[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.it.html propr...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.it.html propr... |
Date: |
Sat, 27 Jun 2015 22:00:33 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/06/27 22:00:33
Modified files:
proprietary : malware-microsoft.it.html
proprietary-surveillance.it.html
proprietary/po : malware-microsoft.it-en.html
malware-microsoft.it.po
proprietary-surveillance.it-en.html
proprietary-surveillance.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.12&r2=1.13
Patches:
Index: malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-microsoft.it.html 25 Jun 2015 09:57:49 -0000 1.2
+++ malware-microsoft.it.html 27 Jun 2015 22:00:30 -0000 1.3
@@ -7,11 +7,19 @@
<title>Il software di Microsoft è malware - Progetto GNU - Free Software
Foundation</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
<!--#include virtual="/server/banner.it.html" -->
<h2>Il software di Microsoft è malware</h2>
-<p><a href="/philosophy/proprietary.html">Altri esempi di malware
-proprietario</a></p>
+<p><a href="https://gnu.org/philosophy/proprietary.html">Altri esempi di
+malware proprietario</a></p>
<div class="highlight-para">
<p>
@@ -22,8 +30,9 @@
<p>
Malware e software non libero sono due problemi separati. La differenza tra
-<a href="/philosophy/free-sw.html">software libero</a> e software non libero
-sta nell'<a href="/philosophy/free-software-even-more-important.html">avere
+<a href="https://gnu.org/philosophy/free-sw.html">software libero</a> e
+software non libero sta nell'<a
+href="https://gnu.org/philosophy/free-software-even-more-important.html">avere
controllo del programma o viceversa</a>. Non è una questione che riguarda
direttamente ciò che il programma <em>fa</em> in esecuzione. Comunque, nella
pratica, il software non libero è spesso malware, perché gli sviluppatori,
@@ -32,12 +41,32 @@
</p>
</div>
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Tipo di malware</strong></li>
+<li><a href="#back-doors">Backdoor</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotaggio</a></li>
+<li><a href="#surveillance">Sorveglianza</a></li>
+<li><a href="#drm">DRM</a> (che chiamiamo âDigital restrictions
managementâ, in
+italiano, âgestione digitale delle restrizioniâ) significa funzionalitÃ
+volte a limitare il controllo che gli utenti hanno sui dati contenuti nei
+propri computer.</li>
+<li><a href="#jails">Prigioni</a>—sistemi che impongono restrizioni alle
+applicazioni.</li>
+<li><a href="#tyrants">Tiranni</a>—sistemi che vietano l'installazione di
+sistemi operativi non âautorizzatiâ dal produttore.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Backdoor di Microsoft</h3>
<ul>
- <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">Windows
-10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
-che include i loro file, i loro comandi, il testo da loro immesso e quello
-da loro pronunciato.</p></li>
<li><p>Microsoft Windows ha una backdoor universale tramite la quale <a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">si
può imporre agli utenti un qualsiasi cambiamento</a>.</p>
@@ -47,7 +76,7 @@
stata usata</a>.</p>
<p>In Windows 10 la backdoor universale non è più nascosta: tutti gli
-“aggironamenti“ saranno <a
+“aggiornamenti” saranno <a
href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&articleid=42633691&source=googleplus">forzati
e immediati</a>.</p></li>
@@ -64,20 +93,61 @@
<li><p>Le backdoor di Windows 8 sono larghe al punto da <a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">far
concludere al governo tedesco che non ci si possa fidare di
questo</a>.</p></li>
+</ul>
+<h3 id="sabotage">Sabotaggio di Microsoft</h3>
+<ul>
<li><p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">Windows
-8 sui “dispositivi mobili” è una prigione</a>: censura la scelta
-delle applicazioni da parte dell'utente.</p></li>
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">I
-dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>: non
-permettono agli utenti di installare sistemi operativi diversi o
modificati.</p></li>
+ <li><p><a
+href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">Microsoft
+ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
+meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
- <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM in
-Windows</a>, introdotto per soddisfare i requisiti dei dischi <a
-href="#bluray">Bluray</a>. (L'articolo spiega come lo stesso malware sarà ,
-in un momento successivo, introdotto in MacOS).</p></li>
+ <p>Microsoft <a
+href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+sospenderà il supporto per alcune versioni di Internet Explorer</a> allo
+stesso modo.</p>
+
+ <p>Pensiamo che una persona o società abbia il diritto di smettere di
lavorare
+su un particolare programma; l'errore in questo caso sta nel fatto che
+Microsoft lo fa dopo aver reso gli utenti dipendenti dal proprio software, e
+quindi non è libera di chiedere a qualcun altro di lavorare al programma in
+sua vece.</p></li>
+</ul>
+
+<h3 id="surveillance">Sorveglianza di Microsoft</h3>
+<ul>
+ <li><p>
+ Microsoft usa le "condizioni sulla privacy" di Windows 10 per arrogarsi il
+"diritto" di spiare i file degli utenti in qualsiasi momento. La cifratura
