www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec propr-blurbs...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec propr-blurbs...
Date: Wed, 19 Sep 2018 16:49:49 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/19 16:49:49

Modified files:
        server/staging/proprietary/rec: propr-blurbs.rec 

Log message:
        More tagging and fixes; consolidate the windows 7 > 10 story.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.5&r2=1.6

Patches:
Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- propr-blurbs.rec    17 Sep 2018 19:41:55 -0000      1.5
+++ propr-blurbs.rec    19 Sep 2018 20:49:49 -0000      1.6
@@ -20,11 +20,30 @@
 #  case, each line within a blurb should start with a + sign, including
 #  blank lines.
 
+Id: -201607040
+PubDate: 2015-12-07
+PubDate: 2015-09-11
+PubDate: 2016-07-04
+PubDate: 2016-06-27
+PubDate: 2016-03-12
+PubDate: 2016-03-17
+Section: sabotage microsoft
+Keyword: windows
+Blurb: <p>In 2015, Microsoft tried to push Windows 10 down the throat of 
Windows 7 and 8 users. Its first move was to <a 
href="https://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 disregard their no-&ldquo;upgrade&rdquo; settings</a> and <a 
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
 force silent Windows 10 downloads</a>, thereby using up storage space on 
low-end computers and download quota on metered connections.</p>
++ 
++ <p>Then, for many months, Microsoft <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
 nagged users obnoxiously</a> to install the unwanted <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
 downgrade</a>, eventually tricking them by <a 
href="https://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>
 making installation a recommended option</a>, and offering it at each system 
update <a 
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
 regardless of previous refusals, by means of malware-like techniques</a>, 
until users failed to say no.</p>
+
+Id: -201809120
+Added: 20180918
+PubDate: 2018-09-12
+Section: interference microsoft
+Keyword: windows
+Blurb: <p>One version of Windows 10 <a 
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
 harangues users if they try to install Firefox (or Chrome)</a>.</p>
 
 Id: -201510300
 PubDate: 2015-10-30
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>More than 73% and 47% of mobile applications, from Android and iOS 
respectively <a href="https://techscience.org/a/2015103001/";>share personal, 
behavioral and location information</a> of their users with third parties.</p>
 
 Id: -201708160
@@ -54,8 +73,8 @@
 
 Id: -201809070
 PubDate: 2018-09-07
-Section: surveillance macos apple
-Keyword:
+Section: surveillance apple
+Keyword: macos
 Blurb: <p>Adware Doctor, an ad blocker for MacOS, <a 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
 the user's browsing history</a>.</p>
 
 Id: -201808120
@@ -108,7 +127,7 @@
 PubDate: 2018-07-02
 Section: insecurity mobiles
 Keyword: samsung
-Blurb: <p id="samsung">Some Samsung phones randomly <a 
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages";>
 send photos to people in the owner's contact list</a>.</p>
+Blurb: <p>Some Samsung phones randomly <a 
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages";>
 send photos to people in the owner's contact list</a>.</p>
 
 Id: -201806250
 PubDate: 2018-06-25
@@ -137,7 +156,7 @@
 Id: -201805310
 PubDate: 2018-05-31
 Section: apple sabotage
-Keyword: telegram app
+Keyword: telegram apps
 Blurb: <p>Apple has <a 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
 Telegram from upgrading its app for a month</a>.</p>
 + 
 +  <p>This evidently has to do with Russia's command to Apple to block 
Telegram in Russia.</p>
@@ -152,8 +171,8 @@
 
 Id: -201804180
 PubDate: 2018-04-18
-Section:
-Keyword:
+Section: interference
+Keyword: pearson
 Blurb: <p>Pearson's proprietary educational software <a 
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
 did an experiment on real students</a>, treating students differently to 
observe the results.</p>
 
 Id: -201804160
@@ -250,22 +269,28 @@
 Id: -201712060
 Added: 20180915
 PubDate: 2017-12-06
-Section: games sabotage
+Section: games interference
 Keyword: addiction
 Blurb: <p>Learn how <a 
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
 gratis-to-play-and-not-win-much games manipulate their useds 
psychologically</a>.</p>
 + 
 +  <p>These manipulative behaviors are malicious functionalities, and they are 
possible because the game is proprietary. If it were free, people could publish 
a non-manipulative version and play that instead.</p>
 
+Id: -201711251
+PubDate: 2017-11-25
+Section: surveillance mobiles ithings
+Keyword: apple drm
+Blurb: <p>The DMCA and the EU Copyright Directive make it <a 
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";> illegal 
to study how iOS cr&hellip;apps spy on users</a>, because this would require 
circumventing the iOS DRM.</p>
+
 Id: -201711250
 PubDate: 2017-11-25
-Section: appleDRM drm surveillance
-Keyword: ios
+Section: apple drm 
+Keyword: surveillance mobiles ithings
 Blurb: <p>The DMCA and the EU Copyright Directive make it <a 
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";> illegal 
to study how iOS cr&hellip;apps spy on users</a>, because this would require 
circumventing the iOS DRM.</p>
 
 Id: -201711241
 PubDate: 2017-11-24
 Section: back-doors universal toy 
-Keyword: hasbro furby app
+Keyword: hasbro furby apps
 Blurb: <p>The Furby Connect has a <a 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
 universal back door</a>. If the product as shipped doesn't act as a listening 
device, remote changes to the code could surely convert it into one.</p>
 
 Id: -201711240
@@ -314,8 +339,8 @@
 
 Id: -201711080
 PubDate: 2017-11-08
-Section:
-Keyword:
+Section: sabotage tethers appliances
+Keyword: logitech
 Blurb: <p>Logitech will sabotage all Harmony Link household control devices by 
<a 
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
 turning off the server through which the products' supposed owners communicate 
with them</a>.</p>
 + 
 +  <p>The owners suspect this is to pressure them to buy a newer model. If 
they are wise, they will learn, rather, to distrust any product that requires 
users to talk with them through some specialized service.</p>
@@ -324,7 +349,7 @@
 PubDate: 2017-11-07
 Section: games surveillance
 Keyword: driver
-Blurb: <p>The driver for a certain gaming keyboard <a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html";> 
sends information to China</a>.</p>
+Blurb: <p>The driver for a certain gaming keyboard <a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html";>sends
 information to China</a>.</p>
 
 Id: -201711010
 PubDate: 2017-11-01
@@ -338,14 +363,14 @@
 Keyword:
 Blurb: <p>Windows 10 telemetry program sends information to Microsoft about 
the user's computer and their use of the computer.</p>
 + 
-+  <p>Furthermore, for users who installed the fourth stable build of Windows 
10, called the &ldquo;Creators Update,&rdquo; Windows maximized the 
surveillance<a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
 by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
++  <p>Furthermore, for users who installed the fourth stable build of Windows 
10, called the &ldquo;Creators Update,&rdquo; Windows maximized the 
surveillance <a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
 by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 + 
-+  <p>The <a 
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
 &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to 
access, among other things, registry keys <a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx";> which can 
contain sensitive information like administrator's login password</a>.</p>
++  <p>The <a 
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
 &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to 
access, among other things, registry keys <a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which can 
contain sensitive information like administrator's login password</a>.</p>
 
 Id: -201710130
 PubDate: 2017-10-13
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: censorship
 Blurb: <p>Apple is <a 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
 censoring apps for the US government too</a>. Specifically, it is deleting 
apps developed by Iranians.</p>
 + 
 +  <p>The root of these wrongs are in Apple. If Apple had not designed the 
iMonsters to let Apple censor applications, Apple would not have had the power 
to stop users from installing whatever kind of apps.</p>
@@ -353,7 +378,7 @@
 Id: -201710042
 PubDate: 2017-10-04
 Section: apple sabotage
-Keyword: system macos
+Keyword: macos
 Blurb: <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a 
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html";>
 changes the file system from HFS+  to APFS</a>, which cannot be accessed from 
GNU/Linux, Windows or even older versions of MacOS.</p>
 
 Id: -201710041
@@ -386,8 +411,8 @@
 
 Id: -201709210
 PubDate: 2017-09-21
-Section:
-Keyword:
+Section: apple surveillance
+Keyword: ithings
 Blurb: <p>In the latest iThings system, &ldquo;turning off&rdquo; WiFi and 
Bluetooth the obvious way <a 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off";>
 doesn't really turn them off</a>. A more advanced way really does turn them 
off&mdash;only until 5am. That's Apple for you&mdash;&ldquo;We know you want to 
be spied on&rdquo;.</p>
 
