decided it can't be trusted</a>.</p></li>
-
-  <li><p><a 
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail</a>: it censors the
-  user's choice of application programs.</p></li>
- 
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>: they block
-  users from installing other or modified operating systems.</p></li>
-
-  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
-  DRM (digital restrictions mechanisms) in Windows</a>, introduced to
-  cater to <a href="/philosophy/proprietary-drm.html#bluray">Bluray</a> disks. 
 
-  (The article also talks about how the same malware would later be introduced 
-  in MacOS.)</p></li>
-
-  <li>Spyware in Windows: <a 
-  href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-  Windows Update snoops on the user.</a>
-  <a 
-  
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
-  Windows 8.1 snoops on local searches.</a> And there's a 
-  <a href="http://www.marketoracle.co.uk/Article40836.html";>
-  secret NSA key in Windows</a>, whose functions we don't know.</li>
-
-  <li><p><a 
-  
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-  Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
-  <li><p>
-  <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
-  Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
-  </li>
-
-  <li><p><a 
-  
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
-  Microsoft cut off security fixes for Windows XP, except to some big users 
-  that pay exorbitantly.</a></p>
-
-  <p>I think a person or company has the right to cease to work on a
-  particular program; the wrong here is Microsoft does this after having
-  made the users dependent on Microsoft, so they are not free to ask
-  someone else to work on the program for them.</p></li>
-</ul>
-
-<p>As this page shows, if you do want to clean your computer of malware,
-the first software to delete is Windows.</p>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 12:05:50 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: malware-mobiles.html
===================================================================
RCS file: malware-mobiles.html
diff -N malware-mobiles.html
--- malware-mobiles.html        30 May 2014 06:49:33 -0000      1.5
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,159 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Malware in Mobile Devices
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/malware-mobiles.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Malware in Mobile Devices</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user.  (This does not include accidental errors.)
-</p>
-
-<p>
-Malware and nonfree software are two different issues.  The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>.  It's
-not directly a question of what the program <em>does</em> when it
-runs.  However, in practice nonfree software is often malware, because
-the developer's awareness that the users would be powerless to fix any
-malicious functionalities tempts the developer to impose some.
-</p>
-
-<p>Here are examples of malware in mobile devices.  See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple
-iThings.</p>
-
-<ul>
-  <li><p>Portable phones with GPS will send their GPS location on remote
-  command and users cannot stop them: <a 
-  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
-  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
 
-  (The US says it will eventually require all new portable phones to have 
-  GPS.)</p></li>
-
-  <li><p>Most mobile phones have a universal back door, which has been used to
-  <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-  turn them malicious</a>.</p></li>
-
-  <li><p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
-  Samsung Galaxy devices running proprietary Android versions come with a back 
-  door</a> that provides remote access to the data stored on the 
device.</p></li>
-
-  <li><p><a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
-  The NSA can tap data in smart phones, including iPhones, Android, and
-  BlackBerry</a>. While there is not much detail here, it seems that this 
-  does not operate via the universal back door that we know nearly all 
-  portable phones have. It may involve exploiting various bugs. There are 
-  <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
-  lots of bugs in the phones' radio software</a>.</p></li>
-
-  <li><p>Spyware in Cisco TNP IP phones: <a 
-  href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
-  
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
-
-  <li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
-  Journal (in an article blocked from us by a paywall) reports that
-  <a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
-  the FBI can remotely activate the GPS and microphone in Android phones and
-  laptops</a>. (I suspect this means Windows laptops.) Here is <a 
-  href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p></li>
-
-  <li>
-  <p>In
-  Android, <a 
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1";>Google
-  has a back door to remotely delete apps.</a>  (It is in the nonfree
-  program Google Play, which was formerly known as Android Market.)
-  </p>
- 
-  <p>
-  Although Google's <em>exercise</em> of this power has not been
-  malicious so far, the point is that nobody should have such power,
-  which could also be used maliciously.  You might well decide to let a
-  security service remotely <em>deactivate</em> programs that it
-  considers malicious.  But there is no excuse for allowing it
-  to <em>delete</em> the programs, and you should have the right to
-  decide who (if anyone) to trust in this way.
