[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary malware-microsof...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary malware-microsof... |
Date: |
Wed, 26 Sep 2018 15:13:03 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/09/26 15:13:02
Modified files:
server/staging/proprietary: malware-microsoft.html
Log message:
New version of the windows 10 story.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/malware-microsoft.html?cvsroot=www&r1=1.5&r2=1.6
Patches:
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/malware-microsoft.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-microsoft.html 24 Sep 2018 21:26:47 -0000 1.5
+++ malware-microsoft.html 26 Sep 2018 19:13:01 -0000 1.6
@@ -72,22 +72,22 @@
any change whatsoever can be imposed on the users</a>.</p>
<p>This was <a
-
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">reported
- in 2007</a> for XP and Vista, and it seems
+ href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
- href="#windows10-forcing">Windows
- 10 downgrade</a> to computers running Windows 7 and 8.</p>
+ href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+ Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
-
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
- and immediately imposed</a>.</p>
+
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
+ forcibly and immediately imposed</a>.</p>
</li>
<li id="M201512280">
- <p><a
+ <p>Microsoft has <a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft has backdoored its disk encryption</a>.</p>
+ backdoored its disk encryption</a>.</p>
</li>
<li id="M201308230">
@@ -97,10 +97,10 @@
door capabilities of the TPM 2.0 chip.</p>
</li>
- <li id="M201112080">
- <p><a
+ <li id="M201112081">
+ <p><a Windows 8 also has a back door for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
- Windows 8 also has a back door for remotely deleting apps</a>.</p>
+ remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers malicious.
@@ -150,8 +150,8 @@
<li id="M201312040">
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
- Point-of-sale terminals running Windows were taken over and turned
- into a botnet</a> for the purpose of collecting customers' credit
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
card numbers.</p>
</li>
</ul>
@@ -159,9 +159,10 @@
<h3 id="interference">Microsoft Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They are like
sabotage, but they are not grave enough to qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
-interference.</p>
+<p>Various proprietary programs often mess up the user's system. They
+are like sabotage, but they are not grave enough to qualify for the word
+“sabotage”. Nonetheless, they are nasty and wrong. This
+section describes examples of Microsoft committing interference.</p>
<ul class="blurbs">
<li id="M201809120">
@@ -271,36 +272,33 @@
</li>
<li id="M201608170">
- <p id="windows10-forcing">In 2015, users reported that <a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft used many tricks to “persuade”
- reluctant users to switch. Among other things, it forced <a
+ <p>In 2015, Microsoft committed acts of sabotage to trick
+ users of Windows 7 and 8 into installing all-spying Windows 10
+ against their will. Among other things, Microsoft forced their
+ computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- stealth downloads of Windows 10</a>, apparently through a <a
- href="#windows-update">universal
- back door</a>. Not only did the unwanted downloads <a
+ silently download… the whole of Windows 10!</a>. Apparently,
+ this was done through a <a
+ href="/proprietary/proprietary-back-doors#windows-update">
+ universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of
- the people who let installation proceed found
- out that this “upgrade” was in fact a <a
+ use up much needed resources</a>, but many of the people who let
+ installation proceed found out that this âupgradeâ was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
<p>Then Microsoft attacked the
computers that were still running Windows 7 or 8 by <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switching on a flag that urged
- users to “upgrade” to Windows 10</a>
- when they had turned it off. This was done through <a
+ repeatedly switching on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
+ it off, in the hope that some day they would fail to say no.
+ This was done through <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
- deviant use of Windows Update</a>.</p>
-
- <p>Later on, Microsoft published instructions on <a
+ deviant use of Windows Update</a>. (Later on, Microsoft published
+ instructions on <a
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.</p>
+ how to permanently reject the downgrade to Windows 10</a>.)</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
@@ -599,7 +597,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/24 21:26:47 $
+$Date: 2018/09/26 19:13:01 $
<!-- timestamp end -->
</p>
</div>
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/23
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/24
- www/server/staging/proprietary malware-microsof...,
Therese Godefroy <=
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary malware-microsof..., Therese Godefroy, 2018/09/26