 Id: -201709200
@@ -398,26 +423,18 @@
 + 
 +  <p>Note that this article misuses the term <a 
href="/philosophy/words-to-avoid.html#Hacker"> &ldquo;hackers&rdquo;</a> 
referring to crackers.</p>
 
-Id: -201709092
-PubDate: 2017-09-09
-Section: cars
-Keyword: tesla back-doors universal sabotage
-Blurb: <p>Tesla used a universal back door in its software to limit customers 
to using just <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 part of the battery of some cars</a>.</p>
-+ 
-+  <p>While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery capacity did not do them any harm, the same back door would permit 
Tesla (perhaps under the command of some government) to remotely order the car 
to use none of its battery. Or perhaps to drive its passenger to a torture 
prison.</p>
-
 Id: -201709091
 PubDate: 2017-09-09
-Section: back-doors universal
+Section: back-doors universal cars
 Keyword: tesla cars sabotage
-Blurb: <p>Tesla cars have a <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 universal back door</a>.</p>
+Blurb: <p>Tesla used software to limit the fraction of battery capacity that 
was available to customers, and <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 a universal back door in the software</a> to temporarily increase this 
limit.</p>
 + 
 +  <p>While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery capacity did not do them any harm, the same back door would permit 
Tesla (perhaps under the command of some government) to remotely order the car 
to use none of its battery. Or perhaps to drive its passenger to a torture 
prison.</p>
 
 Id: -201709090
 PubDate: 2017-09-09
 Section: sabotage
-Keyword: tesla cars back-doors universal sabotage
+Keyword: tesla cars back-doors universal
 Blurb: <p>Tesla used software to limit customers to using just <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 part of the battery of some cars</a>.</p>
 
 Id: -201708280
@@ -432,15 +449,15 @@
 
 Id: -201708270
 PubDate: 2017-08-27
-Section: surveillance mobiles
-Keyword: sarahah app
+Section: surveillance mobiles apps
+Keyword: sarahah
 Blurb: <p>The Sarahah app <a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
 uploads all phone numbers and email addresses</a> in user's address book to 
developer's server. Note that this article misuses the words &ldquo;<a 
href="/philosophy/free-sw.html"> free software</a>&rdquo; referring to zero 
price.</p>
 
 Id: -201708230
 PubDate: 2017-08-21
 PubDate: 2017-08-23
-Section:
-Keyword:
+Section: sabotage appliances
+Keyword: sonos
 Blurb: <p>Sonos <a 
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
 told all its customers, &ldquo;Agree&rdquo; to snooping or the product will 
stop working</a>. <a 
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321";>
 Another article</a> says they won't forcibly change the software, but people 
won't be able to get any upgrades and eventually it will stop working.</p>
 
 Id: -201708040
@@ -459,8 +476,8 @@
 
 Id: -201707290
 PubDate: 2017-07-29
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: censorship
 Blurb: <p>Apple <a 
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
 deleted several VPNs from its app store for China</a>, thus using its own 
censorship power to strengthen that of the Chinese government.</p>
 
 Id: -201707270
@@ -513,7 +530,7 @@
 
 Id: -201706060
 PubDate: 2017-06-06
-Section: apple sabotage ithing
+Section: apple sabotage ithings
 Keyword:
 Blurb: <p>Apple will stop <a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>fixing
 bugs for older model iThings</a>.</p>
 + 
@@ -539,7 +556,7 @@
 Id: -201705230
 PubDate: 2017-05-23
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>Apps for BART <a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>
 snoop on users</a>.</p>
 + 
 +  <p>With free software apps, users could <em>make sure</em> that they don't 
snoop.</p>
@@ -580,25 +597,31 @@
 PubDate: 2017-05-12
 Section: microsoft insecurity
 Keyword: windows
-Blurb: <p>Exploits of bugs in Windows, which were developed by the NSA and 
then leaked by the Shadowbrokers group, are now being used to <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>
 attack a great number of Windows computers with ransomware</a>.</p>
+Blurb: <p>Exploits of bugs in Windows, which were developed by the NSA and 
then leaked by the Shadowbrokers group, are now being used to <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
 a great number of Windows computers with ransomware</a>.</p>
+
+Id: -201705041
+PubDate: 2017-05-04
+Section: surveillance mobiles apps
+Keyword: android
+Blurb: <p>A study found 234 Android apps that track users by <a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>
 listening to ultrasound from beacons placed in stores or played by TV 
programs</a>.</p>
 
 Id: -201705040
 PubDate: 2017-05-04
-Section: surveillance mobiles insecurity
-Keyword: android app
+Section: insecurity
+Keyword: surveillance mobiles android apps
 Blurb: <p>A study found 234 Android apps that track users by <a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>
 listening to ultrasound from beacons placed in stores or played by TV 
programs</a>.</p>
 
 Id: -201704260
 PubDate: 2017-04-26
 Section: surveillance mobiles
-Keyword: facebook app
+Keyword: facebook apps
 Blurb: <p>Faceapp appears to do lots of surveillance, judging by <a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
 how much access it demands to personal data in the device</a>.</p>
 
 Id: -201704191
 PubDate: 2017-04-19
 Section: microsoft sabotage
 Keyword: windows
-Blurb: <p>Microsoft has made Windows 7 and 8 cease to function on certain new 
computers, <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>
 effectively forcing their owners to switch to Windows 10</a>.</p>
+Blurb: <p>Microsoft has made Windows 7 and 8 cease to function on certain new 
computers, <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
 forcing their owners to switch to Windows 10</a>.</p>
 
 Id: -201704190
 PubDate: 2017-04-19
@@ -618,20 +641,28 @@
 
 Id: -201704120
 PubDate: 2017-04-12
-Section:
-Keyword:
-Blurb: <p>Anova sabotaged users' cooking devices with a downgrade that 
tethered them to a remote server. <a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>
 Unless users create an account on Anova's servers, their cookers won't 
function.</a></p>
+Section: sabotage appliances tethers
+Keyword: anova
+Blurb: <p>Anova sabotaged users' cooking devices with a downgrade that 
tethered them to a remote server. <a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>
 Unless users create an account on Anova's servers, their cookers won't 
function</a>.</p>
 
-Id: -201704071
+Id: -201704075
 PubDate: 2017-04-07
 Section: surveillance mobiles
-Keyword: android app
+Keyword: android apps
 Blurb: <p>Pairs of Android apps can collude to transmit users' personal data 
to servers. <a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/";>
 A study found tens of thousands of pairs that collude</a>.</p>
 
+Id: -201704071
+PubDate: 2017-04-07
+Section: sabotage apple
+Keyword: drm mobiles 
+Blurb: <p>The iPhone 7 contains DRM specifically designed to <a 
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
 brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.  
&ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
++ 
++  <p>The article uses the term &ldquo;lock&rdquo; to describe the DRM, but we 
prefer to use the term <a 
href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks";> digital 
handcuffs</a>.</p>
+
 Id: -201704070
 PubDate: 2017-04-07
-Section: appleDRM drm sabotage mobiles
-Keyword:
+Section: drm mobiles
+Keyword: sabotage apple 
 Blurb: <p>The iPhone 7 contains DRM specifically designed to <a 
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
 brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.  
&ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 + 
 +  <p>The article uses the term &ldquo;lock&rdquo; to describe the DRM, but we 
prefer to use the term <a 
href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks";> digital 
handcuffs</a>.</p>
@@ -645,7 +676,7 @@
 Id: -201703300
 PubDate: 2017-03-30
 Section: surveillance mobiles
-Keyword: verizon app
+Keyword: verizon apps
 Blurb: <p>Verizon <a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
 announced an opt-in proprietary search app that it will</a> pre-install on 
some of its phones. The app will give Verizon the same information about the 
users' searches that Google normally gets when they use its search engine.</p>
 + 
 +  <p>Currently, the app is <a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";>
 being pre-installed on only one phone</a>, and the user must explicitly opt-in 
before the app takes effect. However, the app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is still spyware.</p>
@@ -721,7 +752,7 @@
 
 Id: -201702150
 PubDate: 2017-02-15
-Section: surveillance apple ithing
+Section: surveillance apple ithings
 Keyword: iphone
 Blurb: <p>Apple proposes <a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen";>a
 fingerprint-scanning touch screen</a>&mdash;which would mean no way to use it 
without having your fingerprints taken. Users would have no way to tell whether 
the phone is snooping on them.</p>
 
@@ -741,13 +772,13 @@
 PubDate: 2017-02-02
 Section: drm
 Keyword: microsoft windows
-Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
 can be used to identify people browsing through Tor</a>. The vulnerability 
exists only if you use Windows.</p>
+Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
 be used to identify people browsing through Tor</a>. The vulnerability exists 
only if you use Windows.</p>
 
