www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html malware-appl...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html malware-appl...
Date: Fri, 13 Sep 2019 08:12:56 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/09/13 08:12:56

Modified files:
        proprietary    : malware-apple.html malware-appliances.html 
                         malware-google.html proprietary-insecurity.html 
                         proprietary-obsolescence.html 
                         proprietary-sabotage.html 
                         proprietary-tethers.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Remove duplicates (www-discuss 2019-09-12).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.150&r2=1.151

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-apple.html  10 Sep 2019 23:51:57 -0000      1.103
+++ malware-apple.html  13 Sep 2019 12:12:55 -0000      1.104
@@ -214,11 +214,11 @@
   bugs.</p>
 
 <ul class="blurbs">
-  <li id="M201909100">
+  <li id="M201908310">
     <p>A series of vulnerabilities <a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
     in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos, contacts stored on
+    including private messages, passwords, photos and contacts stored on
     the user's iMonster</a>.</p>
 
     <p>The deep insecurity of iMonsters is even more pertinent given that
@@ -227,20 +227,6 @@
     not even try to offer security against Apple itself.</p>
   </li>
 
-  <li id="M201908300">
-    <p>In spite of iPhone's reputation for being
-    secure, it does have bad security flaws. Crackers
-    exploited 14 bugs of iOS for two and a half years to <a
-    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says";>
-    steal users' most private data</a>, and gain access to their
-    accounts.</p>
-
-    <p>Apple has corrected these bugs, but this shows that <em>any</em>
-    developer of nonfree programs is liable to make mistakes affecting
-    the security of their products, and users can't investigate or fix
-    them.</p>
-  </li>
-
   <li id="M201607220">
     <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
@@ -837,7 +823,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/10 23:51:57 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-appliances.html     27 Jun 2019 07:06:34 -0000      1.79
+++ malware-appliances.html     13 Sep 2019 12:12:55 -0000      1.80
@@ -510,12 +510,18 @@
   </li>
 
   <li id="M201604050">
-    <p>Google/Alphabet <a
-    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-    intentionally broke Revolv home automatic control products that
-    depended on a server</a> to function, by shutting down the server.
-    The lesson is, reject all such products.  Insist on self-contained
-    computers that run free software!</p>
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
+    broke it by shutting down the server</a>.</p>
+
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201603220">
@@ -920,7 +926,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/27 07:06:34 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-google.html 11 Sep 2019 08:01:46 -0000      1.66
+++ malware-google.html 13 Sep 2019 12:12:55 -0000      1.67
@@ -254,28 +254,19 @@
 actions that harm the users of specific Google software.</p>
 
 <ul class="blurbs">
-  <li id="M201605150">
-    <p>Revolv is an device which managed &ldquo;smart home&rdquo;
-    operations: switching the lights, operate motion sensors, regulating
+  <li id="M201604050">
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
     temperature, etc.  Its proprietary software depends on a remote server
     to do these tasks.  On May 15th, 2016, Google/Alphabet <a
     
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
     broke it by shutting down the server</a>.</p>
 
-    <p>If it was free software, users would have the ability to make it
+    <p>If it were free software, users would have the ability to make it
     work again, differently, and then have a freedom-respecting home
     instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
     control your devices and turn them into $300 out-of-warranty
-    bricks.</p>
-  </li>
-
-  <li id="M201604050">
-    <p>Google/Alphabet <a
-    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-    intentionally broke Revolv home automatic control products that
-    depended on a server</a> to function, by shutting down the server.
-    The lesson is, reject all such products.  Insist on self-contained
-    computers that run free software!</p>
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201511244">
@@ -558,7 +549,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/11 08:01:46 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-insecurity.html 10 Sep 2019 23:51:57 -0000      1.109
+++ proprietary-insecurity.html 13 Sep 2019 12:12:55 -0000      1.110
@@ -53,11 +53,11 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M201909100">
+  <li id="M201908310">
     <p>A series of vulnerabilities <a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
     in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos, contacts stored on
+    including private messages, passwords, photos and contacts stored on
     the user's iMonster</a>.</p>
 
     <p>The deep insecurity of iMonsters is even more pertinent given that
@@ -66,20 +66,6 @@
     not even try to offer security against Apple itself.</p>
   </li>
 