+del disco con Windows 10 <a
+href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+dà una chiave anche a Microsoft</a>.</p>
+
+ <p>Quindi Windows è da considerarsi malware anche sotto il profilo della
+sorveglianza.</p>
+
+ <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su
richiesta
+del governo statunitense, ma le "condizioni sulla privacy" non lo dicono
+esplicitamente. E cosa succederebbe se fosse il governo cinese a presentare
+richiesta?</p>
+
+ <p>Grazie all'"identificatore unico" per la pubblicità , diverso per ciascun
+utente, altre aziende possono controllare l'attività di navigazione di ogni
+specifico utente.</p>
+
+ <p>Pare che Microsoft abbia deciso di rendere Windows 10 davvero malvagio
sotto
+tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
+subito Windows.</p></li>
+
+ <li><p><a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">Windows
+10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
+che include i loro file, i loro comandi, il testo da loro immesso e quello
+da loro pronunciato.</p></li>
<li>Spyware in Windows: <a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">Windows
@@ -87,33 +157,38 @@
href="http://www.marketoracle.co.uk/Article40836.html">chiave segreta
dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
- <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
-informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
-
<li><p>
<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft
SkyDrive permette all'NSA di esaminare direttamente i dati degli
utenti</a>.</p>
</li>
+</ul>
- <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">Microsoft
-ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
-meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
+<h3 id="drm">DRM di Microsoft</h3>
+<ul>
+ <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM in
+Windows</a>, introdotto per soddisfare i requisiti dei dischi <a
+href="https://gnu.org/philosophy/proprietary-drm.html#bluray">Bluray</a>.
+(L'articolo spiega come lo stesso malware sarà , in un momento successivo,
+introdotto in MacOS).</p></li>
+</ul>
- <p>Microsoft <a
-href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
-sospenderà il supporto per alcune versioni di Internet Explorer</a> allo
-stesso modo.</p>
+<h3 id="jails">Prigioni di Microsoft</h3>
+<ul>
+ <li><p><a
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">Windows
+8 sui “dispositivi mobili” è una prigione</a>: censura la scelta
+delle applicazioni da parte dell'utente.</p></li>
+</ul>
- <p>Pensiamo che una persona o società abbia il diritto di smettere di
lavorare
-su un particolare programma; l'errore in questo caso sta nel fatto che
-Microsoft lo fa dopo aver reso gli utenti dipendenti dal proprio software, e
-quindi non è libera di chiedere a qualcun altro di lavorare al programma in
-sua vece.</p></li>
+<h3 id="tyrants">Tiranni di Microsoft</h3>
+<ul>
+ <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">I
+dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>: non
+permettono agli utenti di installare sistemi operativi diversi o
modificati.</p></li>
</ul>
+
<p>Come mostrato da questa pagina, se si vuole ripulire il proprio computer dal
malware, il primo programma da disinstallare è Windows.</p>
@@ -192,7 +267,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/06/25 09:57:49 $
+$Date: 2015/06/27 22:00:30 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-surveillance.it.html 31 May 2015 23:58:04 -0000 1.3
+++ proprietary-surveillance.it.html 27 Jun 2015 22:00:30 -0000 1.4
@@ -100,6 +100,29 @@
</div>
<ul>
+ <li><p>
+ Microsoft usa le "condizioni sulla privacy" di Windows 10 per arrogarsi il
+"diritto" di spiare i file degli utenti in qualsiasi momento. La cifratura
+del disco con Windows 10 <a
+href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+dà una chiave anche a Microsoft</a>.</p>
+
+ <p>Quindi Windows è da considerarsi malware anche sotto il profilo della
+sorveglianza.</p>
+
+ <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su
richiesta
+del governo statunitense, ma le "condizioni sulla privacy" non lo dicono
+esplicitamente. E cosa succederebbe se fosse il governo cinese a presentare
+richiesta?</p>
+
+ <p>Grazie all'"identificatore unico" per la pubblicità , diverso per ciascun
+utente, altre aziende possono controllare l'attività di navigazione di ogni
+specifico utente.</p>
+
+ <p>Pare che Microsoft abbia deciso di rendere Windows 10 davvero malvagio
sotto
+tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
+subito Windows.</p></li>
+
<li><p>Col tempo, questo problema non può che peggiorare. <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">Windows
10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
@@ -108,11 +131,6 @@
</li>
<li><p><a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">Windows
-Update spia l'utente</a>.</p>
- </li>
-
- <li><p><a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
8.1 curiosa nelle ricerche locali</a>.</p>
</li>
@@ -122,9 +140,9 @@
</li>
</ul>
-<p>C'è molto altro <a
-href="/philosophy/proprietary/malware-microsoft.html">malware di
-Microsoft</a>.</p>
+<p>Lo spionaggio di Microsoft sugli utenti non è cominciato con Windows 10.
