www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.it.html propr...


From: GNUN
Subject: www/proprietary malware-microsoft.it.html propr...
Date: Sat, 27 Jun 2015 22:00:33 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/06/27 22:00:33

Modified files:
        proprietary    : malware-microsoft.it.html 
                         proprietary-surveillance.it.html 
        proprietary/po : malware-microsoft.it-en.html 
                         malware-microsoft.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.12&r2=1.13

Patches:
Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-microsoft.it.html   25 Jun 2015 09:57:49 -0000      1.2
+++ malware-microsoft.it.html   27 Jun 2015 22:00:30 -0000      1.3
@@ -7,11 +7,19 @@
 <title>Il software di Microsoft è malware - Progetto GNU - Free Software 
Foundation</title>
 
 <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Il software di Microsoft è malware</h2>
 
-<p><a href="/philosophy/proprietary.html">Altri esempi di malware
-proprietario</a></p>
+<p><a href="https://gnu.org/philosophy/proprietary.html";>Altri esempi di
+malware proprietario</a></p>
 
 <div class="highlight-para">
 <p>
@@ -22,8 +30,9 @@
 
 <p>
 Malware e software non libero sono due problemi separati. La differenza tra
-<a href="/philosophy/free-sw.html">software libero</a> e software non libero
-sta nell'<a href="/philosophy/free-software-even-more-important.html">avere
+<a href="https://gnu.org/philosophy/free-sw.html";>software libero</a> e
+software non libero sta nell'<a
+href="https://gnu.org/philosophy/free-software-even-more-important.html";>avere
 controllo del programma o viceversa</a>. Non è una questione che riguarda
 direttamente ciò che il programma <em>fa</em> in esecuzione. Comunque, nella
 pratica, il software non libero è spesso malware, perché gli sviluppatori,
@@ -32,12 +41,32 @@
 </p>
 </div>
 
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Tipo&nbsp;di malware</strong></li>
+<li><a href="#back-doors">Backdoor</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotaggio</a></li>
+<li><a href="#surveillance">Sorveglianza</a></li>
+<li><a href="#drm">DRM</a>  (che chiamiamo “Digital restrictions 
management”, in
+italiano, “gestione digitale delle restrizioni”) significa funzionalità
+volte a limitare il controllo che gli utenti hanno sui dati contenuti nei
+propri computer.</li>
+<li><a href="#jails">Prigioni</a>&mdash;sistemi che impongono restrizioni alle
+applicazioni.</li>
+<li><a href="#tyrants">Tiranni</a>&mdash;sistemi che vietano l'installazione di
+sistemi operativi non “autorizzati” dal produttore.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Backdoor di Microsoft</h3>
 <ul>
-  <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>Windows
-10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
-che include i loro file, i loro comandi, il testo da loro immesso e quello
-da loro pronunciato.</p></li>
   <li><p>Microsoft Windows ha una backdoor universale tramite la quale <a
 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>si
 può imporre agli utenti un qualsiasi cambiamento</a>.</p>
@@ -47,7 +76,7 @@
 stata usata</a>.</p>
 
   <p>In Windows 10 la backdoor universale non è più nascosta: tutti gli
-&ldquo;aggironamenti&ldquo; saranno <a
+&ldquo;aggiornamenti&rdquo; saranno <a
 
href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&amp;articleid=42633691&amp;source=googleplus";>forzati
 e immediati</a>.</p></li>
 
@@ -64,20 +93,61 @@
   <li><p>Le backdoor di Windows 8 sono larghe al punto da <a
 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>far
 concludere al governo tedesco che non ci si possa fidare di 
questo</a>.</p></li>
+</ul>
 
+<h3 id="sabotage">Sabotaggio di Microsoft</h3>
+<ul>
   <li><p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>Windows
-8 sui &ldquo;dispositivi mobili&rdquo; è una prigione</a>: censura la scelta
-delle applicazioni da parte dell'utente.</p></li>
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
  