-  <li id="M201908300">
-    <p>In spite of iPhone's reputation for being
-    secure, it does have bad security flaws. Crackers
-    exploited 14 bugs of iOS for two and a half years to <a
-    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says";>
-    steal users' most private data</a>, and gain access to their
-    accounts.</p>
-
-    <p>Apple has corrected these bugs, but this shows that <em>any</em>
-    developer of nonfree programs is liable to make mistakes affecting
-    the security of their products, and users can't investigate or fix
-    them.</p>
-  </li>
-
   <li id="M201908020">
     <p>Out of 21 gratis Android antivirus apps
     that were tested by security researchers, eight <a
@@ -728,7 +714,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/10 23:51:57 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-obsolescence.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-obsolescence.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-obsolescence.html       11 Sep 2019 08:01:46 -0000      1.6
+++ proprietary-obsolescence.html       13 Sep 2019 12:12:55 -0000      1.7
@@ -82,19 +82,19 @@
     that's the nature of proprietary software.</p>
   </li>
 
-  <li id="M201605150">
-    <p>Revolv is an device which managed &ldquo;smart home&rdquo;
-    operations: switching the lights, operate motion sensors, regulating
+  <li id="M201604050">
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
     temperature, etc.  Its proprietary software depends on a remote server
     to do these tasks.  On May 15th, 2016, Google/Alphabet <a
     
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
     broke it by shutting down the server</a>.</p>
 
-    <p>If it was free software, users would have the ability to make it
+    <p>If it were free software, users would have the ability to make it
     work again, differently, and then have a freedom-respecting home
     instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
     control your devices and turn them into $300 out-of-warranty
-    bricks.</p>
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201601100">
@@ -178,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/11 08:01:46 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-sabotage.html   7 Sep 2019 13:03:42 -0000       1.92
+++ proprietary-sabotage.html   13 Sep 2019 12:12:55 -0000      1.93
@@ -329,21 +329,6 @@
     to get screwed sooner or later.</p>
   </li>
 
-  <li id="M201605150">
-    <p>Revolv is an device which managed &ldquo;smart home&rdquo;
-    operations: switching the lights, operate motion sensors, regulating
-    temperature, etc.  Its proprietary software depends on a remote server
-    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
-    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
-    broke it by shutting down the server</a>.</p>
-
-    <p>If it was free software, users would have the ability to make it
-    work again, differently, and then have a freedom-respecting home
-    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
-    control your devices and turn them into $300 out-of-warranty
-    bricks.</p>
-  </li>
-
   <li id="M201605040">
     <p>The Apple Music client program <a
     
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
@@ -352,12 +337,18 @@
   </li>
 
   <li id="M201604050">
-    <p>Google/Alphabet <a
-    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-    intentionally broke Revolv home automatic control products that
-    depended on a server</a> to function, by shutting down the server.
-    The lesson is, reject all such products.  Insist on self-contained
-    computers that run free software!</p>
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
+    broke it by shutting down the server</a>.</p>
+
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201602050">
@@ -622,7 +613,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/07 13:03:42 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tethers.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-tethers.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tethers.html    8 May 2019 14:38:33 -0000       1.39
+++ proprietary-tethers.html    13 Sep 2019 12:12:55 -0000      1.40
@@ -179,12 +179,18 @@
   </li>
 
   <li id="M201604050">
-    <p>Google/Alphabet <a
-    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-    intentionally broke Revolv home automatic control products that
-    depended on a server</a> to function, by shutting down the server.
-    The lesson is, reject all such products.  Insist on self-contained
-    computers that run free software!</p>
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
+    broke it by shutting down the server</a>.</p>
+
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201305100">
@@ -252,7 +258,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 14:38:33 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.html    11 Sep 2019 08:01:46 -0000      1.166
+++ proprietary.html    13 Sep 2019 12:12:55 -0000      1.167
@@ -169,19 +169,6 @@
     having speech-recognition systems listen.  Both intrude on privacy.</p>
   </li>
 
-  <li id="M201909100">
-    <p>A series of vulnerabilities <a
-    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
-    in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos, contacts stored on
-    the user's iMonster</a>.</p>
-
-    <p>The deep insecurity of iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent on Apple
-    for even a modicum of security.  It also means that the devices do
-    not even try to offer security against Apple itself.</p>
-  </li>
-
   <li id="M201909060">
     <p>Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -194,18 +181,24 @@
     it.</p>
   </li>
 
-  <li id="M201908300">
-    <p>In spite of iPhone's reputation for being
-    secure, it does have bad security flaws. Crackers
-    exploited 14 bugs of iOS for two and a half years to <a
-    
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says";>
-    steal users' most private data</a>, and gain access to their
-    accounts.</p>
-
-    <p>Apple has corrected these bugs, but this shows that <em>any</em>
-    developer of nonfree programs is liable to make mistakes affecting
-    the security of their products, and users can't investigate or fix
-    them.</p>
+  <li id="M201908310">
+    <p>A series of vulnerabilities <a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
+    the user's iMonster</a>.</p>
+
+    <p>The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.</p>
+  </li>
+
+  <li id="M201908160">
+    <p>A game published on Facebook <a
+    
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
+    at leading children to spend</a> large amounts of their parents'
+    money without explaining it to them.</p>
   </li>
 </ul>
 