-  </p>
-  </li>
-
-  <li><p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-  Some Android phones are tyrants</a> (though someone found a way to crack 
-  the restriction). Fortunately, most Android devices are not tyrants.</p></li>
-
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>. <a 
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p></li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary.html
===================================================================
RCS file: proprietary.html
diff -N proprietary.html
--- proprietary.html    30 May 2014 05:47:56 -0000      1.21
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,138 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Software
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary.translist" -->
-<style type="text/css" media="print,screen">
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
-<!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
--->
-</style>
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Software</h2>
-
-<p>Proprietary software, nonfree software, means software that doesn't
-<a href="/philosophy/free-sw.html">respect users' freedom and
-community</a>.  The developer or owner has power over its users.
-<a href="/philosophy/free-software-even-more-important.html">
-Proprietary software is itself an injustice</a>, although most users
-don't recognize it as such.  The point of this page is that the one
-injustice often leads to further injustice.</p>
-
-<p>Power corrupts, so the proprietary program's developer is tempted
-to design the program to mistreat its users&mdash;that is, to make
-it <em>malware</em>.  (Malware means software whose functioning
-mistreats the user.)  Of course, the developer usually does not do
-this out of malice, but rather to put the users at a disadvantage.
-That does not make it any less nasty or more legitimate.</p>
-
-<p>Yielding to that temptation has become ever more frequent; nowadays
-it is standard practice.  Modern proprietary software is software for
-suckers!</p>
-
-<div class="toc">
-<div class="companies">
-<ul>
-  <li><strong>Company or type of product</strong></li>
-  <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
-  <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
-  <li><a href="/philosophy/malware-mobiles.html">Malware in mobile 
devices</a></li>
-  <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
-  Swindle</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<ul>
-<li><strong>Type&nbsp;of malware</strong></li>
-<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
-<li><a href="/philosophy/proprietary-drm.html">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.</li>
-<li><a href="/philosophy/proprietary-jails.html">Jails</a>&mdash;systems 
-    that impose censorship on application programs.</li>
-<li><a href="/philosophy/proprietary-tyrants.html">Tyrants</a>&mdash;systems 
-    that reject any operating system not &ldquo;authorized&rdquo; by the 
-    manufacturer.</li>
-</ul>
-</div>
-</div>
-
-<p>Users of proprietary software are defenseless against these forms
-of mistreatment.  The way to avoid them is by insisting on
-<a href="/philosophy/free-software-even-more-important.html">free
-(freedom-respecting) software.</a>  Since free software is controlled
-by its users, they have a pretty good defense against malicious
-software functionality.</p>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2013, 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 05:47:56 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>
-

Index: proprietary-back-doors.html
===================================================================
RCS file: proprietary-back-doors.html
diff -N proprietary-back-doors.html
--- proprietary-back-doors.html 30 May 2014 06:49:33 -0000      1.19
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,200 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-back-doors.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Back Doors</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>Here are examples of demonstrated back doors in proprietary software.</p>
-
-<ul>
-
-<li>
-<p>Microsoft Windows has a universal back door through which
-<a 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>
-any change whatsoever can be imposed on the users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
-this was used</a>.
-</p>
-</li>
-
-<li>
-<p>Windows 8's back doors are so gaping that 
-<a 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
-the German government
-has decided it can't be trusted</a>.
-</p>
-</li>
-
-<li>
-<p>The iPhone has a back
-door <a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-that allows Apple to remotely delete apps</a> which Apple considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p>
-</li>
-
-<li>
-<p><a 
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps";>Windows
-8 also has a back door for remotely deleting apps</a>.
-</p>
-
-<p>
-You might well decide to let a security service that you trust
-remotely <em>deactivate</em> programs that it considers malicious.
-But there is no excuse for <em>deleting</em> the programs, and you
-should have the right to decide who (if anyone) to trust in this way.
