www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html proprietary-...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html proprietary-...
Date: Wed, 8 May 2019 10:38:34 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/05/08 10:38:34

Modified files:
        proprietary    : malware-apple.html proprietary-deception.html 
                         proprietary.html proprietary-tethers.html 
                         malware-appliances.html 
        proprietary/workshop: mal.rec targets.rec 
Added files:
        proprietary    : proprietary-manipulation.html 

Log message:
        Jibot shutdown (www-discuss 2018-05-07);
        Add new page: manipulation.html.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/targets.rec?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-apple.html  13 Apr 2019 12:38:32 -0000      1.91
+++ malware-apple.html  8 May 2019 14:38:33 -0000       1.92
@@ -49,7 +49,7 @@
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
   <li><a href="#censorship">Censorship</a></li>
-  <li><a href="#deception">Deception</a></li>
+<!-- <li><a href="#deception">Deception</a></li> -->
   <li><a href="#drm">Digital restrictions
     management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
     to restrict what users can do with the data in their computers.</li>
@@ -58,6 +58,7 @@
 <!-- <li><a href="#interference">Interference</a></li> -->
   <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
+  <li><a href="#manipulation">Manipulation</a></li>
   <li><a href="#pressuring">Pressuring</a></li>
   <li><a href="#sabotage">Sabotage</a></li>
   <li><a href="#surveillance">Surveillance</a></li>
@@ -107,21 +108,6 @@
 through the Apple Store. Please refer to the <a href="#jails">Apple Jails</a>
 section for more information.</p>
 
-<h3 id="deception">Apple Deception</h3>
-
-<ul class="blurbs">
-  <li id="M201308290">
-    <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
-    interfaces designed to mislead users, or make option settings hard
-    to find</a>.</p>
-
-    <p>This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.</p>
-  </li>
-</ul>
-
 
 <h3 id="drm">Apple DRM</h3>
 
@@ -374,6 +360,22 @@
 </ul>
 
 
+<h3 id="manipulation">Apple Manipulation</h3>
+
+<ul class="blurbs">
+  <li id="M201308290">
+    <p>&ldquo;Dark patterns&rdquo; are <a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+    interfaces designed to mislead users, or make option settings hard
+    to find</a>.</p>
+
+    <p>This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.</p>
+  </li>
+</ul>
+
+
 <h3 id="pressuring">Apple Pressuring</h3>
 
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
@@ -743,7 +745,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/13 12:38:32 $
+$Date: 2019/05/08 14:38:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-deception.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-deception.html  20 Apr 2019 15:57:58 -0000      1.39
+++ proprietary-deception.html  8 May 2019 14:38:33 -0000       1.40
@@ -106,17 +106,6 @@
     their credentials</a>, advertising itself on their feed, and posting
     images without their consent.</p>
   </li>
-
-  <li id="M201308290">
-    <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
-    interfaces designed to mislead users, or make option settings hard
-    to find</a>.</p>
-
-    <p>This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.</p>
-  </li>
 </ul>
 
 
@@ -177,7 +166,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/20 15:57:58 $
+$Date: 2019/05/08 14:38:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.html    8 May 2019 12:25:11 -0000       1.131
+++ proprietary.html    8 May 2019 14:38:33 -0000       1.132
@@ -86,6 +86,7 @@
     <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
     <li><a 
href="/proprietary/proprietary-interference.html">Interference</a></li>
     <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f3">3</a>)</li>
+    <li><a 
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
     <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
     <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
     <li><a 
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -146,6 +147,17 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201904260">
+    <p>The Jibo robot toys were tethered to the manufacturer's server,
+    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    the company made them all cease to work</a> by shutting down that
+    server.</p>
+
+    <p>The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.</p>
+  </li>
+
   <li id="M201902011">
     <p>The FordPass Connect feature of some Ford vehicles has <a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
@@ -205,32 +217,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast";>
     a new one is being developed</a>.</p>
   </li>
-
-  <li id="M201904041">
-    <p>Microsoft has been  <a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/";>
-    force-installing a &ldquo;remediation&rdquo;
-    program</a> on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>
-    tampering with users' settings and files</a>, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which <a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>
-    critical</a>.</p>
-
-    <p>This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a <a
-    href="/distros/free-distros.html">free operating system</a> if you
-    can!</p>
-
-    <p>If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.</p>
-  </li>
 </ul>
 
