www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.de.html proprieta...


From: GNUN
Subject: www/proprietary malware-apple.de.html proprieta...
Date: Tue, 30 Aug 2016 22:58:00 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/30 22:58:00

Modified files:
        proprietary    : malware-apple.de.html 
                         proprietary-deception.de.html 
Added files:
        proprietary/po : malware-apple.de-diff.html 
                         proprietary-deception.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.de.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.de.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-apple.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.de.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-apple.de.html       20 Jun 2016 02:30:20 -0000      1.14
+++ malware-apple.de.html       30 Aug 2016 22:57:59 -0000      1.15
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.de.po">
+ https://www.gnu.org/proprietary/po/malware-apple.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-07-01" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
 </style>
 
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Apples Betriebssysteme sind Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele für proprietäre 
Schadsoftware</a></p>
@@ -565,7 +571,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2016/06/20 02:30:20 $
+$Date: 2016/08/30 22:57:59 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-deception.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.de.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-deception.de.html       6 May 2016 11:30:50 -0000       1.5
+++ proprietary-deception.de.html       30 Aug 2016 22:57:59 -0000      1.6
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-deception.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-deception.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-deception.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-deception.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-deception.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-07-01" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-deception.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.78 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-deception.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäres Blendwerk</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -128,7 +134,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2016/05/06 11:30:50 $
+$Date: 2016/08/30 22:57:59 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.de-diff.html
===================================================================
RCS file: po/malware-apple.de-diff.html
diff -N po/malware-apple.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-apple.de-diff.html       30 Aug 2016 22:58:00 -0000      1.1
@@ -0,0 +1,460 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-apple.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Apple's Operating Systems are Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how the software in Apple's computer products are
+malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here's how Apple's systems are malware.&lt;/p&gt;
+
+&lt;div class="toc"&gt;
+&lt;div class="malfunctions"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;/ul&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an
+&lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;, which could be
+exploited by attackers to gain root privileges.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door &lt;a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door for &lt;a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+enabling it without understanding.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Apple censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because of which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program from the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A <span class="inserted"><ins><em>vulnerability in Apple's Image 
I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A</em></ins></span> bug in the iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Apple
+actions that harm to the users of specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+      the user's file system for music files, copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing the security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;iOS version 9 for
+    iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving the verification code Apple 
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends to Apple servers unsaved documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided to save are even more sensitive than the
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to Apple servers without asking 
permission&lt;/a&gt;.
+  This exposes the files to Big Brother and perhaps to other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't have a malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove the malfeature unless many users push back hard, and the users
+  can't remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo; of iOS seem to exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The &lt;a
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+  get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does, &lt;a
+  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  Apple uses DRM software to prevent people from charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on the fact that a new model of Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS, the operating system of the Apple iThings, is a jail for
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here is an article about the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code is written in Swift.  Users
+  cannot do this freely because they are required to identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is a crack in the prison walls, it is not big enough to
+  mean that the iThings are no longer jails.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple arbitrarily
+  &lt;a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
+  blocks users from installing old versions of iOS&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThings are tyrant devices: they do not permit
+  installing a different or modified operating system.  There is a
+  port of Android to the iThings, but installing it
+  requires &lt;a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"&gt;
+  finding a bug or &ldquo;exploit&rdquo;&lt;/a&gt; to make it possible to
+  install a different system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+<span class="inserted"><ins><em>&lt;h3 id="deception"&gt;Apple 
Deception&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/08/30 22:58:00 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-deception.de-diff.html
===================================================================
RCS file: po/proprietary-deception.de-diff.html
diff -N po/proprietary-deception.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-deception.de-diff.html       30 Aug 2016 22:58:00 -0000      
1.1
@@ -0,0 +1,129 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-deception.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.78</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;title&gt;Proprietary Deception
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-deception.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Deception&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;This document reports instances where proprietary software is
+  dishonest or conceals deception or trickery.&lt;/p&gt;
+
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;The proprietor of the Pokémon Go 
game &lt;a
+href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
+  invites restaurants and other businesses to pay to have the game
+  lure people there&lt;/a&gt;.
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;A top-ranking proprietary Instagram client promising to tell
+      users who's been watching their pictures was in reality
+      &lt;a 
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
 their credentials&lt;/a&gt;,
+      advertising itself on their feed, and posting images without
+      their consent.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Volkswagen programmed its car engine computers to detect the
+      Environmental Protection Agency's emission tests,
+      and run dirty the rest of the time.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In real driving, the cars exceeded emissions standards by a
+      factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+      programming it this way, but would have made it harder to
+      conceal.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/08/30 22:58:00 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]