C'è
+molto altro <a href="/philosophy/proprietary/malware-microsoft.html">malware
+di Microsoft</a>.</p>
<div class="big-subsection">
@@ -683,7 +701,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/05/31 23:58:04 $
+$Date: 2015/06/27 22:00:30 $
<!-- timestamp end -->
</p>
Index: po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-microsoft.it-en.html 25 Jun 2015 09:57:49 -0000 1.2
+++ po/malware-microsoft.it-en.html 27 Jun 2015 22:00:31 -0000 1.3
@@ -3,10 +3,17 @@
<title>Microsoft's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<!--#include virtual="/server/banner.html" -->
+
<h2>Microsoft's Software is Malware</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="https://gnu.org/philosophy/proprietary.html">Other examples of
proprietary
malware</a></p>
<div class="highlight-para">
@@ -18,9 +25,9 @@
<p>
Malware and nonfree software are two different issues. The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
+between <a href="https://gnu.org/philosophy/free-sw.html">free software</a> and
nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
+<a href="https://gnu.org/philosophy/free-software-even-more-important.html">
whether the users have control of the program or vice versa</a>. It's
not directly a question of what the program <em>does</em> when it
runs. However, in practice nonfree software is often malware,
@@ -29,25 +36,39 @@
</p>
</div>
+<div class="toc">
+<div class="malfunctions">
<ul>
- <li><p><a
-
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their
- voice input.</p></li>
- <li><p>Microsoft Windows has a universal back door through which <a
-
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
+<li><strong>Type of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Microsoft Back Doors</h3>
+<ul>
+ <li><p>Microsoft Windows has a universal back door through which <a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
any change whatsoever can be imposed on the users</a>.</p>
- <p>More information on when <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ <p>More information on when <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.</p>
- <p>In Windows 10, the universal back door is no longer hidden; all
“upgrades“ will be
+ <p>In Windows 10, the universal back door is no longer hidden; all
âupgradesâ will be
<a
href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&articleid=42633691&source=googleplus">forcibly
and immediately imposed</a>.</p></li>
- <li><p><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ <li><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
Windows 8 also has a back door for remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -55,58 +76,93 @@
But there is no excuse for <em>deleting</em> the programs, and you
should have the right to decide who (if anyone) to trust in this
way.</p></li>
- <li><p>Windows 8's back doors are so gaping that <a
-
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+ <li><p>Windows 8's back doors are so gaping that <a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
the German government has decided it can't be trusted</a>.</p></li>
+</ul>
- <li><p><a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail</a>: it censors the
- user's choice of application programs.</p></li>
+<h3 id="sabotage">Microsoft Sabotage</h3>
+<ul>
+ <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>: they block
- users from installing other or modified operating systems.</p></li>
+ <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
+ Microsoft cut off security fixes for Windows XP, except to some big users
+ that pay exorbitantly.</a></p>
- <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM (digital restrictions mechanisms) in Windows</a>, introduced to
- cater to <a href="/philosophy/proprietary-drm.html#bluray">Bluray</a> disks.