 
@@ -291,7 +277,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 12:25:11 $
+$Date: 2019/05/08 14:38:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tethers.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-tethers.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-tethers.html    17 Apr 2019 08:50:41 -0000      1.38
+++ proprietary-tethers.html    8 May 2019 14:38:33 -0000       1.39
@@ -38,6 +38,17 @@
 <div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
+  <li id="M201904260">
+    <p>The Jibo robot toys were tethered to the manufacturer's server,
+    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    the company made them all cease to work</a> by shutting down that
+    server.</p>
+
+    <p>The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.</p>
+  </li>
+
   <li id="M201904040">
     <p>Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -241,7 +252,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/17 08:50:41 $
+$Date: 2019/05/08 14:38:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-appliances.html     11 Apr 2019 06:46:34 -0000      1.77
+++ malware-appliances.html     8 May 2019 14:38:33 -0000       1.78
@@ -47,6 +47,17 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M201904260">
+    <p>The Jibo robot toys were tethered to the manufacturer's server,
+    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    the company made them all cease to work</a> by shutting down that
+    server.</p>
+
+    <p>The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.</p>
+  </li>
+
   <li id="M201903210">
     <p>The Medtronics Conexus Telemetry Protocol has <a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
@@ -909,7 +920,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/11 06:46:34 $
+$Date: 2019/05/08 14:38:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- workshop/mal.rec    8 May 2019 12:25:11 -0000       1.95
+++ workshop/mal.rec    8 May 2019 14:38:33 -0000       1.96
@@ -26,6 +26,23 @@
 # ADD NEW BLURB HERE
 
 Added: 2019-05-08
+Id: 201904260
+RT: www-discuss 2019-05-07 (proprietary tether and manipulation)
+PubDate: 2019-04-26
+Target: proprietary-manipulation.html proprietary-manipulation
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-appliances.html malware-appliances
+Keywords: robot jibot
+Blurb: <p>The Jibo robot toys were tethered to the manufacturer's server,
++   and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
++   the company made them all cease to work</a> by shutting down that
++   server.</p>
++
++   <p>The shutdown might ironically be good for their users, since the
++   product was designed to manipulate people by presenting a phony
++   semblance of emotions, and was most certainly spying on them.</p>
+
+Added: 2019-05-08
 Id: 201902011
 RT: 1381857
 PubDate: 2019-02-01
@@ -4891,8 +4908,8 @@
 +   them</a>.</p>
 
 Id: 201308290
-Target: proprietary-deception.html proprietary-deception
-Target: malware-apple.html deception
+Target: proprietary-manipulation.html proprietary-manipulation
+Target: malware-apple.html manipulation
 PubDate: 2013-08-29
 Keywords:
 Blurb: <p>&ldquo;Dark patterns&rdquo; are <a

Index: workshop/targets.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/targets.rec,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- workshop/targets.rec        20 Feb 2019 11:44:40 -0000      1.7
+++ workshop/targets.rec        8 May 2019 14:38:34 -0000       1.8
@@ -20,7 +20,7 @@
 Targets: back-doors surveillance drm echo-back-doors echo-surveillance misc
 
 Page: malware-apple.html
-Targets: back-doors deception drm incompatibility insecurity jails pressuring 
sabotage surveillance tyrants
+Targets: back-doors drm incompatibility insecurity jails manipulation 
pressuring sabotage surveillance tyrants
 
 Page: malware-appliances.html
 Targets: malware-appliances
@@ -76,6 +76,9 @@
 Page: proprietary-jails.html
 Targets: apple microsoft
 
+Page: proprietary-manipulation.html
+Targets: proprietary-manipulation
+
 Page: proprietary-sabotage.html
 Targets: proprietary-sabotage
 

Index: proprietary-manipulation.html
===================================================================
RCS file: proprietary-manipulation.html
diff -N proprietary-manipulation.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-manipulation.html       8 May 2019 14:38:33 -0000       1.1
@@ -0,0 +1,121 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: $Revision: 1.1 $ -->
+<title>Proprietary Manipulation
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Manipulation</h2>
+
+<div class="comment">
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>
+This page reports instances where proprietary software takes advantage
+of human psychology to manipulate users.
+</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write to <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="proprietary-manipulation"></div>
+
+<ul class="blurbs">
+  <li id="M201904260">
+    <p>The Jibo robot toys were tethered to the manufacturer's server,
+    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    the company made them all cease to work</a> by shutting down that
+    server.</p>
+
+    <p>The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.</p>
+  </li>
+
+  <li id="M201308290">
+    <p>&ldquo;Dark patterns&rdquo; are <a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+    interfaces designed to mislead users, or make option settings hard
+    to find</a>.</p>
+
+    <p>This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.</p>
+  </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/05/08 14:38:33 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
+



reply via email to

[Prev in Thread] Current Thread [Next in Thread]