 Id: -201702020
 PubDate: 2017-02-02
 Section: surveillance microsoft 
 Keyword: windows
-Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
 can be used to identify people browsing through Tor</a>. The vulnerability 
exists only if you use Windows.</p>
+Blurb: <p>Windows DRM files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
 be used to identify people browsing through Tor</a>. The vulnerability exists 
only if you use Windows.</p>
 
 Id: -201701300
 PubDate: 2017-01-30
@@ -766,7 +797,7 @@
 Id: -201701210
 PubDate: 2017-01-21
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>The Meitu photo-editing app <a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>
 sends user data to a Chinese company</a>.</p>
 
 Id: -201701180
@@ -780,15 +811,15 @@
 
 Id: -201701131
 PubDate: 2017-01-13
-Section: back-doors surveillance mobile
-Keyword: app whatsapp
+Section: back-doors mobiles
+Keyword: apps whatsapp
 Blurb: <p>WhatsApp <a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages";>
 has a back door that the company can use to read the plaintext of 
messages</a>.</p>
 + 
 +  <p>This should not come as a surprise. Nonfree software for encryption is 
never trustworthy.</p>
 
 Id: -201701130
 PubDate: 2017-01-13
-Section: insecurity back-doors mobiles
+Section: insecurity surveillance apps
 Keyword: whatsapp
 Blurb: <p>WhatsApp has a feature that <a 
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
 has been described as a &ldquo;back door&rdquo;</a> because it would enable 
governments to nullify its encryption.</p>
 + 
@@ -796,14 +827,14 @@
 
 Id: -201701110
 PubDate: 2017-01-11
-Section:
+Section: interference adobe
 Keyword:
-Blurb: <p>An upgrade package for Acrobat Reader <a 
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>
 silently alters Chrome</a>.</p>
+Blurb: <p>An upgrade package for Acrobat Reader <a 
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
 alters Chrome</a>.</p>
 
 Id: -201701061
 PubDate: 2017-01-06
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: apps censorship
 Blurb: <p>Apple used its censorship system to enforce Russian surveillance <a 
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
 by blocking distribution of the LinkedIn app in Russia</a>.</p>
 + 
 +  <p>This is ironic because LinkedIn is a surveillance system itself.  While 
subjecting its users to its own surveillance, it tries to protect its users 
from Russian surveillance, and is therefore subject to Russian censorship.</p>
@@ -818,8 +849,8 @@
 
 Id: -201701050
 PubDate: 2017-01-05
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: apps censorship
 Blurb: <p>Apple used its censorship system to enforce China's censorship <a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>
 by blocking distribution of the New York Times app</a>.</p>
 
 Id: -201612230
@@ -832,8 +863,8 @@
 
 Id: -201612200
 PubDate: 2016-12-20
-Section:
-Keyword:
+Section: sabotage appliances
+Keyword: ham-radio
 Blurb: <p>The developer of Ham Radio Deluxe <a 
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>
 sabotaged a customer's installation as punishment for posting a negative 
review</a>.</p>
 + 
 +  <p>Most proprietary software companies don't use their power so harshly, 
but it is an injustice that they all <em>have</em> such power.</p>
@@ -852,16 +883,16 @@
 
 Id: -201612061
 PubDate: 2016-12-06
-Section: insecurity toy appliances
-Keyword: my-friend-cayla
+Section: insecurity appliances
+Keyword: my-friend-cayla surveillance toy
 Blurb: <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>
 remotely controlled with a mobile phone</a>; physical access is not necessary. 
This would enable crackers to listen in on a child's conversations, and even 
speak into the toys themselves.</p>
 + 
 +  <p>This means a burglar could speak into the toys and ask the child to 
unlock the front door while Mommy's not looking.</p>
 
 Id: -201612060
 PubDate: 2016-12-06
-Section:
-Keyword:
+Section: surveillance toy
+Keyword: my-friend-cayla insecurity appliances
 Blurb: <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>
 children's conversations to Nuance Communications</a>, a speech recognition 
company based in the U.S.</p>
 + 
 +  <p>Those toys also contain major security vulnerabilities; crackers can 
remotely control the toys with a mobile phone. This would enable crackers to 
listen in on a child's speech, and even speak into the toys themselves.</p>
@@ -878,11 +909,11 @@
 PubDate: 2016-11-24
 Section: surveillance microsoft windows
 Keyword: system
-Blurb: <p>By default, Windows 10 <a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>
 sends debugging information to Microsoft, including core dumps</a>. Microsoft 
now distributes them to another company.</p>
+Blurb: <p>By default, Windows 10 <a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
 debugging information to Microsoft, including core dumps</a>. Microsoft now 
distributes them to another company.</p>
 
 Id: -201611170
 PubDate: 2016-11-17
-Section: apple surveillance ithing
+Section: apple surveillance ithings
 Keyword: iphone
 Blurb: <p>iPhones <a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>send
 lots of personal data to Apple's servers</a>.  Big Brother can get them from 
there.</p>
 
@@ -924,7 +955,7 @@
 PubDate: 2016-11-07
 Section: games surveillance
 Keyword: nVidia
-Blurb: <p>nVidia's proprietary GeForce Experience <a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>
 makes users identify themselves and then sends personal data about them to 
nVidia servers</a>.</p>
+Blurb: <p>nVidia's proprietary GeForce Experience <a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>makes
 users identify themselves and then sends personal data about them to nVidia 
servers</a>.</p>
 
 Id: -201611060
 PubDate: 2016-11-06
@@ -940,8 +971,8 @@
 
 Id: -201609280
 PubDate: 2016-09-28
-Section: apple surveillance ithing
-Keyword: imessage app
+Section: apple surveillance ithings
+Keyword: imessage apps
 Blurb: <p>The iMessage app on iThings <a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>tells
 a server every phone number that the user types into it</a>; the server 
records these numbers for at least 30 days.</p>
 
 Id: -201609240
@@ -954,7 +985,7 @@
 Id: -201609210
 PubDate: 2016-09-21
 Section: google surveillance
-Keyword: app
+Keyword: apps
 Blurb: <p>Google's new voice messaging app <a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>
 logs all conversations</a>.</p>
 
 Id: -201609200
@@ -966,7 +997,7 @@
 Id: -201609140
 PubDate: 2016-09-14
 Section: surveillance mobiles google
-Keyword: android app
+Keyword: android apps
 Blurb: <p>Google Play (a component of Android) <a 
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg";>
 tracks the users' movements without their permission</a>.</p>
 + 
 +  <p>Even if you disable Google Maps and location tracking, you must disable 
Google Play itself to completely stop the tracking. This is yet another example 
of nonfree software pretending to obey the user, when it's actually doing 
something else. Such a thing would be almost unthinkable with free software.</p>
@@ -1013,7 +1044,7 @@
 PubDate: 2016-08-02
 Section: microsoft insecurity
 Keyword: browser
-Blurb: <p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>
 flaw in Internet Explorer and Edge</a> allows an attacker to retrieve 
Microsoft account credentials, if the user is tricked into visiting a malicious 
link.</p>
+Blurb: <p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
 in Internet Explorer and Edge</a> allows an attacker to retrieve Microsoft 
account credentials, if the user is tricked into visiting a malicious link.</p>
 
 Id: -201607290
 PubDate: 2016-07-29
@@ -1024,13 +1055,13 @@
 Id: -201607281
 PubDate: 2016-07-28
 Section: back-doors alter-data apple macos
-Keyword: app
+Keyword: apps
 Blurb: <p>The Dropbox app for Macintosh <a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
 takes control of user interface items after luring the user into entering an 
admin password</a>.</p>
 
 Id: -201607280
 PubDate: 2016-07-28
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>A half-blind security critique of a tracking app: it found that <a 
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
 blatant flaws allowed anyone to snoop on a user's personal data</a>. The 
critique fails entirely to express concern that the app sends the personal data 
to a server, where the <em>developer</em> gets it all. This 
&ldquo;service&rdquo; is for suckers!</p>
 + 
 +  <p>The server surely has a &ldquo;privacy policy,&rdquo; and surely it is 
worthless since nearly all of them are.</p>
@@ -1057,7 +1088,7 @@
 PubDate: 2016-07-15
 Section: microsoft tyrants
 Keyword: windows-rt
-Blurb: <p>Microsoft accidentally left a way for users to install GNU/Linux on 
Windows RT tablets, but now it has <a 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
 &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall to call 
this &ldquo;protecting&rdquo; the users. The article talks of installing 
&ldquo;Linux&rdquo;, but the context shows it is really <a 
href="/gnu/linux-and-gnu.html"> GNU/Linux</a> that users install.</p>
+Blurb: <p>Microsoft accidentally left a way for users to install GNU/Linux on 
Windows RT tablets, but now it has <a 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
 &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall to call 
this &ldquo;protecting&rdquo; the users.  The article talks of installing 
&ldquo;Linux&rdquo;, but the context shows it is really <a 
href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users install.</p>
 