@@ -267,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/11 08:01:46 $
+$Date: 2019/09/13 12:12:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- workshop/mal.rec    11 Sep 2019 08:07:12 -0000      1.150
+++ workshop/mal.rec    13 Sep 2019 12:12:56 -0000      1.151
@@ -58,7 +58,7 @@
 +   having speech-recognition systems listen.  Both intrude on privacy.</p>
 
 Added: 2019-09-10
-Id: 201909100
+Id: 201908310
 RT: www-discuss 2019-09-08 (Apple insecurity)
 PubDate: 2019-08-31
 Target: malware-apple.html insecurity
@@ -67,7 +67,7 @@
 Blurb: <p>A series of vulnerabilities <a
 +   
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
 +   in iOS allowed attackers to gain access to sensitive information
-+   including private messages, passwords, photos, contacts stored on
++   including private messages, passwords, photos and contacts stored on
 +   the user's iMonster</a>.</p>
 +
 +   <p>The deep insecurity of iMonsters is even more pertinent given that
@@ -92,25 +92,6 @@
 +   <p>With a free program there would not be a list of who has installed
 +   it.</p>
 
-Added: 2019-09-07
-Id: 201908300
-RT: www-discuss 2019-09-07 (Should we put this in proprietary-insecuriy?)
-PubDate: 2019-08-30
-Target: proprietary-insecurity.html proprietary-insecurity
-Target: malware-apple.html insecurity
-Keywords: iOS
-Blurb: <p>In spite of iPhone's reputation for being
-+   secure, it does have bad security flaws. Crackers
-+   exploited 14 bugs of iOS for two and a half years to <a
-+   
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says";>
-+   steal users' most private data</a>, and gain access to their
-+   accounts.</p>
-+
-+   <p>Apple has corrected these bugs, but this shows that <em>any</em>
-+   developer of nonfree programs is liable to make mistakes affecting
-+   the security of their products, and users can't investigate or fix
-+   them.</p>
-
 Added: 2019-08-31
 Id: 201908160
 RT: www-discuss 2019-08-07
@@ -3646,25 +3627,6 @@
 +   political points they suggest. Some political points are apparently
 +   considered acceptable.</p>
 
-Id: 201605150
-Target: malware-google.html sabotage
-Target: proprietary-sabotage.html proprietary-sabotage
-Target: proprietary-obsolescence.html proprietary-obsolescence
-PubDate: 2016-05-15
-Keywords: revolv
-Blurb: <p>Revolv is an device which managed &ldquo;smart home&rdquo;
-+   operations: switching the lights, operate motion sensors, regulating
-+   temperature, etc.  Its proprietary software depends on a remote server
-+   to do these tasks.  On May 15th, 2016, Google/Alphabet <a
-+   
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
-+   broke it by shutting down the server</a>.</p>
-+   
-+   <p>If it was free software, users would have the ability to make it
-+   work again, differently, and then have a freedom-respecting home
-+   instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
-+   control your devices and turn them into $300 out-of-warranty
-+   bricks.</p>
-
 Id: 201605044
 Target: malware-apple.html incompatibility
 Target: proprietary-incompatibility.html proprietary-incompatibility
@@ -3748,17 +3710,25 @@
 
 Id: 201604050
 Target: malware-google.html sabotage
-Target: proprietary-sabotage.html proprietary-sabotage
 Target: malware-appliances.html malware-appliances
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: proprietary-obsolescence.html proprietary-obsolescence
 Target: proprietary-tethers.html proprietary-tethers
 PubDate: 2016-04-05
 Keywords: revolv
-Blurb: <p>Google/Alphabet <a
-+   
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-+   intentionally broke Revolv home automatic control products that
-+   depended on a server</a> to function, by shutting down the server.
-+   The lesson is, reject all such products.  Insist on self-contained
-+   computers that run free software!</p>
+Blurb: <p>Revolv is a device that managed &ldquo;smart home&rdquo;
++   operations: switching lights, operate motion sensors, regulating
++   temperature, etc.  Its proprietary software depends on a remote server
++   to do these tasks.  On May 15th, 2016, Google/Alphabet <a
++   
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
++   broke it by shutting down the server</a>.</p>
++   
++   <p>If it were free software, users would have the ability to make it
++   work again, differently, and then have a freedom-respecting home
++   instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
++   control your devices and turn them into $300 out-of-warranty
++   bricks. Insist on self-contained computers that run free software!</p>
+
 
 Id: 201603220
 Target: proprietary-surveillance.html SpywareInCameras



reply via email to

[Prev in Thread] Current Thread [Next in Thread]