[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.it.html malware-a...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.it.html malware-a... |
Date: |
Sat, 25 Mar 2017 23:59:48 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/03/25 23:59:48
Modified files:
proprietary : malware-apple.it.html malware-apple.ja.html
malware-apple.nl.html
proprietary-censorship.it.html
proprietary-censorship.ja.html
proprietary/po : malware-apple.ja-diff.html
malware-apple.nl-diff.html
Added files:
proprietary/po : malware-apple.it-diff.html
proprietary-censorship.it-diff.html
proprietary-censorship.ja-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ja.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.nl.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ja.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&rev=1.1
Patches:
Index: malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-apple.it.html 8 Dec 2016 20:57:31 -0000 1.19
+++ malware-apple.it.html 26 Mar 2017 03:59:47 -0000 1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.it.po">
+ https://www.gnu.org/proprietary/po/malware-apple.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
</style>
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>I sistemi operativi di Apple sono malware</h2>
<p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -499,7 +505,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/12/08 20:57:31 $
+$Date: 2017/03/26 03:59:47 $
<!-- timestamp end -->
</p>
Index: malware-apple.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ja.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-apple.ja.html 20 Dec 2016 06:31:00 -0000 1.19
+++ malware-apple.ja.html 26 Mar 2017 03:59:47 -0000 1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.ja.po">
+ https://www.gnu.org/proprietary/po/malware-apple.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
</style>
<!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
<h2>Appleã®ãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ã¯ãã«ã¦ã§ã¢ã </h2>
<p><a
href="/proprietary/proprietary.html">ã»ãã®ãããã©ã¤ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
@@ -365,7 +371,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2016/12/20 06:31:00 $
+$Date: 2017/03/26 03:59:47 $
<!-- timestamp end -->
</p>
Index: malware-apple.nl.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.nl.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.nl.html 13 Jan 2017 20:58:57 -0000 1.5
+++ malware-apple.nl.html 26 Mar 2017 03:59:47 -0000 1.6
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.nl.po">
+ https://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
<!--#include virtual="/server/header.nl.html" -->
<!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
</style>
<!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
<h2>Apple's besturingssystemen zijn malware</h2>
<p><a href="/proprietary/proprietary.html">Andere voorbeelden van niet-vrije
@@ -499,7 +505,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2017/01/13 20:58:57 $
+$Date: 2017/03/26 03:59:47 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-censorship.it.html 8 Oct 2016 21:29:03 -0000 1.10
+++ proprietary-censorship.it.html 26 Mar 2017 03:59:47 -0000 1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-censorship.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-censorship.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-censorship.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-censorship.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-censorship.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-censorship.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>Censura Proprietaria</h2>
<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
@@ -164,7 +170,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/10/08 21:29:03 $
+$Date: 2017/03/26 03:59:47 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ja.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-censorship.ja.html 24 Jan 2017 03:40:30 -0000 1.10
+++ proprietary-censorship.ja.html 26 Mar 2017 03:59:47 -0000 1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-censorship.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-censorship.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-censorship.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-censorship.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-censorship.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-censorship.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
<!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
<h2>ãããã©ã¤ã¨ã¿ãªãªæ¤é²</h2>
<p>ä¸èªç±ãª(ãããã©ã¤ã¨ã¿ãªãª)ã½ããã¦ã§ã¢ã¯å®ã«å¤ãã®å
´åãã«ã¦ã§ã¢ã§ã(ã¦ã¼ã¶ãèå¾