-</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
-</li>
-
-<li>
-<p>In
-Android, <a 
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1";>Google
-has a back door to remotely delete apps.</a>  (It is in the nonfree
-program Google Play, which was formerly known as Android Market.)
-</p>
-
-<p>
-Although Google's <em>exercise</em> of this power has not been
-malicious so far, the point is that nobody should have such power,
-which could also be used maliciously.  You might well decide to let a
-security service remotely <em>deactivate</em> programs that it
-considers malicious.  But there is no excuse for allowing it
-to <em>delete</em> the programs, and you should have the right to
-decide who (if anyone) to trust in this way.
-</p>
-</li>
-
-<li>
-<p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
-Samsung Galaxy devices running proprietary Android versions come with
-a back door</a> that provides remote access to the data stored on the
-device.
-</p>
-</li>
-
-<li>
-<p>Most mobile phones have a universal back door, which has
-been used to <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p>The Amazon Kindle has a back door that has been used
-to <a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-remotely erase books</a>.
-</p>
-</li>
-
-<li>
-<p>HP &ldquo;storage appliances&rdquo; that use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give
-HP <a 
href="https://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>remote
-login access</a> to them.  HP claims that this does not give HP access
-to the customer's data, but if the back door allows installation of
-software changes, a change could be installed that would give access
-to the customer's data.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code";>Some
 Dlink routers</a>
-have a back door for changing settings in a dlink of an eye.
-</p>
-
-<p>
-<a href="https://github.com/elvanderb/TCP-32764";>Many models of router
-have back doors</a>.</p>
-</li>
-
-<li>
-<p><a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>Some
 applications come with MyFreeProxy,
-which is a universal back door that can download programs and run them.</a>
-</p>
-</li>
-</ul>
-
-<p>Here is a big problem whose details are still secret.</p>
-
-<ul>
-<li>
-<p><a href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";>
-The FBI asks lots of companies to put back doors in proprietary programs.
-</a> We don't know of specific cases where this was done, but every
-proprietary program for encryption is a possibility.</p>
-</li>
-</ul>
-
-<p>Here is a suspicion that we can't prove, but is worth thinking
-about.</p>
-
-<ul>
-<li>
-<p><a 
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>Writable
-microcode for Intel and AMD microprocessors</a> may be a vehicle for
-the NSA to invade computers, with the help of Microsoft, say respected
-security experts.
-</p>
-</li>
-</ul>
-
-
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<p>Copyright &copy; 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-drm.html
===================================================================
RCS file: proprietary-drm.html
diff -N proprietary-drm.html
--- proprietary-drm.html        30 May 2014 06:49:33 -0000      1.9
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,159 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary DRM - GNU Project - Free Software Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-drm.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary DRM</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>Here are examples of proprietary programs and systems that
-implement <em>digital restrictions management</em> (DRM):
-functionalities designed intentionally to restrict what users can do.
-These functionalities are also called <em>digital handcuffs</em>.
-</p>
-
-<p>DRM is reinforced by
-<a 
href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management";>
-censorship laws</a> that ban software (and hardware) that can break
-the handcuffs.  Instead of these laws, DRM ought to be illegal.  Please
-support our campaign
-to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
-</p>
-
-<ul>
-<li>
-<p><a href="http://science.opposingviews.com/kindle-drm-17841.html";>
-The Amazon Kindle has DRM</a>.  That article is flawed in that it
-fails to treat DRM as an ethical question; it takes for granted that
-whatever Amazon might do to its users is legitimate.  It refers to DRM
-as digital &ldquo;rights&rdquo; management, which is the spin term
-used to promote DRM.  Nonetheless it serves as a reference for the
-facts.
-</p>
-
-<p>
-We refer to that product as the
-<a href="/philosophy/why-call-it-the-swindle.html"> Amazon Swindle </a>
-because of this and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.
-</p>
-</li>
-
-<li>
-<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
-in Windows</a>, introduced to cater to <a href="#bluray">Bluray</a>
-disks.  (The article talks about how the same malware would later be
-introduced in MacOS.  That had not been done at the time, but it was
-done subsequently.)
