www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary proprietary-obso...


From: Therese Godefroy
Subject: www/server/staging/proprietary proprietary-obso...
Date: Sat, 2 Nov 2019 04:40:29 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/11/02 04:40:29

Modified files:
        server/staging/proprietary: proprietary-obsolescence.html 
                                    proprietary-censorship.html 
                                    proprietary-back-doors.html 

Log message:
        Reformat (www-discuss 2019-11-02).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-obsolescence.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.5&r2=1.6

Patches:
Index: proprietary-obsolescence.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-obsolescence.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-obsolescence.html       31 Aug 2019 15:51:32 -0000      1.5
+++ proprietary-obsolescence.html       2 Nov 2019 08:40:29 -0000       1.6
@@ -8,20 +8,33 @@
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Proprietary Obsolescence - GNU Project - Free Software 
Foundation</title>
-<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+<style type="text/css" media="print,screen"><!--
+p.back { text-align: left; margin: 2em 0; }
+p.back:before { content: "\2190\20"; }
+#about-dir { font-size: .91em; color: #444; }
+#about-page { font-style: italic; }
+#about-page p { margin: .5em 0; }
+.important { margin: 2em 0; }
+--></style>
+ <!--#include virtual="/proprietary/po/proprietary-obsolescence.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Obsolescence</h2>
 
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p class="back"><a href="/proprietary/proprietary.html">Other examples
+of proprietary malware</a></p>
 
-<div class="comment">
-  <p>Nonfree (proprietary) software is very often malware (designed to
-    mistreat the user). Nonfree software is controlled by its
-    developers, which puts them in a position of power over the
-    users; <a href="/philosophy/free-software-even-more-important.html">that
-    is the basic injustice</a>. The developers often exercise that
-    power to the detriment of the users they ought to serve.</p>
+<div class="article reduced-width">
   
+<div id="about-dir">
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+</div>
+
+<div id="about-page">
   <p>As in any human activity, informatics has an environmental
     impact. When the software is proprietary, it is even more harmful
     to the planet because it encourages the user to change devices
@@ -34,19 +47,30 @@
     irreparable. Users cannot avoid this constraint and are forced to
     &ldquo;upgrade&rdquo; the material because they have no control
     over the software.</p>
+</div>
   
-  <div class="important">
-    <p>If you know of an example that ought to be in this page but
-      isn't here, please write
-      to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
-      to inform us. Please include the URL of a trustworthy reference
-      or two to serve as specific substantiation.</p>
-  </div>
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
 </div>
 
 <div class="column-limit" id="proprietary-obsolescence"></div>
 
 <ul class="blurbs">
+  <li id="M201908220">
+    <p>ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and <a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    ceases to operate at a predefined date</a>. From then on, there
+    appears to be no support whatsoever for the computer.</p>
+
+    <p>In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.</p>
+  </li>
+
   <li id="M201903250">
     <p>The British supermarket Tesco sold tablets which were tethered
     to Tesco's server for reinstalling default settings.  Tesco <a
@@ -71,20 +95,19 @@
     that's the nature of proprietary software.</p>
   </li>
 
-  <li id="M201605150.1">
-    <p>Revolv is an IoT device which managed &ldquo;smart
-    home&rdquo; operations: switching the lights, operate motion sensors,
-    regulating temperature, etc. On May 15th, 2016, Google/Alphabet <a
+  <li id="M201604050">
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
     
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
-    broke it</a> by shutting down the server.</p>
+    broke it by shutting down the server</a>.</p>
 
-    <p>Although you may own the device, its functioning depended on the
-    server that never belonged to you. So you never really had control of
-    it. This unjust design is called <a
-    href="/philosophy/network-services-arent-free-or-nonfree.html">Service
-    as a Software Substitute (SaaSS)</a>. That is what gave the company
-    the power to convert it into a $300 out-of-warranty brick, for your
-    &ldquo;dumb home&rdquo;.</p>
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
   </li>
 