- (The article also talks about how the same malware would later be introduced
- in MacOS.)</p></li>
+ <p>Microsoft is going to
+ <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+ cut off support for some Internet Explorer versions</a> in the same way.</p>
+
+ <p>I think a person or company has the right to cease to work on a
+ particular program; the wrong here is Microsoft does this after having
+ made the users dependent on Microsoft, so they are not free to ask
+ someone else to work on the program for them.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+<ul>
+ <li><p>
+ Microsoft uses Windows 10's "privacy policy" to overtly impose a
+ "right" to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the "privacy policy" does not explicit say so. Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique "advertising ID" for each user enables other companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimeinsion; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
+ <li><p><a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their
+ voice input.</p></li>
- <li>Spyware in Windows: <a
- href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ <li>Spyware in Windows: <a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
- <a
-
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
Windows 8.1 snoops on local searches.</a> And there's a
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't know.</li>
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
- Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
<li><p>
<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
</li>
+</ul>
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
- Microsoft cut off security fixes for Windows XP, except to some big users
- that pay exorbitantly.</a></p>
+<h3 id="drm">Microsoft DRM</h3>
+<ul>
+ <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM (digital restrictions mechanisms) in Windows</a>, introduced to
+ cater to <a
href="https://gnu.org/philosophy/proprietary-drm.html#bluray">Bluray</a> disks.
+ (The article also talks about how the same malware would later be introduced
+ in MacOS.)</p></li>
+</ul>
- <p>Microsoft is going to
- <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
- cut off support for some Internet Explorer versions</a> in the same
way.</p>
+<h3 id="jails">Microsoft Jails</h3>
+<ul>
+ <li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
+ Windows 8 on âmobile devicesâ is a jail</a>: it censors the
+ user's choice of application programs.</p></li>
+</ul>
- <p>I think a person or company has the right to cease to work on a
- particular program; the wrong here is Microsoft does this after having
- made the users dependent on Microsoft, so they are not free to ask
- someone else to work on the program for them.</p></li>
+<h3 id="tyrants">Microsoft Tyrants</h3>
+<ul>
+ <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ Mobile devices that come with Windows 8 are tyrants</a>: they block
+ users from installing other or modified operating systems.</p></li>
</ul>
+
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -167,7 +223,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/06/25 09:57:49 $
+$Date: 2015/06/27 22:00:31 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-microsoft.it.po 27 Jun 2015 21:29:01 -0000 1.12
+++ po/malware-microsoft.it.po 27 Jun 2015 22:00:32 -0000 1.13
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-surveillance.it-en.html 31 May 2015 23:58:04 -0000
1.3
+++ po/proprietary-surveillance.it-en.html 27 Jun 2015 22:00:32 -0000
1.4
@@ -99,6 +99,26 @@
</div>
<ul>
+ <li><p>
+ Microsoft uses Windows 10's "privacy policy" to overtly impose a
+ "right" to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the "privacy policy" does not explicit say so. Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique "advertising ID" for each user enables other companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimeinsion; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
<li><p>It only gets worse with time.
<a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 requires users to give permission for total snooping</a>,
@@ -106,10 +126,6 @@
voice input.</p>
</li>
- <li><p><a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
- Windows Update snoops on the user.</a></p>
- </li>
-
<li><p><a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
Windows 8.1 snoops on local searches.</a>.</p>
</li>
@@ -120,7 +136,8 @@
</li>
</ul>
-<p>There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+<p>Microsoft's snooping on users did not start with Windows 10.
+ There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
Microsoft malware</a>.</p>
@@ -635,7 +652,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/05/31 23:58:04 $
+$Date: 2015/06/27 22:00:32 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-surveillance.it.po 27 Jun 2015 21:29:01 -0000 1.12
+++ po/proprietary-surveillance.it.po 27 Jun 2015 22:00:32 -0000 1.13
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -265,13 +264,7 @@
"E c'è una <a href=\"http://www.marketoracle.co.uk/Article40836.html\">chiave
"
"segreta dell'NSA in Windows</a>, le cui funzioni sono a noi ignote."
-# | {+Microsoft's snooping on users did not start with Windows 10.+} There's
-# | a lot more <a href=\"/philosophy/proprietary/malware-microsoft.html\">
-# | Microsoft malware</a>.
#. type: Content of: <p>
-#| msgid ""
-#| "There's a lot more <a href=\"/philosophy/proprietary/malware-microsoft."
-#| "html\"> Microsoft malware</a>."
msgid ""
"Microsoft's snooping on users did not start with Windows 10. There's a lot "
"more <a href=\"/philosophy/proprietary/malware-microsoft.html\"> Microsoft "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.it.html propr...,
GNUN <=