www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.it.html malware-a...


From: GNUN
Subject: www/proprietary malware-apple.it.html malware-a...
Date: Sat, 25 Mar 2017 23:59:48 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/03/25 23:59:48

Modified files:
        proprietary    : malware-apple.it.html malware-apple.ja.html 
                         malware-apple.nl.html 
                         proprietary-censorship.it.html 
                         proprietary-censorship.ja.html 
        proprietary/po : malware-apple.ja-diff.html 
                         malware-apple.nl-diff.html 
Added files:
        proprietary/po : malware-apple.it-diff.html 
                         proprietary-censorship.it-diff.html 
                         proprietary-censorship.ja-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ja.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.nl.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ja.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-apple.it.html       8 Dec 2016 20:57:31 -0000       1.19
+++ malware-apple.it.html       26 Mar 2017 03:59:47 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.it.po">
+ https://www.gnu.org/proprietary/po/malware-apple.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
 </style>
 
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>I sistemi operativi di Apple sono malware</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -499,7 +505,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/12/08 20:57:31 $
+$Date: 2017/03/26 03:59:47 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ja.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-apple.ja.html       20 Dec 2016 06:31:00 -0000      1.19
+++ malware-apple.ja.html       26 Mar 2017 03:59:47 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.ja.po">
+ https://www.gnu.org/proprietary/po/malware-apple.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
 </style>
 
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>Appleのオペレーティング・システムはマルウェアだ</h2>
 
 <p><a 
href="/proprietary/proprietary.html">ほかのプロプライエタリ・マルウェアの例</a></p>
@@ -365,7 +371,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/12/20 06:31:00 $
+$Date: 2017/03/26 03:59:47 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.nl.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.nl.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.nl.html       13 Jan 2017 20:58:57 -0000      1.5
+++ malware-apple.nl.html       26 Mar 2017 03:59:47 -0000      1.6
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.nl.po">
+ https://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
 </style>
 
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Apple's besturingssystemen zijn malware</h2>
 
 <p><a href="/proprietary/proprietary.html">Andere voorbeelden van niet-vrije
@@ -499,7 +505,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2017/01/13 20:58:57 $
+$Date: 2017/03/26 03:59:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-censorship.it.html      8 Oct 2016 21:29:03 -0000       1.10
+++ proprietary-censorship.it.html      26 Mar 2017 03:59:47 -0000      1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-censorship.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-censorship.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-censorship.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-censorship.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-censorship.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-censorship.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Censura Proprietaria</h2>
 
 <p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
@@ -164,7 +170,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/10/08 21:29:03 $
+$Date: 2017/03/26 03:59:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ja.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-censorship.ja.html      24 Jan 2017 03:40:30 -0000      1.10
+++ proprietary-censorship.ja.html      26 Mar 2017 03:59:47 -0000      1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-censorship.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-censorship.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-censorship.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-censorship.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-censorship.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-censorship.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>プロプライエタリな検閲</h2>
 
 
<p>不自由な(プロプライエタリな)ソフトウェアは実に多くのå
 ´åˆãƒžãƒ«ã‚¦ã‚§ã‚¢ã§ã™(ユーザを虐待するように設計
@@ -129,7 +135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/26 03:59:47 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-apple.ja-diff.html       21 Jun 2016 17:00:01 -0000      1.1
+++ po/malware-apple.ja-diff.html       26 Mar 2017 03:59:48 -0000      1.2
@@ -11,20 +11,20 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
 &lt;title&gt;Apple's Operating Systems are Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
-&lt;style type="text/css" media="print,screen"&gt;
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
 &lt;!--
 #content div.toc li { list-style: none; margin-bottom: 1em; }
 #content div.toc { margin-top: 1em; }
 --&gt;
-&lt;/style&gt;
+&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/"&gt;Other</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;Other</em></ins></span>
 examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
 
 &lt;div class="highlight-para"&gt;
 &lt;p&gt;
@@ -47,12 +47,14 @@
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Here's how Apple's systems are malware.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;
 
-&lt;div class="toc"&gt;
-&lt;div class="malfunctions"&gt;
+&lt;div class="toc"&gt;</strong></del></span>
+
+&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
-&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
@@ -68,9 +70,10 @@
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
 &lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
 &lt;ul&gt;
@@ -97,8 +100,29 @@
 
 &lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
 &lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple <span class="inserted"><ins><em>used its censorship system to enforce 
Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+apps.&lt;/p&gt;
+&lt;/li&gt;
+
 &lt;li&gt;&lt;p&gt;
-Apple <span class="inserted"><ins><em>censors
+Apple used its censorship system to enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</em></ins></span> censors
 games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
 some games from the cr&hellip;app store&lt;/a&gt; because of which political
 points they suggest. Some political points are apparently considered
@@ -106,7 +130,7 @@
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
 banned a program from the App Store&lt;/a&gt; because its developers
 committed the enormity of disassembling some iThings.
 &lt;/p&gt;&lt;/li&gt;
@@ -134,6 +158,13 @@
 