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>I
-dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>: non
-permettono agli utenti di installare sistemi operativi diversi o 
modificati.</p></li>
+  <li><p><a
+href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
+ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
+meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
 
-  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM in
-Windows</a>, introdotto per soddisfare i requisiti dei dischi <a
-href="#bluray">Bluray</a>. (L'articolo spiega come lo stesso malware sarà,
-in un momento successivo, introdotto in MacOS).</p></li>
+  <p>Microsoft <a
+href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
+sospenderà il supporto per alcune versioni di Internet Explorer</a> allo
+stesso modo.</p>
+
+  <p>Pensiamo che una persona o società abbia il diritto di smettere di 
lavorare
+su un particolare programma; l'errore in questo caso sta nel fatto che
+Microsoft lo fa dopo aver reso gli utenti dipendenti dal proprio software, e
+quindi non è libera di chiedere a qualcun altro di lavorare al programma in
+sua vece.</p></li>
+</ul>
+
+<h3 id="surveillance">Sorveglianza di Microsoft</h3>
+<ul>
+  <li><p>
+  Microsoft usa le "condizioni sulla privacy" di Windows 10 per arrogarsi il
+"diritto" di spiare i file degli utenti in qualsiasi momento. La cifratura
+del disco con Windows 10 <a
+href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+dà una chiave anche a Microsoft</a>.</p>
+
+  <p>Quindi Windows è da considerarsi malware anche sotto il profilo della
+sorveglianza.</p>
+
+  <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su 
richiesta
+del governo statunitense, ma le "condizioni sulla privacy" non lo dicono
+esplicitamente. E cosa succederebbe se fosse il governo cinese a presentare
+richiesta?</p>
+
+  <p>Grazie all'"identificatore unico" per la pubblicità, diverso per ciascun
+utente, altre aziende possono controllare l'attività di navigazione di ogni
+specifico utente.</p>
+
+  <p>Pare che Microsoft abbia deciso di rendere Windows 10 davvero malvagio 
sotto
+tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
+subito Windows.</p></li>
+
+  <li><p><a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>Windows
+10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
+che include i loro file, i loro comandi, il testo da loro immesso e quello
+da loro pronunciato.</p></li>
 
   <li>Spyware in Windows: <a
 
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
@@ -87,33 +157,38 @@
 href="http://www.marketoracle.co.uk/Article40836.html";>chiave segreta
 dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
 
-  <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
-informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
-
   <li><p>
   <a
 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>Microsoft
 SkyDrive permette all'NSA di esaminare direttamente i dati degli 
utenti</a>.</p>
   </li>
+</ul>
 
-  <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
-ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
-meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
+<h3 id="drm">DRM di Microsoft</h3>
+<ul>
+  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM in
+Windows</a>, introdotto per soddisfare i requisiti dei dischi <a
+href="https://gnu.org/philosophy/proprietary-drm.html#bluray";>Bluray</a>.
+(L'articolo spiega come lo stesso malware sarà, in un momento successivo,
+introdotto in MacOS).</p></li>
+</ul>
 
-    <p>Microsoft <a
-href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
-sospenderà il supporto per alcune versioni di Internet Explorer</a> allo
-stesso modo.</p>
+<h3 id="jails">Prigioni di Microsoft</h3>
+<ul>
+  <li><p><a
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>Windows
+8 sui &ldquo;dispositivi mobili&rdquo; è una prigione</a>: censura la scelta
+delle applicazioni da parte dell'utente.</p></li>
+</ul>
 
-  <p>Pensiamo che una persona o società abbia il diritto di smettere di 
lavorare
-su un particolare programma; l'errore in questo caso sta nel fatto che
-Microsoft lo fa dopo aver reso gli utenti dipendenti dal proprio software, e
-quindi non è libera di chiedere a qualcun altro di lavorare al programma in
-sua vece.</p></li>
+<h3 id="tyrants">Tiranni di Microsoft</h3>
+<ul>
+  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>I
+dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>: non
+permettono agli utenti di installare sistemi operativi diversi o 
modificati.</p></li>
 </ul>
 