ããããã«è¨è¨
@@ -129,7 +135,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/26 03:59:47 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-apple.ja-diff.html 21 Jun 2016 17:00:01 -0000 1.1
+++ po/malware-apple.ja-diff.html 26 Mar 2017 03:59:48 -0000 1.2
@@ -11,20 +11,20 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.79</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.83</em></ins></span> -->
<title>Apple's Operating Systems are Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-apple.translist" -->
-<style type="text/css" media="print,screen">
+<span class="removed"><del><strong><style type="text/css"
media="print,screen">
<!--
#content div.toc li { list-style: none; margin-bottom: 1em; }
#content div.toc { margin-top: 1em; }
-->
-</style>
+</style></strong></del></span>
<!--#include virtual="/server/banner.html" -->
<h2>Apple's Operating Systems Are Malware</h2>
-<p><a <span
class="removed"><del><strong>href="/philosophy/proprietary/">Other</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html">Other</em></ins></span>
examples of proprietary malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
<div class="highlight-para">
<p>
@@ -47,12 +47,14 @@
</p>
</div>
-<p>Here's how Apple's systems are malware.</p>
+<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p>
-<div class="toc">
-<div class="malfunctions">
+<div class="toc"></strong></del></span>
+
+<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3></em></ins></span>
<ul>
-<li><strong>Type of malware</strong></li>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a href="#back-doors">Back doors</a></li>
<li><a href="#censorship">Censorship</a></li>
<li><a href="#insecurity">Insecurity</a></li>
@@ -68,9 +70,10 @@
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
+<li><a href="#deception">Deception</a></li>
</ul>
</div>
-</div>
+<span class="removed"><del><strong></div></strong></del></span>
<h3 id="back-doors">Apple Back Doors</h3>
<ul>
@@ -97,8 +100,29 @@
<h3 id="censorship">Apple Censorship</h3>
<ul>
+
+<li><p>
+Apple <span class="inserted"><ins><em>used its censorship system to enforce
Russian
+surveillance <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.</p>
+
+<p>However, the point here is the wrong of Apple's censorship of
+apps.</p>
+</li>
+
<li><p>
-Apple <span class="inserted"><ins><em>censors
+Apple used its censorship system to enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+<li><p>
+Apple</em></ins></span> censors
games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
some games from the cr…app store</a> because of which political
points they suggest. Some political points are apparently considered
@@ -106,7 +130,7 @@
</li>
<li><p>
-Apple</em></ins></span> <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
committed the enormity of disassembling some iThings.
</p></li>
@@ -134,6 +158,13 @@
<ul>
<li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render
+ a certain kind of image file</a>.</p>
+ </li>
+
+ <li>
<p>A bug in the iThings Messages
app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site to extract all the user's messaging
history</a>.
@@ -173,7 +204,7 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>The Apple Music client
+ <p>The Apple Music client
program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple
server, and deletes them</a>.</p>
@@ -186,7 +217,7 @@
Windows</a>, while refusing to fix them itself.</p>
</li>
- <li></em></ins></span>
+ <li>
<p>iOS version 9 for
iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
@@ -198,7 +229,7 @@
<li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a <span
class="removed"><del><strong>href="/philosophy/proprietary-jails.html">Apple</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Apple</em></ins></span>
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.</p>
</li>
@@ -211,6 +242,21 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul>
+ <span class="inserted"><ins><em><li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li></em></ins></span>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
<li><p>Users cannot make an Apple ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving a valid email address
and receiving the verification code Apple
sends to it.</p>
@@ -285,7 +331,7 @@
Technical presentation</a>.</p>
</li>
- <li><p>The <a
+ <li><p>The <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -371,6 +417,19 @@
install a different system.</p>
</li>
</ul>
+
+<h3 id="deception">Apple Deception</h3>
+<ul>
+ <li><p>“Dark patterns”
+ are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users, or make option settings
+ hard to find</a>.</p>
+
+ <p>This allows a company such as Apple to say, “We allow