-</p>
-</li>
-
-<li>
-<p><a 
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>DRM
-in MacOS</a>.  This article focuses on the fact that a new model of
-Macbook introduced a requirement for monitors to have malicious
-hardware, but DRM software in MacOS is involved in activating the
-hardware.  The software for accessing iTunes is also responsible.
-</p>
-</li>
-
-<li>
-<p><a href="https://www.eff.org/deeplinks/2008/02/adobe-pushes-drm-flash";>
-DRM in Flash Player</a>.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
-DVDs and <span id="bluray">Bluray</span> disks have DRM</a>.
-</p>
-
-<p>That page uses spin terms that favor DRM,
-including <a href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital &ldquo;rights&rdquo; management</a>
-and <a 
href="/philosophy/words-to-avoid.html#Protection">&ldquo;protect&rdquo;</a>,
-and it claims that &ldquo;artists&rdquo; (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is a reference for the facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!
-</p>
-</li>
-
-<li>
-<p><a 
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
-DRM in Cars Will Drive Consumers Crazy</a>.
-</p>
-</li>
-
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-insecurity.html
===================================================================
RCS file: proprietary-insecurity.html
diff -N proprietary-insecurity.html
--- proprietary-insecurity.html 30 May 2014 06:49:33 -0000      1.27
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,185 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-<title>Proprietary Insecurity
-- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-insecurity.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Insecurity</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
-
-<p>It would be incorrect to compare proprietary software with a
-fictitious idea of free software as perfect.  Every nontrivial program
-has bugs, and any system, free or proprietary, may have security
-holes.  But proprietary software developers frequently disregard
-gaping holes, or even introduce them deliberately, and <em>the users
-are helpless to fix them</em>.</p>
-
-<ul>
-<li>
-<p>
-<a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
-The NSA can tap data in smart phones, including iPhones, Android, and
-BlackBerry</a>.  While there is not much detail here, it seems that
-this does not operate via the universal back door that we know nearly
-all portable phones have.  It may involve exploiting various bugs.
-There
-are <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
-lots of bugs in the phones' radio software</a>.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
-&ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The 
-<a 
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
 of WhatsApp</a>
-makes eavesdropping a snap.</p>
-</li>
-
-<li>
-<p><a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
-The FTC punished a company for making webcams with bad security so
-that it was easy for anyone to watch them</a>.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
-It is possible to take control of some car computers through malware
-in music files</a>.
-Also <a href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>by
-radio</a>.  Here is <a href="http://www.autosec.org/faq.html";>more
-information</a>.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
-It is possible to kill people by taking control of medical implants by
-radio</a>.  Here
-is <a href="http://www.bbc.co.uk/news/technology-17631838";>more
-information</a>.  And <a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>here</a>.
-</p>
-</li>
-
-<li>
-<p>Lots of <a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>hospital 
equipment has lousy security</a>, and it can be fatal.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers</a>.
-</p>
-</li>
-
-<li>
-<p>An app to prevent &ldquo;identity theft&rdquo; (access to personal data)
-by storing users' data on a special server
-<a 
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
-deactivated by its developer</a> which had discovered a security flaw.
-</p>
-
-<p>
-That developer seems to be conscientious about protecting personal
-data from third parties in general, but it can't protect that data
-from the state.  Quite the contrary: confiding your data to someone
-else's server, if not first encrypted by you with free software,
-undermines your rights.