   <li id="M201601100">
@@ -111,6 +134,8 @@
   </li>
 </ul>
 
+</div>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -161,14 +186,14 @@
 <p>Copyright &copy; 2019 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
-Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/08/31 15:51:32 $
+$Date: 2019/11/02 08:40:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-censorship.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-censorship.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-censorship.html 2 Oct 2018 20:35:58 -0000       1.3
+++ proprietary-censorship.html 2 Nov 2019 08:40:29 -0000       1.4
@@ -1,46 +1,71 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.86 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+p.back { text-align: left; margin: 2em 0; }
+p.back:before { content: "\2190\20"; }
+#about-dir { font-size: .91em; color: #444; }
+#about-page { font-style: italic; }
+#about-page p { margin: .5em 0; }
+.important { margin: 2em 0; }
+@media  (min-width: 57em) {
+   h3 { margin-left: -5% }
+   .summary h3 { margin-left: 0; }
+}
+--></style>
  <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Censorship</h2>
 
+<p class="back"><a href="/proprietary/proprietary.html">Other examples
+of proprietary malware</a></p>
+
+<div class="article reduced-width">
+
+<div id="about-dir">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
 href="/philosophy/free-software-even-more-important.html">that is the
-basic injustice</a>. The developers often exercise that power to the
-detriment of the users they ought to serve.</p>
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+</div>
 
+<div id="about-page">
 <p>Here are examples of proprietary systems that impose censorship on
 what their users can access. We have a <a
 href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
-application programs (we call them &ldquo;jails&rdquo;.)</p>
+application programs (we call them &ldquo;jails&rdquo;).</p>
 
 <p>Selling products designed as platforms for a
 company to impose censorship ought to be forbidden by law, but it
 isn't.</p>
+</div>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
+</div>
 
-<h3>Apple</h3>
+<h3 id="apple">Apple</h3>
 
 <p>Apple mainly uses iOS, which is a typical jail, to impose censorship
 through the Apple Store. Please refer to <a
 href="/proprietary/proprietary-jails.html#apple">Proprietary Jails</a>
 for more information.</p>
 
-<h3>Google</h3>
+<h3 id="google">Google</h3>
 
 <ul class="blurbs">
   <li id="M201703160">
@@ -57,7 +82,7 @@
     Store.</p>
 
     <p>For example, an extension was <a
-    
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
+    
href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
     banned from the Chrome Web Store, and permanently disabled</a> on
     more than 40,000 computers.</p>
   </li>
@@ -81,7 +106,7 @@
 </ul>
 
 
-<h3>Game consoles</h3>
+<h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
   <li id="M201408290">
@@ -93,6 +118,7 @@
   </li>
 </ul>
 
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -141,7 +167,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -151,10 +177,10 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/02 20:35:58 $
+$Date: 2019/11/02 08:40:29 $
 <!-- timestamp end -->
 </p>
 </div>
-</div>
+</div><!-- for class="inner", starts in the banner include -->
 </body>
 </html>

Index: proprietary-back-doors.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-back-doors.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-back-doors.html 2 Oct 2018 20:35:58 -0000       1.5
+++ proprietary-back-doors.html 2 Nov 2019 08:40:29 -0000       1.6
@@ -1,49 +1,79 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.85 -->
+<!-- Parent-Version: 1.87 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+p.back { text-align: left; margin: 2em 0; }
+p.back:before { content: "\2190\20"; }
+#about-dir { font-size: .91em; color: #444; }
+#about-page { font-style: italic; }
+#about-page p { margin: .5em 0; }
+.important { margin: 2em 0 2em; }
+.full-width { width: 100%; }
+#TOC h3 { font-size: 1.2em; }
+@media  (min-width: 57em) {
+   h3 { margin-left: -5% }
+   #TOC h3 { margin-left: 0; }
+}
+--></style>
  <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p class="back"><a href="/proprietary/proprietary.html">Other examples
+of proprietary malware</a></p>
 