 &lt;ul&gt;
   &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
     &lt;p&gt;A bug in the iThings Messages
       app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
         a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
@@ -173,7 +204,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;The Apple Music client
+    &lt;p&gt;The Apple Music client
       program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
       the user's file system for music files, copies them to an Apple
       server, and deletes them&lt;/a&gt;.&lt;/p&gt;
@@ -186,7 +217,7 @@
       Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;iOS version 9 for
     iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
@@ -198,7 +229,7 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
   unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-jails.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple</em></ins></span>
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
   censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -211,6 +242,21 @@
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving the verification code Apple 
       sends to it.&lt;/p&gt;
@@ -285,7 +331,7 @@
   Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The &lt;a
+  &lt;li&gt;&lt;p&gt;The &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
   
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
   iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
   get other info too.&lt;/p&gt;
@@ -371,6 +417,19 @@
   install a different system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
+
+&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -419,7 +478,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -429,7 +488,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/06/21 17:00:01 $
+$Date: 2017/03/26 03:59:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-apple.nl-diff.html       3 Dec 2016 20:08:33 -0000       1.6
+++ po/malware-apple.nl-diff.html       26 Mar 2017 03:59:48 -0000      1.7
@@ -11,20 +11,20 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
 &lt;title&gt;Apple's Operating Systems are Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
-&lt;style type="text/css" media="print,screen"&gt;
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
 &lt;!--
 #content div.toc li { list-style: none; margin-bottom: 1em; }
 #content div.toc { margin-top: 1em; }
 --&gt;
-&lt;/style&gt;
+&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/"&gt;Other</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;Other</em></ins></span>
 examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
 
 &lt;div class="highlight-para"&gt;
 &lt;p&gt;
@@ -47,16 +47,17 @@
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Here's how Apple's systems are malware.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;
 
-&lt;div class="toc"&gt;
-&lt;div class="malfunctions"&gt;
+&lt;div class="toc"&gt;</strong></del></span>
+
+&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
-&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
@@ -69,10 +70,10 @@
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
-<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
 &lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
 &lt;ul&gt;
@@ -99,8 +100,29 @@
 
 &lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
 &lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple <span class="inserted"><ins><em>used its censorship system to enforce 
Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+apps.&lt;/p&gt;
+&lt;/li&gt;
+
 &lt;li&gt;&lt;p&gt;
-Apple <span class="inserted"><ins><em>censors
+Apple used its censorship system to enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</em></ins></span> censors
 games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
 some games from the cr&hellip;app store&lt;/a&gt; because of which political
 points they suggest. Some political points are apparently considered
@@ -108,7 +130,7 @@
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-Apple</em></ins></span> &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
 banned a program from the App Store&lt;/a&gt; because its developers
 committed the enormity of disassembling some iThings.
 &lt;/p&gt;&lt;/li&gt;
@@ -132,7 +154,7 @@
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3 <span class="inserted"><ins><em>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
@@ -150,7 +172,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3</em></ins></span> id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
 interference.&lt;/p&gt;
@@ -182,7 +204,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;The Apple Music client
+    &lt;p&gt;The Apple Music client
       program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
       the user's file system for music files, copies them to an Apple
       server, and deletes them&lt;/a&gt;.&lt;/p&gt;
@@ -195,7 +217,7 @@
       Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;iOS version 9 for
     iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
     them irreparably if they were repaired by someone other than
@@ -207,7 +229,7 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
   unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-jails.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple</em></ins></span>
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
   censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -220,7 +242,13 @@
 
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
       lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
         get them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -228,7 +256,7 @@
   &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
         a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
         days.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving the verification code Apple 
       sends to it.&lt;/p&gt;
@@ -303,7 +331,7 @@
   Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The &lt;a
+  &lt;li&gt;&lt;p&gt;The &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
   