 Id: -201607140
 PubDate: 2016-07-14
@@ -1065,12 +1096,6 @@
 Keyword: games
 Blurb: <p>The proprietor of the Pokémon Go game <a 
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business";>
 invites restaurants and other businesses to pay to have the game lure people 
there</a>.</p>
 
-Id: -201607040
-PubDate: 2016-07-04
-Section: microsoft interference
-Keyword: windows
-Blurb: <p>Microsoft has started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
 nagging users obnoxiously and repeatedly to install Windows 10</a>.</p>
-
 Id: -201606290
 PubDate: 2016-06-29
 Section: insecurity
@@ -1079,18 +1104,11 @@
 + 
 +  <p>GNU/Linux does not need antivirus software.</p>
 
-Id: -201606270
-PubDate: 2016-06-27
-PubDate: 2015-12-07
-Section: microsoft sabotage
-Keyword: windows
-Blurb: <p>Microsoft is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
 forcibly pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 Windows update to its version 10</a>, ignoring the flag on Windows 7 or 8 that 
you could set to not upgrade. This reaffirms the presence of a <a 
href="/proprietary/proprietary-back-doors.html"> universal back door in 
Windows</a> 7 and 8.</p>
-
 Id: -201606080
 PubDate: 2016-06-08
 Section: apple sabotage
 Keyword: windows quicktime
-Blurb: <p>Apple <a 
href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
 stops users from fixing the security bugs in Quicktime for Windows</a>, while 
refusing to fix them itself.</p>
+Blurb: <p>Apple <a 
href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
 stops users from fixing the security bugs in Quicktime for Windows</a>, while 
refusing to fix them itself.</p>
 
 Id: -201606060
 PubDate: 2016-06-06
@@ -1122,33 +1140,27 @@
 PubDate: 2016-06-01
 Section: microsoft sabotage
 Keyword: windows
-Blurb: <p>Once Microsoft has tricked a user into accepting installation of 
Windows 10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";> 
they find that they are denied the option to cancel or even postpone the 
imposed date of installation</a>.</p>
+Blurb: <p>Once Microsoft has tricked a user into accepting installation of 
Windows 10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
 find that they are denied the option to cancel or even postpone the imposed 
date of installation</a>.</p>
 + 
 +  <p>This demonstrates what we've said for years: using proprietary software 
means letting someone have power over you, and you're going to get screwed 
sooner or later.</p>
 
 Id: -201605310
 PubDate: 2016-05-31
 Section: surveillance mobiles
-Keyword: facebook app
+Keyword: facebook apps
 Blurb: <p>Facebook's app listens all the time, <a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html";>
 to snoop on what people are listening to or watching</a>. In addition, it may 
be analyzing people's conversations to serve them with targeted 
advertisements.</p>
 
-Id: -201605220
-PubDate: 2016-05-22
-Section: microsoft interference
-Keyword: windows
-Blurb: <p>Microsoft <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>
 is tricking users</a> <a 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
 into replacing Windows 7 with Windows 10</a>.</p>
-
 Id: -201605200
 PubDate: 2016-05-20
 Section: games drm
 Keyword:
-Blurb: <p>Oculus Rift games now <a 
href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform";>
 have DRM meant to prevent running them on other systems</a>.</p>
+Blurb: <p>Oculus Rift games now have <a 
href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform";>
 DRM meant to prevent running them on other systems</a>.</p>
 
 Id: -201605190
 PubDate: 2016-05-19
-Section: apple jails censorship games
-Keyword:
-Blurb: <p>Apple censors games, <a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
 banning some games from the cr…app store</a> because of which political 
points they suggest. Some political points are apparently considered 
acceptable.</p>
+Section: apple jails
+Keyword: games censorship
+Blurb: <p>Apple censors games, <a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
 banning some games from the cr&hellip;app store</a> because of which political 
points they suggest. Some political points are apparently considered 
acceptable.</p>
 
 Id: -201605150
 PubDate: 2016-05-15
@@ -1162,14 +1174,14 @@
 PubDate: 2013-11-13
 PubDate: 2016-05-04
 Section: apple incompatibility
-Keyword: app macos ios icloud
+Keyword: apps macos ios icloud
 Blurb: <p>iWork (office software that runs on MacOS, iOS and iCloud) uses 
secret formats and <a href="https://en.wikipedia.org/wiki/IWork";>provides no 
means of converting them to or from Open Document Formats</a>. iWork formats 
have changed several times since they were first introduced. This may have had 
the effect of thwarting <a 
href="https://github.com/obriensp/iWorkFileFormat";>reverse engineering 
efforts</a>, thus preventing free software from fully supporting them.</p>
 + 
 +  <p>iWork formats are considered <a 
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2";>
 unfit for document preservation</a>.</p>
 
 Id: -201605040
 PubDate: 2016-05-04
-Section: apple sabotage app
+Section: apple sabotage apps
 Keyword:
 Blurb: <p>The Apple Music client program <a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
 the user's file system for music files, copies them to an Apple server, and 
deletes them</a>.</p>
 
@@ -1192,7 +1204,7 @@
 Id: -201604120
 PubDate: 2016-04-12
 Section: insecurity apple
-Keyword: app
+Keyword: apps
 Blurb: <p>A bug in the iThings Messages app <a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>allowed
 a malicious web site to extract all the user's messaging history</a>.</p>
 
 Id: -201604110
@@ -1224,14 +1236,14 @@
 Id: -201603100
 PubDate: 2016-03-10
 Section: insecurity mobiles
-Keyword: payment app
+Keyword: payment apps
 Blurb: <p>Many proprietary payment apps <a 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
 personal data in an insecure way</a>. However, the worse aspect of these apps 
is that <a href="/philosophy/surveillance-vs-democracy.html">payment is not 
anonymous</a>.</p>
 
 Id: -201603090
 PubDate: 2016-03-09
 Section: microsoft interference
 Keyword: windows
-Blurb: <p>Microsoft has made companies' Windows machines managed by the 
company's sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>
 harangue users to complain to the sysadmins about not &ldquo;upgrading&rdquo; 
to Windows 10</a>.</p>
+Blurb: <p>Microsoft has made companies' Windows machines managed by the 
company's sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
 users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to 
Windows 10</a>.</p>
 
 Id: -201603080
 PubDate: 2016-03-08
@@ -1259,8 +1271,8 @@
 
 Id: -201602050
 PubDate: 2016-02-05
-Section: apple sabotage ithing
-Keyword:
+Section: apple sabotage
+Keyword: ithings
 Blurb: <p>iOS version 9 for iThings <a 
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair";>sabotages
 them irreparably if they were repaired by someone other than Apple</a>. Apple 
eventually backed off from this policy under criticism from the users. However, 
it has not acknowledged that this was wrong.</p>
 
 Id: -201602030
@@ -1273,24 +1285,18 @@
 + 
 +  <p>Google's censorship, unlike that of Apple, is not total: Android allows 
users to install apps in other ways. You can install free programs from 
f-droid.org.</p>
 
-Id: -201602020
-PubDate: 2016-02-02
-Section: microsoft sabotage
-Keyword: windows
-Blurb: <p>Microsoft was for months <a 
href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
 tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they fail to 
notice and say no.</p>
-
 Id: -201601310
 PubDate: 2014-10-23
 PubDate: 2016-01-31
-Section:
-Keyword:
+Section: sabotage microsoft
+Keyword: ftdi driver
 Blurb: <p>FTDI's proprietary driver for its USB-to-serial chips has been 
designed to <a 
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>
 sabotage alternative compatible chips</a> so that they no longer work. 
Microsoft is <a 
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>
 installing this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
 