+<div class="article reduced-width">
+
+<div id="about-dir">
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; <a
 href="/philosophy/free-software-even-more-important.html">that is the
-basic injustice</a>. The developers often exercise that power to the
-detriment of the users they ought to serve.</p>
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+</div>
 
+<div id="about-page">
 <p>Here are examples of demonstrated back doors in proprietary software.
 They are sorted out according to what they are known to allow. Back doors
 that allow full control over the operating system are said to be
 &ldquo;universal&rdquo;.</p>
+</div>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
+</div>
+</div>
 
-<p class="c">
-   <a href="#spy">Spying</a> |
-   <a href="#alter-data">Altering&nbsp;user's&nbsp;data/settings</a> |
-   <a href="#install-delete">Installing/deleting&nbsp;programs</a> |
-   <a href="#universal">Full&nbsp;control</a> |
-   <a href="#other">Other/undefined</a>
-</p>
+<div id="TOC" class="summary">
+<h3>Back-door potentialities</h3>
+<ul>
+  <li><a href="#spy">Spying</a></li>
+  <li><a href="#alter-data">Altering&nbsp;user's&nbsp;data/settings</a></li>
+  <li><a 
href="#install-delete">Installing/deleting/disabling&nbsp;programs</a></li>
+  <li><a href="#universal">Full&nbsp;control</a></li>
+  <li><a href="#other">Other/undefined</a></li>
+</ul>
+</div>
 
+<div class="full-width">
+<div class="article reduced-width">
 
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-<!-- INSERT spy -->
-  <li id="M201706202">
+  <li id="M201706200.2">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and <a
@@ -80,7 +110,7 @@
     remotely extract some data from iPhones for the state</a>.</p>
 
     <p>This may have improved with <a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
@@ -91,7 +121,18 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
-<!-- INSERT alter-data -->
+  <li id="M201905060">
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -117,7 +158,7 @@
 
   <li id="M201512074">
     <p><a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
     Some D-Link routers</a> have a back door for changing settings in a
     dlink of an eye.</p>
 
@@ -160,7 +201,7 @@
     can use the same tactics.</p>
   </li>
 
-  <li id="M201403121">
+  <li id="M201403120.1">
     <p id="samsung"><a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
     Samsung Galaxy devices running proprietary Android versions come with
@@ -196,10 +237,71 @@
 </ul>
 
 
-<h3 id='install-delete'>Installing or deleting programs</h3>
+<h3 id='install-delete'>Installing, deleting or disabling programs</h3>
 
 <ul class="blurbs">
-<!-- INSERT install-delete -->
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
+  <li id="M201907100">
+    <p>Apple appears to say that <a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>
+    there is a back door in MacOS</a> for automatically updating some
+    (all?) apps.</p>
+
+    <p>The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.</p>
+  </li>
+
+  <li id="M201811100">
+    <p>Corel Paintshop Pro has a <a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
+    back door that can make it cease to function</a>.</p>
+
+    <p>The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.</p>
+
+    <ul>
+    <li>Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.</li>
+
+    <li>A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.</li>
+
+    <li>&ldquo;<a
+    href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>&rdquo; means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.</li>
+
+    <li><p>The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a <a
+    href="/philosophy/not-ipr.html">bogus generalization about things
+    that have nothing in common</a>.</p>
+
+    <p>In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.</p></li>
+    </ul>
+  </li>
+
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -224,7 +326,7 @@
   <li id="M201112080">
     <p> In addition to its <a href="#windows-update">universal back
     door</a>, Windows 8 has a back door for <a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
     remotely deleting apps</a>.</p>
 
     <p>You might well decide to let a security service that you trust
@@ -236,7 +338,7 @@
 
