[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.html malware-kind...
From: |
Joerg Kohne |
Subject: |
www/proprietary malware-apple.html malware-kind... |
Date: |
Tue, 03 May 2016 17:51:13 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Joerg Kohne <joeko> 16/05/03 17:51:13
Modified files:
proprietary : malware-apple.html malware-kindle-swindle.html
malware-mobiles.html
proprietary-back-doors.html
proprietary-censorship.html
proprietary-deception.html proprietary-drm.html
proprietary-insecurity.html
proprietary-jails.html
proprietary-sabotage.html
proprietary-surveillance.html
proprietary-tyrants.html
Log message:
(linc-report) Fix link.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.html?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-apple.html 22 Apr 2016 16:27:45 -0000 1.26
+++ malware-apple.html 3 May 2016 17:51:11 -0000 1.27
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Apple's Operating Systems Are Malware</h2>
-<p><a href="/philosophy/proprietary/">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<div class="highlight-para">
<p>
@@ -170,7 +170,7 @@
<li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a href="/philosophy/proprietary-jails.html">Apple
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.</p>
</li>
@@ -401,7 +401,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/04/22 16:27:45 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-kindle-swindle.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-kindle-swindle.html 29 Jun 2015 08:08:35 -0000 1.4
+++ malware-kindle-swindle.html 3 May 2016 17:51:11 -0000 1.5
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware in the Kindle Swindle</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>We refer to this product as the
<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -147,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/06/29 08:08:35 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-mobiles.html 18 Mar 2016 05:24:01 -0000 1.12
+++ malware-mobiles.html 3 May 2016 17:51:11 -0000 1.13
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<div class="highlight-para">
@@ -35,7 +35,7 @@
</div>
<p>Here are examples of malware in mobile devices. See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
+the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple iThings.</p>
<div class="toc">
@@ -62,9 +62,10 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
- is employed to listen through their microphones</a>.</p></li>
+ <li><p>The universal back door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ </li>
<li><p>Most mobile phones have a universal back door, which has been
used to <a
@@ -78,7 +79,7 @@
device.</p>
</li>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the system.</p>
</li>
@@ -89,13 +90,11 @@
called GTalkService).
</p>
- <p>
- Google can
- also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">forcibly
- and remotely install apps</a> through GTalkService (which seems, since
- that article, to have been merged into Google Play). This adds up to
- a universal back door.
- </p>
+<p>Google can also <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
+title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
+install apps</a> through GTalkService (which seems, since that article, to have
+been merged into Google Play). This adds up to a universal back door. </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -208,10 +207,11 @@
<h3 id="jails">Mobile Jails</h3>
<ul>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>. <a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail.</a></p>
+ <li><p><a
+ href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Mobile
+ devices that come with Windows 8 are tyrants</a>. <a
+
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
+ 8 on “mobile devices” is a jail.</a></p>
</li>
</ul>
@@ -279,7 +279,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/03/18 05:24:01 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-back-doors.html 25 Jan 2016 12:54:47 -0000 1.24
+++ proprietary-back-doors.html 3 May 2016 17:51:11 -0000 1.25
@@ -5,15 +5,16 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Back Doors</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of demonstrated back doors in proprietary software.</p>
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
- <li><p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
- is employed to listen through their microphones</a>.</p></li>
+ <li><p>The universal back door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ </li>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored its disk encryption</a>.</p></li>
@@ -226,7 +227,7 @@
</li>
<li>
-<p><a
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">
+<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a dlink
of an eye.
</p>
@@ -316,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/01/25 12:54:47 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-censorship.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-censorship.html 30 Mar 2016 11:12:25 -0000 1.11
+++ proprietary-censorship.html 3 May 2016 17:51:11 -0000 1.12
@@ -7,7 +7,7 @@
<p>Here are examples of proprietary systems that impose censorship on
what their users can access. We have a <a
-href="/philosophy/proprietary/proprietary-jails.html">separate
+href="/proprietary/proprietary-jails.html">separate
list of proprietary systems that censor installation</a> of
application programs (we call them “jails”.)</p>
@@ -123,7 +123,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/03/30 11:12:25 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-deception.html 30 Nov 2015 16:13:00 -0000 1.8
+++ proprietary-deception.html 3 May 2016 17:51:11 -0000 1.9
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Deception</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<p>This document reports instances where proprietary software is
dishonest or conceals deception or trickery.</p>
@@ -92,7 +92,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/11/30 16:13:00 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-drm.html 20 Jan 2016 21:55:12 -0000 1.3
+++ proprietary-drm.html 3 May 2016 17:51:11 -0000 1.4
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary DRM</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
@@ -192,7 +192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/01/20 21:55:12 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-insecurity.html 2 May 2016 18:34:49 -0000 1.29
+++ proprietary-insecurity.html 3 May 2016 17:51:11 -0000 1.30
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Insecurity</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/02 18:34:49 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-jails.html 6 Oct 2015 20:53:54 -0000 1.6
+++ proprietary-jails.html 3 May 2016 17:51:11 -0000 1.7
@@ -73,9 +73,8 @@
</li>
<li>
-<p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 on “mobile devices” is a jail.</a>
-</p>
+<p><a
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8 on “mobile devices” is a jail.</a></p>
</li>
<li>
@@ -145,7 +144,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/06 20:53:54 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-sabotage.html 22 Apr 2016 16:27:45 -0000 1.25
+++ proprietary-sabotage.html 3 May 2016 17:51:11 -0000 1.26
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Sabotage</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of proprietary software that has something
worse than a back door.</p>
@@ -138,7 +138,7 @@
<a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">An
Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
+not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.