-</p>
-</li>
-
-<li>
-<p><a href="http://www.bunniestudios.com/blog/?p=3554";> Some flash
-memories have modifiable software</a>, which makes them vulnerable to
-viruses.</p>
-
-<p>We don't call this a &ldquo;back door&rdquo; because it is normal
-that you can install a new system in a computer given physical access
-to it.  However, memory sticks and cards should not be modifiable in
-this way.</p>
-</li>
-
-<li>
-<p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";> Replaceable
-nonfree software in disk drives can be written by a nonfree
-program.</a>  This makes any system vulnerable to persistent attacks
-that normal forensics won't detect.</p>
-</li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:33 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-jails.html
===================================================================
RCS file: proprietary-jails.html
diff -N proprietary-jails.html
--- proprietary-jails.html      30 May 2014 06:49:34 -0000      1.12
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,114 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Jails - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-jails.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Jails</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>Here are examples of proprietary systems that are
-<em>jails</em>&mdash;they do not allow the user to freely install
-applications.  The <a href="http://i.imgur.com/ZRViDum.jpg";>image of
-the iPrison</a> illustrates this issue.</p>
-<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
-<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
-
-<p>These systems are platforms for censorship by the company that owns
-the system.  Selling products designed in this way as platforms for
-censorship ought to be forbidden by law.</p>
-
-<ul>
-<li>
-<p><a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>
-iOS, the operating system of the Apple iThings, is a jail.</a>  Apple
-has used its power
-to <a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
-censor all bitcoin apps</a> for the iThings.</p>
-
-<p>Here is an article about
-the <a 
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>code
-signing</a> that the iThings use to lock up the user.</p>
-</li>
-
-<li>
-<p><a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a>
-</p>
-</li>
-
-<li>
-<p>Game consoles are jails, too: no game can run on the console unless
-the console's manufacturer has authorized it.  Alas, I can't find a
-article to cite as a reference for this fact.  Please inform us if you
-know of one.
-</p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-sabotage.html
===================================================================
RCS file: proprietary-sabotage.html
diff -N proprietary-sabotage.html
--- proprietary-sabotage.html   30 May 2014 06:49:34 -0000      1.21
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,162 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-sabotage.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Sabotage</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>Here are examples of proprietary software that has something
-worse than a back door.</p>
-
-<ul>
-<li>
-<p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-</p>
-</li>
-
-<li>
-<p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
-Microsoft cut off security fixes for Windows XP, except to some big
-users that pay exorbitantly.</a></p>
-
-<p>I think a person or company has the right to cease to work on a
-particular program; the wrong here is Microsoft does this after having
-made the users dependent on Microsoft, so they are not free to ask
-someone else to work on the program for them.
-</p>
-</li>
-
-<li>
-<p><a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>
-The NSA has put back doors into nonfree encryption software.</a>
-We don't know which ones they are, but we can be sure they include
-some widely used systems.  This reinforces the point that you can never
-trust the security of nonfree software.
-</p>
-</li>
-
-<li>
-<p><a 
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones";>
-An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
-censorship</a>.  All this was apparently intentional.
-</p>
-</li>
-
-<li>
-<p>Some
-proprietary <a 
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>games
-lure children to spend their parents' money</a>.</p>
-</li>
-
-<li>
-<p>Sony <a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>
-sabotaged the Playstation 3</a> with a firmware downgrade that removed
-the feature that allowed users to run GNU/Linux on it.</p>
-
-<p>Sony subsequently sent police after Geohot, after he cracked the
-code that blocked users from changing the firmware, and we responded by
-calling for a <a href="http://boycottsony.org";> boycott of
-Sony </a>.</p>
-</li>
-
-<li>
-<p>LG <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>disabled
-network features</a> on <em>previously purchased</em>
-&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.
-</p>
-</li>
-
-<li>
-<p>Oracle's nonfree Java plug-in for browsers <a
-href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539";>
-sneakily installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software.  For instance, it regards the inclusion of proprietary Flash
-Player (which has a <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>
-surveillance feature </a> and DRM) in Chrome as a good thing.  Chrome
-is a proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a 
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java";>Oracle
-insisted on continuing this practice.</a></p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-surveillance.html
===================================================================
RCS file: proprietary-surveillance.html
diff -N proprietary-surveillance.html
--- proprietary-surveillance.html       30 May 2014 06:49:34 -0000      1.31
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,235 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Surveillance - GNU Project - Free Software 
Foundation</title>
-<!--#include virtual="/philosophy/po/proprietary-surveillance.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Surveillance</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>Clearly established cases of proprietary software that spies on or
-tracks users:</p>
-
-<ul>
-<li>Spyware in Windows: <a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-Windows Update snoops on the user.</a>
-<a 
href="https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>Windows
 8.1 snoops on local searches.</a>.
