[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary.html
From: |
Therese Godefroy |
Subject: |
www/proprietary proprietary.html |
Date: |
Tue, 9 Oct 2018 08:34:37 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/09 08:34:37
Modified files:
proprietary : proprietary.html
Log message:
Restyle the TOC; add 'Latest additions' section.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.32&r2=1.33
Patches:
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.html 18 Sep 2018 07:10:09 -0000 1.32
+++ proprietary.html 9 Oct 2018 12:34:36 -0000 1.33
@@ -1,24 +1,42 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.85 -->
+<!--#include virtual="/server/html5-header.html" -->
+<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit lists with items such as <li id="Mnnnnnnnn">!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<title>Proprietary Software
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary.translist" -->
<style type="text/css" media="print,screen">
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
<!--
-div.toc h3 {
- text-align: left;
- font-size: 1.2em;
- padding: 0 .83em;
- margin: .5em 1.5% 1em;
+.button { float: left; margin: .5em; }
+.button a { display: inline-block; }
+table#TOC {
+ display: block;
+ max-width: 100%;
+ overflow: auto;
+ margin: 2.5em auto;
+ background: #f5f5f5;
}
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc { margin-top: 1em; }
---></style>
+#TOC th { font-size: 1.1em; }
+#TOC th, #TOC td { padding: .7em; text-align: center; }
+#TOC ul { padding-bottom: .5em; }
+#TOC ul li { margin: .5em 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
+</style>
+<style type="text/css" media="print,screen">
+#TOC { width: 40em; }
+</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
+<p class="button"><a href="#TOC">Table of contents</a></p>
+<p class="button"><a href="#latest">Latest additions</a></p>
+<div style="clear: both"></div>
+
<p>Proprietary software, also called nonfree software,
means software that doesn't
<a href="/philosophy/free-sw.html">respect users' freedom and
@@ -42,62 +60,137 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of September, 2018, the files in this directory list around 400
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.</p>
-
-<div class="toc">
-<div class="companies">
-<h3>Company or type of product</h3>
-<ul>
- <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
- <li><a href="/proprietary/malware-google.html">Google Malware</a></li>
- <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
- <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
- <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
- <li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
- <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
- <li><a href="/proprietary/malware-cars.html">Malware in cars</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<h3>Type of malware</h3>
-<ul>
-<li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
-<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
-<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a href="/proprietary/proprietary-tethers.html">Tethers</a> to
-servers</li>
-<li><a href="/proprietary/proprietary-drm.html">Digital restrictions
- management</a> or “DRM” means functionalities designed
- to restrict what users can do with the data in their computers.</li>
-<li><a href="/proprietary/proprietary-jails.html">Jails</a>—systems
- that impose censorship on application programs.</li>
-<li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
- manufacturer.</li>
-<li><a href="/proprietary/potential-malware.html">Potential Malware</a></li>
-</ul>
-</div>
-</div>
+<p>As of September, 2018, the pages in this directory list nearly 350
+instances of malicious functionalities (with close to 400 references to
+back them up), but there are surely thousands more we don't know about.</p>
+
+<table id="TOC">
+ <tr>
+ <th>Injustices or techniques</td>
+ <th>Products or companies</td>
+ </tr>
+ <tr>
+ <td>
+ <ul>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a href="/proprietary/proprietary-coverups.html">Coverup</a></li>
+ <li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li>
+ <li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+ <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
+ </ul>
+ </td>
+ <td>
+ <ul>
+ <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a href="/proprietary/malware-games.html">Games</a></li>
+ <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
+ </ul>
+ <ul>
+ <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a href="/proprietary/malware-google.html">Google</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ </ul>
+ </td>
+ </tr>
+ <tr>
+ <td colspan="2">
+ <ol>
+ <li id="f1"><em>Back door:</em> any piece of software that is
+ running on your computer, and listens for commands from someone
+ else who can tell it to do things without asking your approval.</li>
+
+ <li id="f2"><em>Digital restrictions management, or
+ “DRM”:</em> functionalities designed to restrict
+ what users can do with the data in their computers.</li>
+
+ <li id="f3"><em>Jail:</em> system that imposes censorship on
+ application programs.</li>
+
+ <li id="f4"><em>Tether:</em> functionality that requires
+ permanent (or very frequent) connection to a server.</li>
+
+ <li id="f5"><em>Tyrant:</em> system that rejects any operating
+ system not “authorized” by the manufacturer.</li>
+ </ol>
+ </td>
+ </tr>
+</table>
<p>Users of proprietary software are defenseless against these forms
of mistreatment. The way to avoid them is by insisting on
<a href="/philosophy/free-software-even-more-important.html">free
-(freedom-respecting) software.</a> Since free software is controlled
+(freedom-respecting) software</a>. Since free software is controlled
by its users, they have a pretty good defense against malicious
software functionality.</p>
+
+<h3 id="latest">Latest additions</h3>
+
+<ul class="blurbs">
+<!-- INSERT latest -->
+ <li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through the company's server. They have
+ all the nasty characteristics of such devices: <a
+
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all users at once), as well as the risk of an outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting the desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on the thermostat.</p>
+ </li>
+
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201809140">
+ <p>Android has a <a
+
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
+ back door for remotely changing “user” settings</a>.</p>
+
+ <p>The article suggests it might be a universal back door, but this
+ isn't clear.</p>
+ </li>
+
+ <li id="M201809120">
+ <p>One version of Windows 10 <a
+
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
+ harangues users if they try to install Firefox (or Chrome)</a>.</p>
+ </li>
+
+ <li id="M201712060">
+ <p>Learn how <a
+
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html">
+ gratis-to-play-and-not-win-much games manipulate their useds
+ psychologically</a>.</p>
+
+ <p>These manipulative behaviors are malicious functionalities, and they
+ are possible because the game is proprietary. If it were free, people
+ could publish a non-manipulative version and play that instead.</p>
+ </li>
+</ul>
+
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -155,7 +248,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/18 07:10:09 $
+$Date: 2018/10/09 12:34:36 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary proprietary.html,
Therese Godefroy <=