+ users to turn this off” while ensuring that few will
+ understand how to actually turn it off.</p>
+ </li>
+</ul>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -419,7 +478,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -429,7 +488,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/06/21 17:00:01 $
+$Date: 2017/03/26 03:59:48 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-apple.nl-diff.html 3 Dec 2016 20:08:33 -0000 1.6
+++ po/malware-apple.nl-diff.html 26 Mar 2017 03:59:48 -0000 1.7
@@ -11,20 +11,20 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.79</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.83</em></ins></span> -->
<title>Apple's Operating Systems are Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-apple.translist" -->
-<style type="text/css" media="print,screen">
+<span class="removed"><del><strong><style type="text/css"
media="print,screen">
<!--
#content div.toc li { list-style: none; margin-bottom: 1em; }
#content div.toc { margin-top: 1em; }
-->
-</style>
+</style></strong></del></span>
<!--#include virtual="/server/banner.html" -->
<h2>Apple's Operating Systems Are Malware</h2>
-<p><a <span
class="removed"><del><strong>href="/philosophy/proprietary/">Other</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html">Other</em></ins></span>
examples of proprietary malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
<div class="highlight-para">
<p>
@@ -47,16 +47,17 @@
</p>
</div>
-<p>Here's how Apple's systems are malware.</p>
+<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p>
-<div class="toc">
-<div class="malfunctions">
+<div class="toc"></strong></del></span>
+
+<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3></em></ins></span>
<ul>
-<li><strong>Type of malware</strong></li>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a href="#back-doors">Back doors</a></li>
<li><a href="#censorship">Censorship</a></li>
-<span class="removed"><del><strong><!--<li><a
href="#insecurity">Insecurity</a></li>--></strong></del></span>
-<span class="inserted"><ins><em><li><a
href="#insecurity">Insecurity</a></li></em></ins></span>
+<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#pressuring">Pressuring</a></li>
<li><a href="#sabotage">Sabotage</a></li>
<li><a href="#interference">Interference</a></li>
@@ -69,10 +70,10 @@
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
-<span class="inserted"><ins><em><li><a
href="#deception">Deception</a></li></em></ins></span>
+<li><a href="#deception">Deception</a></li>
</ul>
</div>
-</div>
+<span class="removed"><del><strong></div></strong></del></span>
<h3 id="back-doors">Apple Back Doors</h3>
<ul>
@@ -99,8 +100,29 @@
<h3 id="censorship">Apple Censorship</h3>
<ul>
+
+<li><p>
+Apple <span class="inserted"><ins><em>used its censorship system to enforce
Russian
+surveillance <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.</p>
+
+<p>However, the point here is the wrong of Apple's censorship of
+apps.</p>
+</li>
+
<li><p>
-Apple <span class="inserted"><ins><em>censors
+Apple used its censorship system to enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+<li><p>
+Apple</em></ins></span> censors
games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
some games from the cr…app store</a> because of which political
points they suggest. Some political points are apparently considered
@@ -108,7 +130,7 @@
</li>
<li><p>
-Apple</em></ins></span> <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
committed the enormity of disassembling some iThings.
</p></li>
@@ -132,7 +154,7 @@
</p></li>
</ul>
-<h3 <span class="inserted"><ins><em>id="insecurity">Apple
Insecurity</h3>
+<h3 id="insecurity">Apple Insecurity</h3>
<ul>
<li>
@@ -150,7 +172,7 @@
</li>
</ul>
-<h3</em></ins></span> id="interference">Apple Interference</h3>
+<h3 id="interference">Apple Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
interference.</p>
@@ -182,7 +204,7 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>The Apple Music client
+ <p>The Apple Music client
program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple
server, and deletes them</a>.</p>
@@ -195,7 +217,7 @@
Windows</a>, while refusing to fix them itself.</p>
</li>
- <li></em></ins></span>
+ <li>
<p>iOS version 9 for
iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
@@ -207,7 +229,7 @@
<li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a <span
class="removed"><del><strong>href="/philosophy/proprietary-jails.html">Apple</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Apple</em></ins></span>
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.</p>
</li>
@@ -220,7 +242,13 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul>