+
 <p>Come mostrato da questa pagina, se si vuole ripulire il proprio computer dal
 malware, il primo programma da disinstallare è Windows.</p>
 
@@ -192,7 +267,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/06/25 09:57:49 $
+$Date: 2015/06/27 22:00:30 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-surveillance.it.html    31 May 2015 23:58:04 -0000      1.3
+++ proprietary-surveillance.it.html    27 Jun 2015 22:00:30 -0000      1.4
@@ -100,6 +100,29 @@
 </div>
 
 <ul>
+  <li><p>
+  Microsoft usa le "condizioni sulla privacy" di Windows 10 per arrogarsi il
+"diritto" di spiare i file degli utenti in qualsiasi momento. La cifratura
+del disco con Windows 10 <a
+href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+dà una chiave anche a Microsoft</a>.</p>
+
+  <p>Quindi Windows è da considerarsi malware anche sotto il profilo della
+sorveglianza.</p>
+
+  <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su 
richiesta
+del governo statunitense, ma le "condizioni sulla privacy" non lo dicono
+esplicitamente. E cosa succederebbe se fosse il governo cinese a presentare
+richiesta?</p>
+
+  <p>Grazie all'"identificatore unico" per la pubblicità, diverso per ciascun
+utente, altre aziende possono controllare l'attività di navigazione di ogni
+specifico utente.</p>
+
+  <p>Pare che Microsoft abbia deciso di rendere Windows 10 davvero malvagio 
sotto
+tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
+subito Windows.</p></li>
+
   <li><p>Col tempo, questo problema non può che peggiorare. <a
 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>Windows
 10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
@@ -108,11 +131,6 @@
   </li>
 
   <li><p><a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
-Update spia l'utente</a>.</p>
-  </li>
-
-  <li><p><a
 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>Windows
 8.1 curiosa nelle ricerche locali</a>.</p>
   </li>
@@ -122,9 +140,9 @@
   </li>
 </ul>
 
-<p>C'è molto altro <a
-href="/philosophy/proprietary/malware-microsoft.html">malware di
-Microsoft</a>.</p>
+<p>Lo spionaggio di Microsoft sugli utenti non è cominciato con Windows 10. 
C'è
+molto altro <a href="/philosophy/proprietary/malware-microsoft.html">malware
+di Microsoft</a>.</p>
 
 
 <div class="big-subsection">
@@ -683,7 +701,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/05/31 23:58:04 $
+$Date: 2015/06/27 22:00:30 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-microsoft.it-en.html     25 Jun 2015 09:57:49 -0000      1.2
+++ po/malware-microsoft.it-en.html     27 Jun 2015 22:00:31 -0000      1.3
@@ -3,10 +3,17 @@
 <title>Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
 <!--#include virtual="/server/banner.html" -->
+
 <h2>Microsoft's Software is Malware</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
+<p><a href="https://gnu.org/philosophy/proprietary.html";>Other examples of 
proprietary
 malware</a></p>
 
 <div class="highlight-para">
@@ -18,9 +25,9 @@
 
 <p>
 Malware and nonfree software are two different issues.  The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
+between <a href="https://gnu.org/philosophy/free-sw.html";>free software</a> and
 nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
+<a href="https://gnu.org/philosophy/free-software-even-more-important.html";>
 whether the users have control of the program or vice versa</a>.  It's
 not directly a question of what the program <em>does</em> when it
 runs.  However, in practice nonfree software is often malware,
@@ -29,25 +36,39 @@
 </p>
 </div>
 
+<div class="toc">
+<div class="malfunctions">
 <ul>
-  <li><p><a
-    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-    Windows 10 requires users to give permission for total snooping</a>,
-    including their files, their commands, their text input, and their
-    voice input.</p></li>
-  <li><p>Microsoft Windows has a universal back door through which <a 
-  
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>
+<li><strong>Type&nbsp;of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Microsoft Back Doors</h3>
+<ul>
+  <li><p>Microsoft Windows has a universal back door through which <a 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>
   any change whatsoever can be imposed on the users</a>.</p>
 