-And there's a <a href="http://www.marketoracle.co.uk/Article40836.html";>secret 
NSA key in Windows</a>, whose functions we don't know.
-</li>
-<li>Spyware in iThings: the <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>iBeacon</a>
 lets stores
-determine exactly where the iThing is, and get other info too.
-<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
-<p>
-There is also a feature for web sites to track users, which is
-<a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
-enabled by default</a>.  (That article talks about iOS 6, but it is still
-true in iOS 7.)</p>
-<p>
-The iThing
-also <a 
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>tells
-Apple its geolocation</a> by default, though that can be turned off.
-</p>
-<p>
-Apple can, and regularly
-does, <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>remotely
-extract some data from iPhones for the state</a>.
-</p>
-<p>
-<a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
-Either Apple helps the NSA snoop on all the data in an iThing, or it
-is totally incompetent.</a>
-</p>
-</li>
-<li> Angry Birds
- <a
-href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
 spies for companies, and the NSA takes advantage
-to spy through it too</a>.
-Here's information on <a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html";>
 more spyware apps </a>.
-<a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data";>
-More about NSA app spying</a>.
-</li>
-<li>Spyware in many e-readers&mdash;not only the Kindle: <a
-href="https://www.eff.org/pages/reader-privacy-chart-2012";>
-they report even which page the user reads at what time</a>.
-</li>
-<li>Spyware
-in <a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
-LG &ldquo;smart&rdquo; TVs</a> reports what the user watches, and the
-switch to turn this off has no effect.  (The fact that the transmission 
reports a 404 error really means nothing;
-the server could save that data anyway.)
-<p> Even worse, it <a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
-snoops on
-other devices</a> on the user's local network.
-</p>
-<p>
-LG later said it installed a patch to stop this, but it can happen in
-any product.
-</p>
-
-<p>However, LG TVs <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>do
 lots of spying anyway</a>
-</p>
-</li>
-
-<li>
-<a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>
-Rent-to-own computers were programmed to spy on their renters</a>.
-</li>
-<li>Spyware in Skype: <a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Microsoft changed Skype <a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>specifically
 for spying</a>.
-</li>
-<li>Flash Player's feature that helps web sites track visitors: <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>
-http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/</a>
-<p>
-It is also used for
-<a
-href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
-&ldquo;fingerprinting&rdquo; devices </a> to identify users.
-</p>
-<p>Javascript code is another method of &ldquo;fingerprinting&rdquo;
-devices.</p>
-</li>
-
-<li><a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/";>
-Baidu's Japanese-input and Chinese-input apps spy on users.</a>
-</li>
-
-<li>FTC says most mobile apps for children don't respect privacy: <a
-href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
-http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>
-</li>
-<li>The Brightest Flashlight app <a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
-sends user data, including geolocation, for use by companies.</a>
-<p>
-The FTC criticized this app because it asked the user to approve
-sending personal data to the app developer but did not ask about
-sending it to other companies.  This shows the weakness of the
-reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-surveillance: why should a flashlight app send any information to
-anyone?  A free software flashlight app would not.</p>
-</li>
-
-<li>Spyware in Cisco TNP IP
-phones: <a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>
-</li>
-<li>Spyware in Android phones (and Windows? laptops): The Wall Street
-Journal (in an article blocked from us by a paywall) reports
-that<a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>the
-FBI can remotely activate the GPS and microphone in Android phones and
-laptops</a>.  (I suspect this means Windows laptops.)  Here
-is <a href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info
-</a>.
-</li>
-<li>Portable phones with GPS will send their GPS location on remote
-command and users cannot stop
-them: <a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
-(The US says it will eventually require all new portable phones to
-have GPS.)