 Id: -201601160
 PubDate: 2016-01-16
 Section: microsoft sabotage
 Keyword: windows
-Blurb: <p>Microsoft has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>
 desupported all future Intel CPUs for Windows 7 and 8</a>. Those machines will 
be stuck with the nastier Windows 10. <a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
 AMD and Qualcomm CPUs, too</a>.</p>
+Blurb: <p>Microsoft has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
 all future Intel CPUs for Windows 7 and 8</a>. Those machines will be stuck 
with the nastier Windows 10.  <a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
 AMD and Qualcomm CPUs, too</a>.</p>
 + 
 +  <p>Of course, Windows 7 and 8 are unethical too, because they are 
proprietary software. But this example of Microsoft's wielding its power 
demonstrates the power it holds.</p>
 + 
@@ -1302,7 +1308,7 @@
 PubDate: 2016-01-14
 Section: back-doors alter-data microsoft windows
 Keyword:
-Blurb: <p id="windows7-back-door">Users reported that <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft was forcing them to replace Windows 7 and 8 with all-spying Windows 
10</a>.</p>
+Blurb: <p id="windows7-back-door">In 2015, users reported that <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft was forcing them to replace Windows 7 and 8 with all-spying Windows 
10</a>.</p>
 + 
 +  <p>Microsoft was in fact <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 attacking computers that run Windows 7 and 8</a>, switching on a flag that 
said whether to &ldquo;upgrade&rdquo; to Windows 10 when users had turned it 
off.</p>
 + 
@@ -1313,7 +1319,7 @@
 Id: -201601130
 PubDate: 2016-01-13
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>Apps that include <a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
 Symphony surveillance software snoop on what radio and TV programs are playing 
nearby</a>. Also on what users post on various sites such as Facebook, Google+  
and Twitter.</p>
 
 Id: -201601110
@@ -1360,14 +1366,14 @@
 
 Id: -201512260
 PubDate: 2015-12-26
-Section: appleDRM drm ithing
-Keyword: hardware
+Section: appleDRM drm
+Keyword: ithings
 Blurb: <p><a 
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
 Apple uses DRM software to prevent people from charging an iThing with a 
generic USB cable</a>.</p>
 
 Id: -201512140
 PubDate: 2015-12-14
-Section:
-Keyword:
+Section: sabotage appliances
+Keyword: phillips
 Blurb: <p>Phillips &ldquo;smart&rdquo; lightbulbs had initially been designed 
to interact with other companies' smart light bulbs, but <a 
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
 later the company updated the firmware to disallow interoperability</a>.</p>
 + 
 +  <p>If a product is &ldquo;smart&rdquo;, and you didn't build it, it is 
cleverly serving its manufacturer <em>against you</em>.</p>
@@ -1389,7 +1395,7 @@
 PubDate: 2015-03-26
 Section:
 Keyword:
-Blurb: <p><a 
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
 Microsoft cut off security fixes for Windows XP, except to some big users that 
pay exorbitantly.</a></p>
+Blurb: <p><a 
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
 Microsoft cut off security fixes for Windows XP, except to some big users that 
pay exorbitantly</a>.</p>
 + 
 +  <p>Microsoft is going to <a 
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
 cut off support for some Internet Explorer versions</a> in the same way.</p>
 + 
@@ -1438,7 +1444,7 @@
 Id: -201511191
 PubDate: 2015-11-19
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>&ldquo;Cryptic communication,&rdquo; unrelated to the app's 
functionality, was <a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";> 
found in the 500 most popular gratis Android apps</a>.</p>
 + 
 +  <p>The article should not have described these apps as 
&ldquo;free&rdquo;&mdash;they are not free software. The clear way to say 
&ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;</p>
@@ -1509,14 +1515,6 @@
 Keyword: firmware
 Blurb: <p>&ldquo;Self-encrypting&rdquo; disk drives do the encryption with 
proprietary firmware so you can't trust it. Western Digital's &ldquo;My 
Passport&rdquo; drives <a 
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
 have a back door</a>.</p>
 
-Id: -201510150
-PubDate: 2015-10-15
-Section:
-Keyword:
-Blurb: <p>Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft is forcing them to replace Windows 7 and 8 with all-spying Windows 
10</a>.</p>
-+ 
-+  <p>This seems to involve use of a back door in Windows 7 and 8.</p>
-
 Id: -201510050
 PubDate: 2015-10-05
 Section:
@@ -1525,20 +1523,20 @@
 
 Id: -201510020
 PubDate: 2015-10-02
-Section: apple interference ithing
-Keyword:
-Blurb: <p>Apple forced millions of iThings to download a system upgrade <a 
href="https://discussions.apple.com/thread/7256669?tstart=0";>without asking the 
users</a>.  Apple did not forcibly install the upgrade but the downloading 
alone caused lots of trouble.</p>
+Section: apple interference
+Keyword: ithings
+Blurb: <p>Apple forced millions of iThings to <a 
href="https://discussions.apple.com/thread/7256669?tstart=0";>download a system 
upgrade without asking the users</a>. Apple did not forcibly install the 
upgrade but the downloading alone caused lots of trouble.</p>
 
 Id: -201509290
 PubDate: 2015-09-29
-Section: apple jails ithing
-Keyword:
+Section: apple jails
+Keyword: ithings censorship
 Blurb: <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> 
banned a program from the App Store</a> because its developers committed the 
enormity of disassembling some iThings.</p>
 
 Id: -201509240
 PubDate: 2015-09-24
 PubDate: 2014-09-01
-Section: apple surveillance ithing
+Section: apple surveillance ithings
 Keyword: icloud
 Blurb: <p>iThings automatically upload to Apple's servers all the photos and 
videos they make.</p>
 + 
@@ -1552,16 +1550,16 @@
 
 Id: -201509230
 PubDate: 2015-09-23
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: censorship
 Blurb: <p>As of 2015, Apple <a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
 systematically bans apps that endorse abortion rights or would help women find 
abortions</a>.</p>
 + 
 +  <p>This particular political slant <a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
 affects other Apple services</a>.</p>
 
 Id: -201509220
 PubDate: 2015-09-22
-Section:
-Keyword:
+Section: sabotage surveillance bios
+Keyword: lenovo
 Blurb: <p><a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
 Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs. Note that the specific sabotage method Lenovo used did not affect 
GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean 
since <a href="/proprietary/malware-microsoft.html"> Microsoft puts in its own 
malware</a>.</p>
 
 Id: -201509210
@@ -1579,7 +1577,7 @@
 Id: -201509160
 PubDate: 2015-09-16
 Section: back-doors alter-data surveillance games
-Keyword: app
+Keyword: apps
 Blurb: <p>Modern gratis game cr&hellip;apps <a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
 collect a wide range of data about their users and their users' friends and 
associates</a>.</p>
 + 
 +  <p>Even nastier, they do it through ad networks that merge the data 
collected by various cr&hellip;apps and sites made by different companies.</p>
@@ -1588,12 +1586,6 @@
 + 
 +  <p>While the article describes gratis games, games that cost money can use 
the same tactics.</p>
 
-Id: -201509110
-PubDate: 2015-09-11
-Section: microsoft sabotage
-Keyword: windows
-Blurb: <p>Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
 repeatedly nagging many users to install Windows 10</a>.</p>
-
 Id: -201508210
 PubDate: 2015-08-21
 PubDate: 2015-08-21
@@ -1625,11 +1617,11 @@
 
 Id: -201507300
 PubDate: 2015-07-30
-Section: surveillance microsoft windows
-Keyword:
+Section: surveillance microsoft
+Keyword: windows
 Blurb: <p>Windows 10 <a 
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
 ships with default settings that show no regard for the privacy of its 
users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' 
files, text input, voice input, location info, contacts, calendar records and 
web browsing history, as well as automatically connecting the machines to open 
hotspots and showing targeted ads.</p>
 + 
-+  <p>We can suppose Microsoft looks at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p></li>
++  <p>We can suppose Microsoft look at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicitly say so. 
Will it look at users' files for the Chinese government on demand?</p>
 
 Id: -201507280
 PubDate: 2015-07-28
@@ -1655,8 +1647,8 @@
 
 Id: -201507210
 PubDate: 2015-07-21
-Section: apple tyrants ithing
-Keyword: system
+Section: apple tyrants
+Keyword:  ithings
 Blurb: <p>The iThings are tyrant devices: they do not permit installing a 
different or modified operating system.  There is a port of Android to the 
iThings, but installing it requires <a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
 finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install a 
different system.</p>
 
 Id: -201507170
@@ -1669,13 +1661,13 @@
 + 
 +  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> this was 
used</a>.</p>
 + 
-+  <p>In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be <a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
 forcibly and immediately imposed</a>.</p>
++  <p>In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be <a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>forcibly
 and immediately imposed</a>.</p>
 
 Id: -201507150
 PubDate: 2015-07-15
 Section: microsoft subscriptions
 Keyword: office
-Blurb: <p>Microsoft Office forces users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>
 to subscribe to Office 365 to be able to create/edit documents</a>.</p>
+Blurb: <p>Microsoft Office forces users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
 subscribe to Office 365 to be able to create/edit documents</a>.</p>
 