-  <p>More information on when <a 
-  href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
   this was used</a>.</p>
 
-  <p>In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&ldquo; will be
+  <p>In Windows 10, the universal back door is no longer hidden; all 
“upgrades“ will be
   <a 
href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&amp;articleid=42633691&amp;source=googleplus";>forcibly
 and immediately imposed</a>.</p></li>
 
-  <li><p><a 
-  
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+  <li><p><a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
   Windows 8 also has a back door for remotely deleting apps</a>.</p>
 
   <p>You might well decide to let a security service that you trust
@@ -55,58 +76,93 @@
   But there is no excuse for <em>deleting</em> the programs, and you
   should have the right to decide who (if anyone) to trust in this 
way.</p></li>
 
-  <li><p>Windows 8's back doors are so gaping that <a 
-  
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
+  <li><p>Windows 8's back doors are so gaping that <a 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
   the German government has decided it can't be trusted</a>.</p></li>
+</ul>
 
-  <li><p><a 
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail</a>: it censors the
-  user's choice of application programs.</p></li>
+<h3 id="sabotage">Microsoft Sabotage</h3>
+<ul>
+  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
+  Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
  
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>: they block
-  users from installing other or modified operating systems.</p></li>
+  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
+  Microsoft cut off security fixes for Windows XP, except to some big users
+  that pay exorbitantly.</a></p>
 
-  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
-  DRM (digital restrictions mechanisms) in Windows</a>, introduced to
-  cater to <a href="/philosophy/proprietary-drm.html#bluray">Bluray</a> disks. 
 
-  (The article also talks about how the same malware would later be introduced 
-  in MacOS.)</p></li>
+  <p>Microsoft is going to
+  <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
+  cut off support for some Internet Explorer versions</a> in the same way.</p>
+
+  <p>I think a person or company has the right to cease to work on a
+  particular program; the wrong here is Microsoft does this after having
+  made the users dependent on Microsoft, so they are not free to ask
+  someone else to work on the program for them.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+<ul>
+  <li><p>
+  Microsoft uses Windows 10's "privacy policy" to overtly impose a
+  "right" to look at users' files at any time. Windows 10 full disk
+  encryption <a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+  gives Microsoft a key</a>.</p>
+
+  <p>Thus, Windows is overt malware in regard to surveillance,
+  as in other issues.</p>
+
+  <p>We can suppose Microsoft look at users' files for the US government on
+  demand, though the "privacy policy" does not explicit say so. Will it
+  look at users' files for the Chinese government on demand?</p>
+
+  <p>The unique "advertising ID" for each user enables other companies to
+  track the browsing of each specific user.</p>
+
+  <p>It's as if Microsoft has deliberately chosen to make Windows 10
+  maximally evil on every dimeinsion; to make a grab for total power
+  over anyone that doesn't drop Windows now.</p></li>
+
+  <li><p><a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+  Windows 10 requires users to give permission for total snooping</a>,
+  including their files, their commands, their text input, and their
+  voice input.</p></li>
 
-  <li>Spyware in Windows: <a 
-  href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+  <li>Spyware in Windows: <a 
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
   Windows Update snoops on the user.</a>
-  <a 
-  
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+  <a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
   Windows 8.1 snoops on local searches.</a> And there's a 
   <a href="http://www.marketoracle.co.uk/Article40836.html";>
   secret NSA key in Windows</a>, whose functions we don't know.</li>
 
-  <li><p><a 
-  
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-  Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
   <li><p>
   <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
   Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
   </li>
+</ul>
 
-  <li><p><a 
-  
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
-  Microsoft cut off security fixes for Windows XP, except to some big users 
-  that pay exorbitantly.</a></p>
+<h3 id="drm">Microsoft DRM</h3>
+<ul>
+  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
+  DRM (digital restrictions mechanisms) in Windows</a>, introduced to
+  cater to <a 
href="https://gnu.org/philosophy/proprietary-drm.html#bluray";>Bluray</a> disks.
+  (The article also talks about how the same malware would later be introduced
+  in MacOS.)</p></li>
+</ul>
 