   <li id="M201103070">
     <p>In Android, <a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
     Google has a back door to remotely delete apps</a>. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)</p>
@@ -269,7 +371,58 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
-<!-- INSERT universal -->
+  <li id="M201910130.1">
+    <p>The Chinese Communist Party's <a
+    href="/proprietary/proprietary-surveillance.html#M201910130">
+    &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    a back-door allowing developers to run any code they wish</a> in the
+    users' phone, as &ldquo;superusers.&rdquo;</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
+  </li>
+
+  <li id="M201908220">
+    <p>ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and <a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    ceases to operate at a predefined date</a>. From then on, there
+    appears to be no support whatsoever for the computer.</p>
+
+    <p>In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.</p>
+  </li>
+
+  <li id="M201902011">
+    <p>The FordPass Connect feature of some Ford vehicles has <a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    near-complete access to the internal car network</a>. It is constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.</p>
+
+    <p>If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?</p>
+  </li>
+
+  <li id="M201812300">
+    <p>New GM cars <a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html";>
+    offer the feature of a universal back door</a>.</p>
+
+    <p>Every nonfree program offers the user zero security against its
+    developer. With this malfeature, GM has explicitly made things even
+    worse.</p>
+  </li>
+
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -285,7 +438,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Tesla used software to limit the part of the battery
     that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -299,7 +452,7 @@
     perhaps to drive its passenger to a torture prison.</p>
   </li>
 
-  <li id="M201702061">
+  <li id="M201702060.1">
     <p>Vizio &ldquo;smart&rdquo; TVs <a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
     have a universal back door</a>.</p>
@@ -307,7 +460,7 @@
 
   <li id="M201609130">
     <p>Xiaomi phones come with <a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>
+    
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
     a universal back door in the application processor, for Xiaomi's
     use</a>.</p>
 
@@ -316,7 +469,7 @@
     company can use</a>.</p>
   </li>
 
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -326,7 +479,7 @@
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
-    href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
     Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
 
     <p>In Windows 10, the universal back door
@@ -349,7 +502,7 @@
     <p><a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
     A Chinese version of Android has a universal back door</a>. Nearly
-    all models of mobile phones have a <a href="#universal-back-door">
+    all models of mobile phones have a <a 
href="#universal-back-door-phone-modem">
     universal back door in the modem chip</a>. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.</p>
   </li>
@@ -368,7 +521,7 @@
     section 4 of the EULA</a>.</p>
   </li>
 
-  <li id="M200700001">
+  <li id="M200700000.1">
     <p>In addition to its <a href="#swindle-eraser">book
     eraser</a>, the Kindle-Swindle has a <a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
@@ -376,11 +529,11 @@
   </li>
 
   <li id="M200612050">
-    <p>Almost every phone's communication
+    <p id="universal-back-door-phone-modem">Almost every phone's communication
     processor has a universal back door which is <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
     often used to make a phone transmit all conversations it hears</a>. See
-    <a href="/proprietary/malware-mobiles.html#universal-back-door">Malware
+    <a 
href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware
     in Mobile Devices</a> for more info.</p>
   </li>
 </ul>
@@ -389,7 +542,6 @@
 <h3 id='other'>Other or undefined</h3>
 
 <ul class="blurbs">
-<!-- INSERT other -->
   <li id="M201711204">
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -444,8 +596,10 @@
 
   <li id="M201308230">
     <p>The German government <a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
-    away from Windows 8 computers with TPM 2.0</a>, due to potential back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>veers
+    away from Windows 8 computers with TPM 2.0</a> (<a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>original
+    article in German</a>), due to potential back
     door capabilities of the TPM 2.0 chip.</p>
   </li>
 
@@ -470,11 +624,15 @@
   </li>
 </ul>
 
+<div class="column-limit"></div>
 
 <p>The EFF has other examples of the <a
 href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones";>
 use of back doors</a>.</p>
 
+</div>
+</div>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -505,7 +663,7 @@
 of this article.</p>
 </div>
 
-<p>Copyright &copy; 2014-2018 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2019 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -515,10 +673,10 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/02 20:35:58 $
+$Date: 2019/11/02 08:40:29 $
 <!-- timestamp end -->
 </p>
 </div>
-</div>
+</div><!-- for class="inner", starts in the banner include -->
 </body>
 </html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]