[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-kindle-swindle.html
From: |
Félicien PILLOT |
Subject: |
www/proprietary malware-kindle-swindle.html |
Date: |
Wed, 22 Feb 2017 13:03:22 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: FĂ©licien PILLOT <felandral> 17/02/22 13:03:22
Modified files:
proprietary : malware-kindle-swindle.html
Log message:
[#1193185] The page is now about Amazon's products, globally.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.html?cvsroot=www&r1=1.13&r2=1.14
Patches:
Index: malware-kindle-swindle.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-kindle-swindle.html 15 Feb 2017 09:43:33 -0000 1.13
+++ malware-kindle-swindle.html 22 Feb 2017 18:03:20 -0000 1.14
@@ -1,6 +1,6 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.79 -->
-<title>Malware in the Kindle Swindle
+<title>Amazon's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-kindle-swindle.translist" -->
<style type="text/css" media="print,screen">
@@ -10,17 +10,10 @@
-->
</style>
<!--#include virtual="/server/banner.html" -->
-<h2>Malware in the Kindle Swindle</h2>
+<h2>Amazon's Software Is Malware</h2>
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
-<p>We refer to this product as the
-<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
-management (DRM)</a> and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.</p>
-<p>This page focuses on the Amazon Swindle but covers other Amazon products
too.</p>
-
<div class="highlight-para">
<p>
Malware and nonfree software are two different issues. Malware means
@@ -38,45 +31,61 @@
<div class="toc">
<div class="malfunctions">
-<ul>
-<li><strong>Type of malware</strong></li>
-<li><a href="#swindle-back-doors">Back doors</a></li>
-<!--<li><a href="#censorship">Censorship</a></li>-->
-<!--<li><a href="#insecurity">Insecurity</a></li>-->
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
-<!--<li><a href="#interference">Interference</a></li>-->
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
+ <ul>
+ <li><strong>Type of product</strong></li>
+ <li><a href="#swindle">Malware in the Kindle Swindle</a></li>
+ <li><a href="#echo">Malware in the Echo</a></li>
+ </ul>
+</div>
+</div>
+
+<h2 id="swindle">Malware in the Kindle Swindle</h2>
+
+<p>We refer to this product as the
+<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
+because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
+management (DRM)</a> and <a href="/philosophy/ebooks.html">
+other malicious functionalities</a>.</p>
+
+<div class="toc">
+ <div class="malfunctions">
+ <ul>
+ <li><strong>Type of malware</strong></li>
+ <li><a href="#back-doors">Back doors</a></li>
+ <!--<li><a href="#censorship">Censorship</a></li>-->
+ <!--<li><a href="#insecurity">Insecurity</a></li>-->
+ <!--<li><a href="#sabotage">Sabotage</a></li>-->
+ <!--<li><a href="#interference">Interference</a></li>-->
+ <li><a href="#surveillance">Surveillance</a></li>
+ <li><a href="#drm">Digital restrictions
management</a> or “DRM” means functionalities designed
to restrict what users can do with the data in their computers.</li>
-<!--<li><a href="#jails">Jails</a>—systems
+ <!--<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>-->
-<!--<li><a href="#tyrants">Tyrants</a>—systems
+ <!--<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>-->
-<li><strong>Other Amazon Products</strong></li>
-<li><a href="#echo-back-doors">Amazon Echo Back Doors</a></li>
-</ul>
-</div>
+ </ul>
+ </div>
</div>
-<h3 id="swindle-back-doors">Amazon Kindle Swindle Back Doors</h3>
+<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
-<li>
-<p>The Amazon Kindle-Swindle has a back door that has been used to
-<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
-remotely erase books</a>. One of the books erased was 1984, by George Orwell.
-</p>
-
-<p>Amazon responded to criticism by saying it would delete books only
-following orders from the state. However, that policy didn't last.
-In 2012
-it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
-a user's Kindle-Swindle and deleted her account</a>, then offered her
-kafkaesque “explanations.”</p>
-</li>
+ <li>
+ <p>The Amazon Kindle-Swindle has a back door that has been used to
+ <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of the books erased was 1984, by George
Orwell.
+ </p>
+
+ <p>Amazon responded to criticism by saying it would delete books only
+ following orders from the state. However, that policy didn't last.
+ In 2012
+ it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+ a user's Kindle-Swindle and deleted her account</a>, then offered her
+ kafkaesque “explanations.”</p>
+ </li>
-<li>
+ <li>
<p>The Kindle also has a
<a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
universal back door</a>.</p>
@@ -104,9 +113,9 @@
facts.</p></li>
</ul>
-<h2>Other Amazon Products</h2>
+<h2 id="echo">Malware in the Echo</h2>
-<h3 id="echo-back-doors">Amazon Echo Back Doors</h3>
+<h3>Amazon Echo Back Doors</h3>
<ul>
<li><p>The Amazon Echo appears to have a universal back door, since
<a href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -174,7 +183,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/02/15 09:43:33 $
+$Date: 2017/02/22 18:03:20 $
<!-- timestamp end -->
</p>
</div>