- <span class="inserted"><ins><em><li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <span class="inserted"><ins><em><li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li></em></ins></span>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -228,7 +256,7 @@
<li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
days.</p>
- </li></em></ins></span>
+ </li>
<li><p>Users cannot make an Apple ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving a valid email address
and receiving the verification code Apple
sends to it.</p>
@@ -303,7 +331,7 @@
Technical presentation</a>.</p>
</li>
- <li><p>The <a
+ <li><p>The <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -390,7 +418,7 @@
</li>
</ul>
-<span class="inserted"><ins><em><h3 id="deception">Apple
Deception</h3>
+<h3 id="deception">Apple Deception</h3>
<ul>
<li><p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -401,7 +429,7 @@
users to turn this off” while ensuring that few will
understand how to actually turn it off.</p>
</li>
-</ul></em></ins></span>
+</ul>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -450,7 +478,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -460,7 +488,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/12/03 20:08:33 $
+$Date: 2017/03/26 03:59:48 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.it-diff.html
===================================================================
RCS file: po/malware-apple.it-diff.html
diff -N po/malware-apple.it-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/malware-apple.it-diff.html 26 Mar 2017 03:59:47 -0000 1.1
@@ -0,0 +1,498 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-apple.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.83</em></ins></span> -->
+<title>Apple's Operating Systems are Malware
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-apple.translist" -->
+<span class="removed"><del><strong><style type="text/css"
media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style></strong></del></span>
+<!--#include virtual="/server/banner.html" -->
+<h2>Apple's Operating Systems Are Malware</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+
+<div class="highlight-para">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+This page explains how the software in Apple's computer products are
+malware.
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in
+<a href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+</p>
+</div>
+
+<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p>
+
+<div class="toc"></strong></del></span>
+
+<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>class="summary" style="margin-top: 2em">
+<h3>Type of malware</h3></em></ins></span>
+<ul>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
+<li><a href="#back-doors">Back doors</a></li>
+<li><a href="#censorship">Censorship</a></li>
+<li><a href="#insecurity">Insecurity</a></li>
+<li><a href="#pressuring">Pressuring</a></li>
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#interference">Interference</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+<li><a href="#deception">Deception</a></li>
+</ul>
+</div>
+<span class="removed"><del><strong></div></strong></del></span>
+
+<h3 id="back-doors">Apple Back Doors</h3>
+<ul>
+<li><p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
+
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple to remotely delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
+</ul>
+
+<h3 id="censorship">Apple Censorship</h3>
+<ul>
+
+<li><p>
+Apple <span class="inserted"><ins><em>used its censorship system to enforce
Russian
+surveillance <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.</p>
+
+<p>However, the point here is the wrong of Apple's censorship of
+apps.</p>
+</li>
+
+<li><p>
+Apple used its censorship system to enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+<li><p>
+Apple</em></ins></span> censors
+games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because of which political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects other Apple services</a>.
+</p></li>
+</ul>
+
+<h3 id="insecurity">Apple Insecurity</h3>
+
+<ul>
+ <li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render
+ a certain kind of image file</a>.</p>
+ </li>
+
+ <li>
+ <p>A bug in the iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site to extract all the user's messaging
history</a>.
+ </p>
+ </li>
+</ul>
+
+<h3 id="interference">Apple Interference</h3>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
+interference.</p>
+
+<ul>
+ <li><p>Apple forced millions of iThings to download a system
upgrade
+ <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.