 Id: -201507030
 PubDate: 2015-07-03
@@ -1686,21 +1678,21 @@
 Id: -201506261
 PubDate: 2015-06-26
 Section: surveillance mobiles
-Keyword: android app
+Keyword: android apps
 Blurb: <p><a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";> A 
study in 2015</a> found that 90% of the top-ranked gratis proprietary Android 
apps contained recognizable tracking libraries. For the paid proprietary apps, 
it was only 60%.</p>
 + 
 +  <p>The article confusingly describes gratis apps as &ldquo;free&rdquo;, but 
most of them are not in fact <a href="/philosophy/free-sw.html"> free 
software</a>. It also uses the ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.</p>
 
 Id: -201506260
 PubDate: 2015-06-26
-Section:
-Keyword:
+Section: interference
+Keyword: oracle
 Blurb: <p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will <a 
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
 change the user's initial web page, and default search engine, to Yahoo</a> 
unless the user intervenes to stop it.</p>
 
 Id: -201506250
 PubDate: 2015-06-25
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: apps censorship
 Blurb: <p>Apple has banned iThing applications that show the confederate flag. 
 <a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
 Not only those that use it as a symbol of racism</a>, but even strategic games 
that use it to represent confederate army units fighting in the Civil War.</p>
 + 
 +  <p>This ludicrous rigidity illustrates the point that Apple should not be 
allowed to censor apps.  Even if Apple carried out this act of censorship with 
some care, it would still be wrong.  Whether racism is bad, whether educating 
people about drone attacks is bad, are not the real issue.  Apple should not 
have the power to impose its views about either of these questions, or any 
other.</p>
@@ -1719,7 +1711,7 @@
 + 
 +  <p>Thus, Windows is overt malware in regard to surveillance, as in other 
issues.</p>
 + 
-+  <p>We can suppose Microsoft looks at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p>
++  <p>We can suppose Microsoft look at users' files for the US government on 
demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. Will 
it look at users' files for the Chinese government on demand?</p>
 + 
 +  <p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to track the browsing of each specific user.</p>
 + 
@@ -1734,14 +1726,14 @@
 Id: -201505291
 PubDate: 2015-05-29
 Section: insecurity mobiles
-Keyword: app
-Blurb: <p><a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
 Many smartphone apps use insecure authentication methods when storing your 
personal data on remote servers.</a> This leaves personal information like 
email addresses, passwords, and health information vulnerable. Because many of 
these apps are proprietary it makes it hard to impossible to know which apps 
are at risk.</p>
+Keyword: apps
+Blurb: <p><a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
 Many smartphone apps use insecure authentication methods when storing your 
personal data on remote servers</a>. This leaves personal information like 
email addresses, passwords, and health information vulnerable. Because many of 
these apps are proprietary it makes it hard to impossible to know which apps 
are at risk.</p>
 
 Id: -201505290
 PubDate: 2015-05-29
 Section:
 Keyword:
-Blurb: <p><a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
 Verizon cable TV snoops on what programs people watch, and even what they 
wanted to record.</a></p>
+Blurb: <p><a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
 Verizon cable TV snoops on what programs people watch, and even what they 
wanted to record</a>.</p>
 
 Id: -201505060
 PubDate: 2015-05-06
@@ -1759,14 +1751,20 @@
 
 Id: -201504300
 PubDate: 2015-04-30
-Section:
-Keyword:
+Section: sabotage tvsets surveillance
+Keyword: vizio
 Blurb: <p>Vizio <a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";> 
used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users 
watch</a>. The TVs did not do that when first sold.</p>
 
+Id: -201504091
+PubDate: 2015-04-09
+Section: back-doors other apple
+Keyword: macos sabotage
+Blurb: <p>Mac OS X had an <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
 intentional local back door for 4 years</a>, which could be exploited by 
attackers to gain root privileges.</p>
+
 Id: -201504090
 PubDate: 2015-04-09
-Section: back-doors other insecurity apple macos
-Keyword:
+Section: sabotage
+Keyword: back-doors other apple macos
 Blurb: <p>Mac OS X had an <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
 intentional local back door for 4 years</a>, which could be exploited by 
attackers to gain root privileges.</p>
 
 Id: -201504060
@@ -1820,14 +1818,14 @@
 
 Id: -201412110
 PubDate: 2014-12-11
-Section:
-Keyword:
+Section: apple jails
+Keyword: censorship
 Blurb: <p><a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
 More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
 
 Id: -201412040
 PubDate: 2014-12-04
-Section: apple sabotage ithing
-Keyword: ipod
+Section: apple sabotage
+Keyword: ithings
 Blurb: <p>Apple <a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
 deleted from iPods the music that users had got from internet music stores 
that competed with iTunes</a>.</p>
 
 Id: -201412010
@@ -1839,7 +1837,7 @@
 Id: -201411260
 PubDate: 2014-11-26
 Section: surveillance mobiles
-Keyword: app
+Keyword: apps
 Blurb: <p>Many proprietary apps for mobile devices report which other apps the 
user has installed. <a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/";> Twitter is doing 
this in a way that at least is visible and optional</a>. Not as bad as what the 
others do.</p>
 
 Id: -201411090
@@ -1860,26 +1858,26 @@
 PubDate: 2014-10-30
 PubDate: 2014-10-28
 Section: surveillance apple macos
-Keyword: app system
+Keyword: apps
 Blurb: <p><a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
 MacOS automatically sends to Apple servers unsaved documents being edited</a>. 
The <a 
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/";>
 things you have not decided to save are even more sensitive than the things 
you have stored in files</a>.</p>
 
 Id: -201410220
 PubDate: 2014-10-22
 Section: surveillance apple macos
-Keyword: system
+Keyword:
 Blurb: <p>Apple admits the <a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
 spying in a search facility</a>, but there's a lot <a 
href="https://github.com/fix-macosx/yosemite-phone-home";> more snooping that 
Apple has not talked about</a>.</p>
 
 Id: -201410200
 PubDate: 2014-10-20
 Section: surveillance apple macos
-Keyword: system
+Keyword:
 Blurb: <p>Various operations in <a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
 the latest MacOS send reports to Apple</a> servers.</p>
 
 Id: -201410130
 PubDate: 2014-10-13
-Section:
-Keyword:
-Blurb: <p><a 
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>
 Nintendo remotely sabotaged all Wiis, making them refuse to work unless the 
user agrees to a new EULA.</a></p>
+Section: sabotage games
+Keyword: nintendo wii
+Blurb: <p><a 
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>
 Nintendo remotely sabotaged all Wiis, making them refuse to work unless the 
user agrees to a new EULA</a>.</p>
 + 
 +  <p>We can be quite sure this EULA is unjust because injustice is the only 
motive for imposing an EULA.</p>
 
@@ -1911,8 +1909,8 @@
 PubDate: 2014-05-08
 PubDate: 2014-09-17
 PubDate: 2014-09-22
-Section: back-doors surveillance apple
-Keyword: ios iphone
+Section: surveillance apple
+Keyword: ithings back-doors 
 Blurb: <p>Apple can, and regularly does, <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
 remotely extract some data from iPhones for the state</a>.</p>
 + 
 +  <p>This may have improved with <a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
 iOS 8 security improvements</a>; but <a 
href="https://firstlook.org/theintercept/2014/09/22/apple-data/";> not as much 
as Apple claims</a>.</p>
@@ -1944,8 +1942,8 @@
 Id: -201405250
 PubDate: 2014-02-07
 PubDate: 2014-05-25
-Section:
-Keyword:
+Section: apple jails
+Keyword: apps censorship
 Blurb: <p>Apple used this censorship power in 2014 to <a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";> 
ban all bitcoin apps</a> for the iThings for a time.  It also <a 
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
 banned a game about growing marijuana</a>, while permitting games about other 
crimes such as killing people.  Perhaps Apple considers killing more acceptable 
than marijuana.</p>
 
 Id: -201405200
@@ -1956,7 +1954,7 @@
 Keyword:
 Blurb: <p>Spyware in <a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
 LG &ldquo;smart&rdquo; TVs</a> reports what the user watches, and the switch 
to turn this off has no effect. (The fact that the transmission reports a 404 
error really means nothing; the server could save that data anyway.)</p>
 + 
-+  <p>Even worse, it <a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
 snoops on other devices on the user's local network.</a></p>
++  <p>Even worse, it <a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
 snoops on other devices on the user's local network</a>.</p>
 + 
 +  <p>LG later said it had installed a patch to stop this, but any product 
could spy this way.</p>
 + 
@@ -1965,7 +1963,7 @@
 Id: -201405190
 PubDate: 2014-05-19
 Section: insecurity tethers
-Keyword: app
+Keyword: apps
 Blurb: <p>An app to prevent &ldquo;identity theft&rdquo; (access to personal 
data) by storing users' data on a special server <a 
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
 deactivated by its developer</a> which had discovered a security flaw.</p>
 + 
 +  <p>That developer seems to be conscientious about protecting personal data 
from third parties in general, but it can't protect that data from the state. 
Quite the contrary: confiding your data to someone else's server, if not first 
encrypted by you with free software, undermines your rights.</p>
@@ -1978,9 +1976,9 @@
 