-    <p>Microsoft is going to
-      <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
-       cut off support for some Internet Explorer versions</a> in the same 
way.</p>
+<h3 id="jails">Microsoft Jails</h3>
+<ul>
+  <li><p><a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
+  Windows 8 on “mobile devices” is a jail</a>: it censors the
+  user's choice of application programs.</p></li>
+</ul>
 
-  <p>I think a person or company has the right to cease to work on a
-  particular program; the wrong here is Microsoft does this after having
-  made the users dependent on Microsoft, so they are not free to ask
-  someone else to work on the program for them.</p></li>
+<h3 id="tyrants">Microsoft Tyrants</h3>
+<ul>
+  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+  Mobile devices that come with Windows 8 are tyrants</a>: they block
+  users from installing other or modified operating systems.</p></li>
 </ul>
 
+
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
 
@@ -167,7 +223,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/06/25 09:57:49 $
+$Date: 2015/06/27 22:00:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-microsoft.it.po  27 Jun 2015 21:29:01 -0000      1.12
+++ po/malware-microsoft.it.po  27 Jun 2015 22:00:32 -0000      1.13
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-surveillance.it-en.html      31 May 2015 23:58:04 -0000      
1.3
+++ po/proprietary-surveillance.it-en.html      27 Jun 2015 22:00:32 -0000      
1.4
@@ -99,6 +99,26 @@
 </div>
 
 <ul>
+  <li><p>
+  Microsoft uses Windows 10's "privacy policy" to overtly impose a
+  "right" to look at users' files at any time. Windows 10 full disk
+  encryption <a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+  gives Microsoft a key</a>.</p>
+
+  <p>Thus, Windows is overt malware in regard to surveillance,
+  as in other issues.</p>
+
+  <p>We can suppose Microsoft look at users' files for the US government on
+  demand, though the "privacy policy" does not explicit say so. Will it
+  look at users' files for the Chinese government on demand?</p>
+
+  <p>The unique "advertising ID" for each user enables other companies to
+  track the browsing of each specific user.</p>
+
+  <p>It's as if Microsoft has deliberately chosen to make Windows 10
+  maximally evil on every dimeinsion; to make a grab for total power
+  over anyone that doesn't drop Windows now.</p></li>
+
   <li><p>It only gets worse with time.
       <a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
       Windows 10 requires users to give permission for total snooping</a>,
@@ -106,10 +126,6 @@
       voice input.</p>
   </li>
 
-  <li><p><a 
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-      Windows Update snoops on the user.</a></p>
-  </li>
-
   <li><p><a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
       Windows 8.1 snoops on local searches.</a>.</p>
   </li>
@@ -120,7 +136,8 @@
   </li>
 </ul>
 
-<p>There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+<p>Microsoft's snooping on users did not start with Windows 10.
+   There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
    Microsoft malware</a>.</p>
 
 
@@ -635,7 +652,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/05/31 23:58:04 $
+$Date: 2015/06/27 22:00:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-surveillance.it.po   27 Jun 2015 21:29:01 -0000      1.12
+++ po/proprietary-surveillance.it.po   27 Jun 2015 22:00:32 -0000      1.13
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -265,13 +264,7 @@
 "E c'è una <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>chiave 
"
 "segreta dell'NSA in Windows</a>, le cui funzioni sono a noi ignote."
 
-# | {+Microsoft's snooping on users did not start with Windows 10.+}  There's
-# | a lot more <a href=\"/philosophy/proprietary/malware-microsoft.html\">
-# | Microsoft malware</a>.
 #. type: Content of: <p>
-#| msgid ""
-#| "There's a lot more <a href=\"/philosophy/proprietary/malware-microsoft."
-#| "html\"> Microsoft malware</a>."
 msgid ""
 "Microsoft's snooping on users did not start with Windows 10.  There's a lot "
 "more <a href=\"/philosophy/proprietary/malware-microsoft.html\"> Microsoft "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]