</p></li>
@@ -177,27 +177,21 @@
begin to snoop on them and distribute their personal data.
</p></li>
-<li><p>
-Oracle's nonfree Java plug-in for
-browsers <a
href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539">sneakily
-installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software. For instance, it regards the inclusion of proprietary Flash
-Player (which has
-a <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">surveillance
-feature</a> and DRM) in Chrome as a good thing. Chrome is a
-proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java">Oracle
-insisted on continuing this practice.</a>
-</p></li>
+<li><p>Oracle's nonfree Java plug-in for browsers <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/">sneakily
installs other annoying proprietary software</a>.</p>
+<p>That article disregards all other bad things about proprietary software.
For
+instance, it regards the inclusion of proprietary Flash Player (which has a <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">surveillance
feature</a> and DRM) in Chrome as a good thing. Chrome
+is a proprietary browser with a universal back door.</p>
+
+<p>We don't agree with the article's views on those issues, but we present it
+as a factual reference.</p>
+
+<p>In 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle
insisted on continuing
+this practice.</a></p>
+</li>
</ul>
</div><!-- for id="content", starts in the include above -->
@@ -257,7 +251,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/04/22 16:27:45 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-surveillance.html 2 May 2016 18:34:49 -0000 1.56
+++ proprietary-surveillance.html 3 May 2016 17:51:11 -0000 1.57
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Surveillance</h2>
-<p><a href="/philosophy/proprietary/proprietary.html">
+<p><a href="/proprietary/proprietary.html">
Other examples of proprietary malware</a></p>
<div class="toc">
@@ -72,11 +72,11 @@
<p>For decades, the Free Software movement has been denouncing the
abusive surveillance machine of
-<a href="/philosophy/proprietary/proprietary.html">proprietary software</a>
+<a href="/proprietary/proprietary.html">proprietary software</a>
companies such as
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a>
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
and
-<a href="/philosophy/proprietary/malware-apple.html">Apple</a>.
+<a href="/proprietary/malware-apple.html">Apple</a>.
In the recent years, this tendency to watch people has spread across
industries, not only in the software business, but also in the
@@ -170,7 +170,7 @@
voice input.</p>
</li>
- <li><p><a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches.</a>.</p>
</li>
@@ -181,7 +181,7 @@
</ul>
<p>Microsoft's snooping on users did not start with Windows 10.
- There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+ There's a lot more <a href="/proprietary/malware-microsoft.html">
Microsoft malware</a>.</p>
@@ -230,7 +230,7 @@
</ul>
<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
-<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
<div class="big-subsection">
@@ -273,7 +273,7 @@
hidden general surveillance package such as Carrier IQ.</a></p>
</li>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the system.</p>
</li>
</ul>
@@ -837,12 +837,11 @@
users that don't have Facebook accounts.</p>
</li>
- <li><p>Many web sites rat their visitors to advertising networks
- that track users. Of the top 1000 web sites,
- <a
href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/">
- 93% fed
- their visitors third-party cookies, allowing other sites to
- track them</a>.</p>
+ <li><p>Many web sites rat their visitors to advertising networks that track
+ users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+ sites to track them</a>.</p>
</li>
<li><p>Many web sites report all their visitors to Google by using
@@ -868,12 +867,13 @@
</div>
<ul>
- <li><p>Google Chrome makes it easy for an extension to
- do <a
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">total
+ <li><p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do so.</p>
</li>
</ul>
+
<div class="big-subsection">
<h4 id="SpywareInFlash">Spyware in Flash</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
@@ -972,7 +972,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/02 18:34:49 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tyrants.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-tyrants.html 16 Oct 2015 18:25:57 -0000 1.4
+++ proprietary-tyrants.html 3 May 2016 17:51:11 -0000 1.5
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Tyrants</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>A <em>tyrant</em> device is one that refuses to allow users to
install a different operating system or a modified operating
@@ -114,7 +114,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/16 18:25:57 $
+$Date: 2016/05/03 17:51:11 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.html malware-kind...,
Joerg Kohne <=