+ Apple did not forcibly install the upgrade but the downloading alone
caused lots of trouble.</p>
+ </li>
+</ul>
+
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri
+ <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about music charts if you're not an Apple Music subscriber.</p>
+ </li>
+</ul>
+
+<h3 id="sabotage">Apple Sabotage</h3>
+
+<p>The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Apple
+actions that harm to the users of specific Apple software.</p>
+
+<ul>
+ <li>
+ <p>The Apple Music client
+ program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ the user's file system for music files, copies them to an Apple
+ server, and deletes them</a>.</p>
+ </li>
+
+ <li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing the security bugs in Quicktime for
+ Windows</a>, while refusing to fix them itself.</p>
+ </li>
+
+ <li>
+ <p>iOS version 9 for
+ iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ them irreparably if they were repaired by someone other than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism from the users. However, it has not acknowledged that
+ this was wrong.</p>
+ </li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An Apple firmware “upgrade” bricked iPhones that had been
+ unlocked.</a> The “upgrade” also deactivated applications
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently intentional.</p>
+ </li>
+
+ <li><p>Apple
+ <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
+ stores that competed with iTunes</a>.</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
+ <span class="inserted"><ins><em><li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li></em></ins></span>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving a valid email address
and receiving the verification code Apple
+ sends to it.</p>
+ </li>
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ MacOS automatically sends to Apple servers unsaved documents being
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have not decided to save are even more sensitive than the
+ things you have stored in files</a>.</p>
+ </li>
+
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to Apple servers without asking
permission</a>.
+ This exposes the files to Big Brother and perhaps to other snoops.</p>
+
+ <p>It also demonstrates how you can't trust proprietary software,
+ because even if today's version doesn't have a malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove the malfeature unless many users push back hard, and the users
+ can't remove it themselves.</p>
+ </li>
+
+ <li><p>Various operations in
+ <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+ the latest MacOS send reports to Apple</a> servers.</p>
+ </li>
+
+ <li><p>Spyware in MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to Apple.</p>
+ </li>
+
+ <li><p>Apple admits the
+ <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying in a search facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that Apple has not talked about</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no possible
+ purpose other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+
+ <li><p>The <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
+ </li>
+</ul>
+
+<h3 id="drm">Apple DRM</h3>
+<ul>
+ <li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple uses DRM software to prevent people from charging an iThing with a
+ generic USB cable</a>.</p></li>
+
+ <li><p><a
+
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
+ DRM (digital restrictions mechanisms) in MacOS</a>. This article
+ focuses on the fact that a new model of Macbook introduced a requirement
+ for monitors to have malicious hardware, but DRM software in MacOS is
+ involved in activating the hardware. The software for accessing iTunes
+ is also responsible.</p>
+ </li>
+
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+<ul>
+ <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
+ iOS, the operating system of the Apple iThings, is a jail for
+ users.</a> That means it imposes censorship of application
programs.</p>
+
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
+
+ <p>Apple, in the iThings, pioneered the practice of general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred to escaping from the censorship as
“jailbreaking.”</p>
+
+ <p>Here is an article about the <a
+ href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ code signing</a> that the iThings use to jail the user.</p>
+
+ <p>Curiously, Apple is beginning to allow limited passage through the
+ walls of the the iThing jail: users can now install apps built from
+ source code, provided the source code is written in Swift. Users
+ cannot do this freely because they are required to identify themselves.
+ <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
+
+ <p>While this is a crack in the prison walls, it is not big enough to
+ mean that the iThings are no longer jails.</p></li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
+ </li>
+</ul>
+
+<h3 id="tyrants">Apple Tyrants</h3>
+<ul>
+ <li><p>Apple arbitrarily
+ <a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
+ blocks users from installing old versions of iOS</a>.</p>
+ </li>
+
+ <li><p>The iThings are tyrant devices: they do not permit
+ installing a different or modified operating system. There is a
+ port of Android to the iThings, but installing it
+ requires <a
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">
+ finding a bug or “exploit”</a> to make it possible to
+ install a different system.</p>
+ </li>
+</ul>
+
+<h3 id="deception">Apple Deception</h3>
+<ul>
+ <li><p>“Dark patterns”
+ are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users, or make option settings
+ hard to find</a>.</p>
+
+ <p>This allows a company such as Apple to say, “We allow
+ users to turn this off” while ensuring that few will
+ understand how to actually turn it off.</p>
+ </li>
+</ul>
+</div><!-- for id="content", starts in the include above -->
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/26 03:59:47 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
Index: po/proprietary-censorship.it-diff.html
===================================================================
RCS file: po/proprietary-censorship.it-diff.html
diff -N po/proprietary-censorship.it-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/proprietary-censorship.it-diff.html 26 Mar 2017 03:59:48 -0000
1.1
@@ -0,0 +1,185 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-censorship.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.83</em></ins></span> -->
+<title>Proprietary Censorship - GNU Project - Free Software
Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-censorship.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Censorship</h2>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>Here are examples of proprietary systems that impose censorship on
+what their users can access. We have a <a
+href="/proprietary/proprietary-jails.html">separate
+list of proprietary systems that censor installation</a> of
+application programs (we call them “jails”.)</p>
+
+<p>Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.</p>
+
+<ul>
+<li><p>
+<span class="inserted"><ins><em>Google <a
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">censors
+add-ons for Chrome</a>.</p>
+</li>
+
+<li><p>
+Apple used its censorship system to enforce Russian
+surveillance <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.</p>
+
+<p>However, the point here is the wrong of Apple's censorship of
+apps.</p>
+</li>
+
+ <li><p>
+Apple used its censorship system to enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+ <li><p></em></ins></span>
+Apple censors
+games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because of which political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects other Apple services</a>.