 Id: -201405110
 PubDate: 2014-05-11
-Section:
-Keyword:
-Blurb: <p>LG <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
 disabled network features</a> on <em>previously purchased</em> 
&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop 
on them and distribute their personal data.</p>
+Section: sabotage
+Keyword: lg tvsets surveillance
+Blurb: <p>LG <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>disabled
 network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, 
unless the purchasers agreed to let LG begin to snoop on them and distribute 
their personal data.</p>
 
 Id: -201405080
 PubDate: 2014-05-08
@@ -2028,8 +2026,8 @@
 
 Id: -201402070
 PubDate: 2014-02-07
-Section: apple jails censorship
-Keyword:
+Section: apple jails
+Keyword: censorship
 Blurb: <p>Apple rejected an app that displayed the locations of US drone 
assassinations, giving various excuses. Each time the developers fixed one 
&ldquo;problem&rdquo;, Apple complained about another.  After the fifth 
rejection, Apple <a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";> admitted 
it was censoring the app based on the subject matter</a>.</p>
 
 Id: -201401280
@@ -2044,7 +2042,7 @@
 
 Id: -201401190
 PubDate: 2014-01-19
-Section: games sabotage
+Section: games interference
 Keyword:
 Blurb: <p>Some proprietary <a 
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
 games lure children to spend their parents' money</a>.</p>
 
@@ -2052,17 +2050,17 @@
 PubDate: 2014-01-15
 Section:
 Keyword:
-Blurb: <p><a 
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/";>
 Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
+Blurb: <p><a 
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/";>
 Baidu's Japanese-input and Chinese-input apps spy on users</a>.</p>
 
 Id: -201401101
 PubDate: 2014-01-10
 Section: surveillance apple macos
-Keyword: system
+Keyword:
 Blurb: <p><a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
 Spotlight search</a> sends users' search terms to Apple.</p>
 
 Id: -201401100
 PubDate: 2014-01-10
-Section: surveillance apple ithing
+Section: surveillance apple ithings
 Keyword:
 Blurb: <p>The <a class="not-a-duplicate" 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
 iBeacon</a> lets stores determine exactly where the iThing is, and get other 
info too.</p>
 
@@ -2070,7 +2068,7 @@
 PubDate: 2013-12-30
 Section:
 Keyword:
-Blurb: <p><a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
 Either Apple helps the NSA snoop on all the data in an iThing, or it is 
totally incompetent.</a></p>
+Blurb: <p><a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
 Either Apple helps the NSA snoop on all the data in an iThing, or it is 
totally incompetent</a>.</p>
 
 Id: -201312290
 PubDate: 2013-12-29
@@ -2084,13 +2082,13 @@
 PubDate: 2013-12-27
 Section:
 Keyword:
-Blurb: <p>The nonfree Snapchat app's principal purpose is to restrict the use 
of data on the user's computer, but it does surveillance too: <a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
 it tries to get the user's list of other people's phone numbers.</a></p>
+Blurb: <p>The nonfree Snapchat app's principal purpose is to restrict the use 
of data on the user's computer, but it does surveillance too: <a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
 it tries to get the user's list of other people's phone numbers</a>.</p>
 
 Id: -201312060
 PubDate: 2013-12-06
 Section:
 Keyword:
-Blurb: <p>The Brightest Flashlight app <a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
 sends user data, including geolocation, for use by companies.</a></p>
+Blurb: <p>The Brightest Flashlight app <a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
 sends user data, including geolocation, for use by companies</a>.</p>
 + 
 +  <p>The FTC criticized this app because it asked the user to approve sending 
personal data to the app developer but did not ask about sending it to other 
companies. This shows the weakness of the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to surveillance: why should a flashlight app send any 
information to anyone? A free software flashlight app would not.</p>
 
@@ -2103,8 +2101,8 @@
 Id: -201311300
 PubDate: 2013-11-30
 Section: back-doors universal
-Keyword: app myfreeproxy pua
-Blurb: <p><a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
 Some applications come with MyFreeProxy, which is a universal back door that 
can download programs and run them.</a></p>
+Keyword: apps myfreeproxy pua
+Blurb: <p><a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
 Some applications come with MyFreeProxy, which is a universal back door that 
can download programs and run them</a>.</p>
 
 Id: -201311130
 PubDate: 2013-11-13
@@ -2165,9 +2163,9 @@
 
 Id: -201309051
 PubDate: 2013-09-05
-Section:
-Keyword:
-Blurb: <p><a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>
 The NSA has put back doors into nonfree encryption software.</a> We don't know 
which ones they are, but we can be sure they include some widely used systems. 
This reinforces the point that you can never trust the security of nonfree 
software.</p>
+Section: sabotage insecurity
+Keyword: encryption
+Blurb: <p><a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
 NSA has put back doors into nonfree encryption software</a>. We don't know 
which ones they are, but we can be sure they include some widely used systems. 
This reinforces the point that you can never trust the security of nonfree 
software.</p>
 
 Id: -201309050
 PubDate: 2013-09-05
@@ -2187,11 +2185,11 @@
 PubDate: 2013-08-23
 Section: back-doors other microsoft windows
 Keyword: tpm
-Blurb: <p>The German government <a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
 veers away from Windows 8 computers with TPM 2.0 due to potential back door 
capabilities of the TPM 2.0 chip</a>.</p>
+Blurb: <p>The German government <a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
 away from Windows 8 computers with TPM 2.0 due to potential back door 
capabilities of the TPM 2.0 chip</a>.</p>
 
 Id: -201308080
 PubDate: 2013-08-08
-Section:
+Section: apple surveillance ithings
 Keyword:
 Blurb: <p>The iThing also <a 
href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
 tells Apple its geolocation</a> by default, though that can be turned off.</p>
 
@@ -2199,7 +2197,7 @@
 PubDate: 2013-08-06
 Section: insecurity
 Keyword: disk
-Blurb: <p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";> 
Replaceable nonfree software in disk drives can be written by a nonfree 
program.</a> This makes any system vulnerable to persistent attacks that normal 
forensics won't detect.</p>
+Blurb: <p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";> 
Replaceable nonfree software in disk drives can be written by a nonfree 
program</a>. This makes any system vulnerable to persistent attacks that normal 
forensics won't detect.</p>
 
 Id: -201308040
 PubDate: 2013-08-04
@@ -2242,7 +2240,7 @@
 Id: -201307111
 PubDate: 2013-07-11
 Section: back-doors other appliances
-Keyword: hp lefthand system
+Keyword: hp lefthand
 Blurb: <p>HP &ldquo;storage appliances&rdquo; that use the proprietary 
&ldquo;Left Hand&rdquo; operating system have back doors that give HP <a 
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
 remote login access</a> to them.  HP claims that this does not give HP access 
to the customer's data, but if the back door allows installation of software 
changes, a change could be installed that would give access to the customer's 
data.</p>
 
 Id: -201307110
@@ -2257,7 +2255,7 @@
 PubDate: 2013-06-10
 Section: microsoft surveillance windows
 Keyword:
-Blurb: <p>Spyware in older versions of Windows: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
 Windows Update snoops on the user</a>. <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 Windows 8.1 snoops on local searches</a>. And there's a <a 
href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA key in 
Windows</a>, whose functions we don't know.
+Blurb: <p>Spyware in older versions of Windows: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
 Windows Update snoops on the user</a>. <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 Windows 8.1 snoops on local searches</a>. And there's a <a 
href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA key in 
Windows</a>, whose functions we don't know.</p>
 
 Id: -201307000
 PubDate: 2013-07
@@ -2269,7 +2267,7 @@
 PubDate: 2013-06-22
 Section: microsoft sabotage
 Keyword: windows
-Blurb: <p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
 Microsoft cut off security fixes for Windows XP, except to some big users that 
pay exorbitantly.</a></p>
+Blurb: <p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
 Microsoft cut off security fixes for Windows XP, except to some big users that 
pay exorbitantly</a>.</p>
 + 
 +  <p>Microsoft is going to <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
 cut off support for some Internet Explorer versions</a> in the same way.</p>
 + 
@@ -2279,13 +2277,13 @@
 PubDate: 2013-06-22
 Section: microsoft sabotage
 Keyword: windows
-Blurb: <p><a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
 Microsoft informs the NSA of bugs in Windows before fixing them.</a></p>
+Blurb: <p><a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
 Microsoft informs the NSA of bugs in Windows before fixing them</a>.</p>
 