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
   iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
   get other info too.&lt;/p&gt;
@@ -390,7 +418,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;h3 id="deception"&gt;Apple 
Deception&lt;/h3&gt;
+&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&ldquo;Dark patterns&rdquo;
       are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
@@ -401,7 +429,7 @@
     users to turn this off&rdquo; while ensuring that few will
     understand how to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -450,7 +478,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -460,7 +488,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/12/03 20:08:33 $
+$Date: 2017/03/26 03:59:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.it-diff.html
===================================================================
RCS file: po/malware-apple.it-diff.html
diff -N po/malware-apple.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-apple.it-diff.html       26 Mar 2017 03:59:47 -0000      1.1
@@ -0,0 +1,498 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-apple.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
+&lt;title&gt;Apple's Operating Systems are Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;</strong></del></span>
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how the software in Apple's computer products are
+malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;
+
+&lt;div class="toc"&gt;</strong></del></span>
+
+&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+&lt;ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+
+&lt;h3 id="back-doors"&gt;Apple Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an
+&lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;, which could be
+exploited by attackers to gain root privileges.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door &lt;a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;The iPhone has a back door for &lt;a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+enabling it without understanding.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
+&lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple <span class="inserted"><ins><em>used its censorship system to enforce 
Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+apps.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple used its censorship system to enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple</em></ins></span> censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because of which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program from the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A bug in the iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but the downloading alone 
caused lots of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Apple
+actions that harm to the users of specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+      the user's file system for music files, copies them to an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing the security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;iOS version 9 for
+    iThings &lt;a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving the verification code Apple 
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends to Apple servers unsaved documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided to save are even more sensitive than the
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to Apple servers without asking 
permission&lt;/a&gt;.
+  This exposes the files to Big Brother and perhaps to other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't have a malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove the malfeature unless many users push back hard, and the users
+  can't remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo; of iOS seem to exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;The &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+  get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does, &lt;a
+  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  Apple uses DRM software to prevent people from charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on the fact that a new model of Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS, the operating system of the Apple iThings, is a jail for
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here is an article about the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code is written in Swift.  Users
+  cannot do this freely because they are required to identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is a crack in the prison walls, it is not big enough to
+  mean that the iThings are no longer jails.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Apple Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple arbitrarily
+  &lt;a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
+  blocks users from installing old versions of iOS&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThings are tyrant devices: they do not permit
+  installing a different or modified operating system.  There is a
+  port of Android to the iThings, but installing it
+  requires &lt;a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"&gt;
+  finding a bug or &ldquo;exploit&rdquo;&lt;/a&gt; to make it possible to
+  install a different system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/26 03:59:47 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-censorship.it-diff.html
===================================================================
RCS file: po/proprietary-censorship.it-diff.html
diff -N po/proprietary-censorship.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-censorship.it-diff.html      26 Mar 2017 03:59:48 -0000      
1.1
@@ -0,0 +1,185 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-censorship.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
+&lt;title&gt;Proprietary Censorship - GNU Project - Free Software 
Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-censorship.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Censorship&lt;/h2&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of proprietary systems that impose censorship on
+what their users can access. We have a &lt;a
+href="/proprietary/proprietary-jails.html"&gt;separate
+list of proprietary systems that censor installation&lt;/a&gt; of
+application programs (we call them &ldquo;jails&rdquo;.)&lt;/p&gt;
+
+&lt;p&gt;Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+<span class="inserted"><ins><em>Google &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;censors
+add-ons for Chrome&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple used its censorship system to enforce Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+apps.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+Apple used its censorship system to enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;</em></ins></span>
+Apple censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because of which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program from the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a
+href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;Google
+censored installation of Samsung's ad-blocker,&lt;/a&gt; saying that
+blocking ads is &ldquo;interference&rdquo; with the sites that
+advertise (and surveil users through ads).&lt;/p&gt;
+
+&lt;p&gt;The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access to install it. Using a nonfree program
+gives the owner power over you, and Google has exercised that power.&lt;/p&gt;
+
+&lt;p&gt;Google's censorship, unlike that of Apple and Microsoft, is not total:
+Android allows users to install apps in other ways. You can install
+free programs from f-droid.org.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+The &lt;a
+href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;Nintendo
+3DS&lt;/a&gt; censors web browsing; it is possible to turn off the
+censorship, but that requires identifying oneself to pay, which is a
+form of surveillance.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/26 03:59:48 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: po/proprietary-censorship.ja-diff.html
diff -N po/proprietary-censorship.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-censorship.ja-diff.html      26 Mar 2017 03:59:48 -0000      
1.1
@@ -0,0 +1,185 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-censorship.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
+&lt;title&gt;Proprietary Censorship - GNU Project - Free Software 
Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-censorship.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Censorship&lt;/h2&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of proprietary systems that impose censorship on
+what their users can access. We have a &lt;a
+href="/proprietary/proprietary-jails.html"&gt;separate
+list of proprietary systems that censor installation&lt;/a&gt; of
+application programs (we call them &ldquo;jails&rdquo;.)&lt;/p&gt;
+
+&lt;p&gt;Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+<span class="inserted"><ins><em>Google &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;censors
+add-ons for Chrome&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple used its censorship system to enforce Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.&lt;/p&gt;
+
+&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+apps.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+Apple used its censorship system to enforce
+China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
+blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;</em></ins></span>
+Apple censors
+games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from the cr&hellip;app store&lt;/a&gt; because of which political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program from the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
+rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;
+This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+&lt;a
+href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;Google
+censored installation of Samsung's ad-blocker,&lt;/a&gt; saying that
+blocking ads is &ldquo;interference&rdquo; with the sites that
+advertise (and surveil users through ads).&lt;/p&gt;
+
+&lt;p&gt;The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access to install it. Using a nonfree program
+gives the owner power over you, and Google has exercised that power.&lt;/p&gt;
+
+&lt;p&gt;Google's censorship, unlike that of Apple and Microsoft, is not total:
+Android allows users to install apps in other ways. You can install
+free programs from f-droid.org.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+The &lt;a
+href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;Nintendo
+3DS&lt;/a&gt; censors web browsing; it is possible to turn off the
+censorship, but that requires identifying oneself to pay, which is a
+form of surveillance.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/26 03:59:48 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]