+</p></li>
+
+<li><p>
+<a
+href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">Google
+censored installation of Samsung's ad-blocker,</a> saying that
+blocking ads is “interference” with the sites that
+advertise (and surveil users through ads).</p>
+
+<p>The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access to install it. Using a nonfree program
+gives the owner power over you, and Google has exercised that power.</p>
+
+<p>Google's censorship, unlike that of Apple and Microsoft, is not total:
+Android allows users to install apps in other ways. You can install
+free programs from f-droid.org.</p>
+</li>
+
+<li><p>
+The <a
+href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo
+3DS</a> censors web browsing; it is possible to turn off the
+censorship, but that requires identifying oneself to pay, which is a
+form of surveillance.
+</p></li>
+
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/26 03:59:48 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
Index: po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: po/proprietary-censorship.ja-diff.html
diff -N po/proprietary-censorship.ja-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/proprietary-censorship.ja-diff.html 26 Mar 2017 03:59:48 -0000
1.1
@@ -0,0 +1,185 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-censorship.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.83</em></ins></span> -->
+<title>Proprietary Censorship - GNU Project - Free Software
Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-censorship.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Censorship</h2>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>Here are examples of proprietary systems that impose censorship on
+what their users can access. We have a <a
+href="/proprietary/proprietary-jails.html">separate
+list of proprietary systems that censor installation</a> of
+application programs (we call them “jails”.)</p>
+
+<p>Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.</p>
+
+<ul>
+<li><p>
+<span class="inserted"><ins><em>Google <a
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">censors
+add-ons for Chrome</a>.</p>
+</li>
+
+<li><p>
+Apple used its censorship system to enforce Russian
+surveillance <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself. While subjecting its users to its own surveillance, it tries
+to protect its users from Russian surveillance, and is therefore
+subject to Russian censorship.</p>
+
+<p>However, the point here is the wrong of Apple's censorship of
+apps.</p>
+</li>
+
+ <li><p>
+Apple used its censorship system to enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+ <li><p></em></ins></span>
+Apple censors
+games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because of which political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects other Apple services</a>.
+</p></li>
+
+<li><p>
+<a
+href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">Google
+censored installation of Samsung's ad-blocker,</a> saying that
+blocking ads is “interference” with the sites that
+advertise (and surveil users through ads).</p>
+
+<p>The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access to install it. Using a nonfree program
+gives the owner power over you, and Google has exercised that power.</p>
+
+<p>Google's censorship, unlike that of Apple and Microsoft, is not total:
+Android allows users to install apps in other ways. You can install
+free programs from f-droid.org.</p>
+</li>
+
+<li><p>
+The <a
+href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo
+3DS</a> censors web browsing; it is possible to turn off the
+censorship, but that requires identifying oneself to pay, which is a
+form of surveillance.
+</p></li>
+
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/03/26 03:59:48 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.it.html malware-a...,
GNUN <=