 Id: -201306140
 PubDate: 2013-06-14
 Section: cars surveillance
 Keyword: tesla
-Blurb: <p>Tesla cars allow the company to extract data remotely and determine 
the car's location at any time. (See <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
 Section 2, paragraphs b and c.</a>). The company says it doesn't store this 
information, but if the state orders it to get the data and hand it over, the 
state can store it.</p>
+Blurb: <p>Tesla cars allow the company to extract data remotely and determine 
the car's location at any time. (See Section 2, paragraphs b and c of the <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
 privacy statement</a>.) The company says it doesn't store this information, 
but if the state orders it to get the data and hand it over, the state can 
store it.</p>
 
 Id: -201305100
 PubDate: 2013-05-10
@@ -2324,7 +2322,7 @@
 Id: -201302150
 PubDate: 2013-02-15
 Section: surveillance mobiles google
-Keyword: android app
+Keyword: android apps
 Blurb: <p>Google Play intentionally sends app developers <a 
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
 the personal details of users that install the app</a>.</p>
 + 
 +  <p>Merely asking the &ldquo;consent&rdquo; of users is not enough to 
legitimize actions like this. At this point, most users have stopped reading 
the &ldquo;Terms and Conditions&rdquo; that spell out what they are 
&ldquo;consenting&rdquo; to. Google should clearly and honestly identify the 
information it collects on users, instead of hiding it in an obscurely worded 
EULA.</p>
@@ -2334,15 +2332,15 @@
 Id: -201301280
 PubDate: 2013-01-22
 PubDate: 2013-01-28
-Section: cars insecurity
-Keyword:
+Section: sabotage
+Keyword: oracle plugin
 Blurb: <p>Oracle's nonfree Java plug-in for browsers <a 
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>
 sneakily installs other annoying proprietary software</a>.</p>
 + 
 +  <p>That article disregards all other bad things about proprietary software. 
For instance, it regards the inclusion of proprietary Flash Player (which has a 
<a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>
 surveillance feature</a> and DRM) in Chrome as a good thing. Chrome is a 
proprietary browser with a universal back door.</p>
 + 
 +  <p>We don't agree with the article's views on those issues, but we present 
it as a factual reference.</p>
 + 
-+  <p>In 2014, <a 
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>
 Oracle insisted on continuing this practice.</a></p>
++  <p>In 2014, <a 
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>
 Oracle insisted on continuing this practice</a>.</p>
 
 Id: -201212290
 PubDate: 2012-12-29
@@ -2428,12 +2426,12 @@
 PubDate: 2012-08-21
 Section: google website surveillance
 Keyword:
-Blurb: <p>Many web sites report all their visitors to Google by using the 
Google Analytics service, which <a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
 tells Google the IP address and the page that was visited.</a></p>
+Blurb: <p>Many web sites report all their visitors to Google by using the 
Google Analytics service, which <a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
 tells Google the IP address and the page that was visited</a>.</p>
 
 Id: -201205280
 PubDate: 2012-05-28
-Section:
-Keyword:
+Section: apple tyrant
+Keyword: ithings
 Blurb: <p>The Apple iThings are tyrant devices. There is a port of Android to 
the iThings, but installing it requires <a 
href="https://web.archive.org/web/20150405073541/http://www.idroidproject.org:80/wiki/Status";>
 finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install a 
different system.</p>
 
 Id: -201204280
@@ -2450,7 +2448,7 @@
 
 Id: -201200000
 PubDate: 2012
-Section:
+Section: surveillance webpage
 Keyword:
 Blurb: <p>Many web sites try to collect users' address books (the user's list 
of other people's phone numbers or email addresses). This violates the privacy 
of those other people.</p>
 
@@ -2466,13 +2464,13 @@
 PubDate: 2011-11-17
 Section: surveillance mobiles
 Keyword: carrier-iq
-Blurb: <p>Some manufacturers add a <a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
 hidden general surveillance package such as Carrier IQ.</a></p>
+Blurb: <p>Some manufacturers add a <a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
 hidden general surveillance package such as Carrier IQ</a>.</p>
 
 Id: -201110110
 PubDate: 2011-10-11
 Section: microsoft tyrants mobiles
 Keyword: windows
-Blurb: <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> 
Mobile devices that come with Windows 8 are tyrants.</a></p>
+Blurb: <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> 
Mobile devices that come with Windows 8 are tyrants</a>.</p>
 
 Id: -201110040
 PubDate: 2011-10-04
@@ -2498,7 +2496,7 @@
 PubDate: 2010-06-25
 Section: back-doors install-delete google mobiles
 Keyword: system android
-Blurb: <p>In Android, <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
 Google has a back door to remotely delete apps.</a> (It was in a program 
called GTalkService, which seems since then to have been merged into Google 
Play.)</p>
+Blurb: <p>In Android, <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
 Google has a back door to remotely delete apps</a>. (It was in a program 
called GTalkService, which seems since then to have been merged into Google 
Play.)</p>
 + 
 +  <p>Google can also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
 forcibly and remotely install apps</a> through GTalkService.  This is not 
equivalent to a universal back door, but permits various dirty tricks.</p>
 + 
@@ -2508,19 +2506,19 @@
 PubDate: 2011-02-25
 Section: google drm mobiles
 Keyword: android
-Blurb: <p>Android <a 
href="https://developer.android.com/reference/android/drm/package-summary.html";>
 contains facilities specifically to support DRM.</a></p>
+Blurb: <p>Android <a 
href="https://developer.android.com/reference/android/drm/package-summary.html";>
 contains facilities specifically to support DRM</a>.</p>
 
 Id: -201011220
 PubDate: 2010-11-22
-Section: back-doors alter-data apple ithing
-Keyword: ios iphone system
+Section: back-doors alter-data apple
+Keyword: ithings
 Blurb: <p>The iPhone has a back door for <a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
 remote wipe</a>.  It's not always enabled, but users are led into enabling it 
without understanding.</p>
 
 Id: -201003300
 PubDate: 2010-03-30
-Section:
-Keyword:
-Blurb: <p>Sony <a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>
 sabotaged the Playstation 3</a> with a firmware downgrade that removed the 
feature that allowed users to run GNU/Linux on it.</p>
+Section: sabotage games
+Keyword: sony playstation
+Blurb: <p>Sony <a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
 the Playstation 3</a> with a firmware downgrade that removed the feature that 
allowed users to run GNU/Linux on it.</p>
 + 
 +  <p>Sony subsequently sent police after Geohot, after he cracked the code 
that blocked users from changing the firmware, and we responded by calling for 
a <a href="http://boycottsony.org";> boycott of Sony</a>.</p>
 + 
@@ -2556,8 +2554,8 @@
 
 Id: -200808110
 PubDate: 2008-08-11
-Section: back-doors install-delete apple ithing
-Keyword: ios iphone app system
+Section: back-doors install-delete apple
+Keyword: ithings
 Blurb: <p>The iPhone has a back door <a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
 that allows Apple to remotely delete apps</a> which Apple considers 
&ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have this power 
because of course we can trust Apple.</p>
 
 Id: -200803040
@@ -2576,15 +2574,15 @@
 
 Id: -200709270
 PubDate: 2007-09-27
-Section: apple sabotage ithing
-Keyword: iphone
-Blurb: <p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
 An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been 
unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications not 
approved by <a href="/proprietary/proprietary-jails.html">Apple censorship</a>. 
 All this was apparently intentional.</p>
+Section: apple sabotage
+Keyword: ithings firmware
+Blurb: <p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
 An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been 
unlocked</a>.  The &ldquo;upgrade&rdquo; also deactivated applications not 
approved by <a href="/proprietary/proprietary-jails.html">Apple censorship</a>. 
 All this was apparently intentional.</p>
 
 Id: -200708131
 PubDate: 2007-08-13
 Section: drm microsoft
 Keyword: windows apple
-Blurb: <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";> DRM 
in Windows</a>, introduced to cater to <a href="#bluray"> Bluray</a> disks.  
(The article talks about how the same malware would later be introduced in 
MacOS. That had not been done at the time, but it was done subsequently.)</p>
+Blurb: <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";> DRM 
in Windows</a>, introduced to cater to <a href="#bluray">Bluray</a> disks.  
(The article talks about how the same malware would later be introduced in 
MacOS. That had not been done at the time, but it was done subsequently.)</p>
 
 Id: -200708130
 PubDate: 2007-08-13



reply via email to

[Prev in Thread] Current Thread [Next in Thread]