-</li>
-<li>The nonfree Snapchat app's principal purpose is to restrict the
-use of data on the user's computer, but it does surveillance too:
-<a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
-it tries to get the user's list of other people's phone numbers.</a>
-</li>
-</ul>
-
-<p>In addition, many web sites spy on their visitors.  Web sites are
-not programs, so it <a
-href="/philosophy/network-services-arent-free-or-nonfree.html"> makes
-no sense to call them &ldquo;free&rdquo; or
-&ldquo;proprietary&rdquo;</a>, but the surveillance is an abuse all
-the same.</p>
-
-<ul>
-<li>Pages that contain &ldquo;Like&rdquo; buttons <a
-href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
-enable Facebook to track visitors to those pages</a>&mdash;even
-users that don't have Facebook accounts.</li>
-<li>Many web sites rat their visitors to advertising networks that
-track users.  Of the top 1000 web sites, <a
-href="http://www.law.berkeley.edu/15402.htm";>93% fed their
-visitors third-party cookies, allowing other sites to track them</a>.
-</li>
-<li>Many web sites report all their visitors to Google by using the
-Google Analytics service, which <a
-href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
-tells Google the IP address and the page that was visited.</a></li>
-<li>Many web sites try to collect users' address books (the user's
-list of other people's phone numbers or email addresses).  This
-violates the privacy of those other people.</li>
-<li>
-<a href="http://www.itproportal.com/2014/05/14/
-microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft SkyDrive allows
- the NSA to directly examine users' data</a>.
-</li>
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2013 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>

Index: proprietary-tyrants.html
===================================================================
RCS file: proprietary-tyrants.html
diff -N proprietary-tyrants.html
--- proprietary-tyrants.html    30 May 2014 06:49:34 -0000      1.8
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,117 +0,0 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
-<title>Proprietary Tyrants - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/philosophy/po/proprietary-tyrants.translist" -->
-<!--#include virtual="/server/banner.html" -->
-<h2>Proprietary Tyrants</h2>
-
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>A <em>tyrant</em> device is one that refuses to allow users to
-install a different operating system or a modified operating
-system.  These devices have measures to block execution of anything
-other than the &ldquo;approved&rdquo; system versions.  We also
-refer to this practice as <em>tivoization</em>.
-</p>
-
-<ul>
-<li>
-<p>The Apple iThings are tyrant devices.  There is a port of Android
-to the iThings, but installing it
-requires <a href="http://www.idroidproject.org/wiki/Status";> finding a
-bug or &ldquo;exploit&rdquo;</a> to make it possible to install a
-different system.
-</p>
-</li>
-
-<li>
-<p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-Mobile devices that come with Windows 8 are tyrants.</a>
-</p>
-</li>
-
-<li>
-<p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-Some Android phones are tyrants</a> (though someone found a way to
-crack the restriction).  Fortunately, most Android devices are not tyrants.
-</p>
-</li>
-
-<li>
-<p><a href="http://boycottsony.org";>The Playstation 3 is a tyrant</a>.
-</p>
-</li>
-
-<li>
-<p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";>
-Intel processors will have tyrant software built in</a>.
-</p>
-</li>
-
-</ul>
-
-</div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/footer.html" -->
-<div id="footer">
-<div class="unprintable">
-
-<p>Please send general FSF &amp; GNU inquiries to
-<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
-There are also <a href="/contact/">other ways to contact</a>
-the FSF.  Broken links and other corrections or suggestions can be sent
-to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
-
-<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
-        replace it with the translation of these two:
-
-        We work hard and do our best to provide accurate, good quality
-        translations.  However, we are not exempt from imperfection.
-        Please send your comments and general suggestions in this regard
-        to <a href="mailto:address@hidden";>
-        &lt;address@hidden&gt;</a>.</p>
-
-        <p>For information on coordinating and submitting translations of
-        our web pages, see <a
-        href="/server/standards/README.translations.html">Translations
-        README</a>. -->
-Please see the <a
-href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
-of this article.</p>
-</div>
-
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
-
-<!--#include virtual="/server/bottom-notes.html" -->
-
-<p class="unprintable">Updated:
-<!-- timestamp start -->
-$Date: 2014/05/30 06:49:34 $
-<!-- timestamp end -->
-</p>
-</div>
-</div>
-</body>
-</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]