www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary proprietary.css ...


From: Therese Godefroy
Subject: www/server/staging/proprietary proprietary.css ...
Date: Fri, 15 Nov 2019 10:24:25 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/11/15 10:24:25

Modified files:
        server/staging/proprietary: proprietary.css 
                                    malware-microsoft.html 
                                    proprietary-addictions.html 
                                    proprietary-censorship.html 
                                    proprietary-surveillance.html 

Log message:
        * Replace navlinks with SSI;
        * change 'a.current' to 'li.active a' to match main navbar;
        * remove background under navlinks (Dora www-discuss 2019-11-13);
        * margin adjustments.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.css?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/malware-microsoft.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-addictions.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.12&r2=1.13

Patches:
Index: proprietary.css
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.css,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary.css     13 Nov 2019 17:52:31 -0000      1.3
+++ proprietary.css     15 Nov 2019 15:24:24 -0000      1.4
@@ -52,7 +52,6 @@
     display: inline-block;
     padding: .1em .3em;
     margin: .2em;
-    background: #f6f1e1;
     border: 1px solid #ddd;
 }
 #TOC a[href], #TOC a[href]:visited,
@@ -73,10 +72,10 @@
         position: absolute; top: 0; left: 0;
         width: 12em;
         height: 100%;
+        overflow: auto;
         padding: 0 0 2.5em;
-        background: #f6f1e1;
+        border-right: .1em solid #ddd;
         margin: 0;
-        overflow: auto;
     }
     #navlinks h3 {
         font-size: 1.1em;
@@ -97,16 +96,19 @@
         padding: 0 .5em 0 1.5em;
         margin: .1em 0;
     }
-    #navlinks a[href].current,
-     #navlinks a[href].current:visited {
+    #navlinks li.active a, #navlinks li.active a:visited {
         color: black;
-        background: white;
+        font-style: italic;
     }
-    #navlinks a.current:hover {
+    #navlinks li.active a:hover {
         text-decoration: none;
     }
     .article {
-        margin-left: 10.5em;
         padding: 0 2%;
+        margin-left: 10.7em;
+    }
+    .translators-notes {
+        padding: 0 2%;
+        margin-left: 11.8em;
     }
 }

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/malware-microsoft.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-microsoft.html      2 Oct 2018 09:49:49 -0000       1.12
+++ malware-microsoft.html      15 Nov 2019 15:24:24 -0000      1.13
@@ -1,72 +1,74 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.86 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<link rel="stylesheet" type="text/css" href="proprietary.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
+<div class="article">
+<p class="edu-breadcrumb">
+<a href="/proprietary/proprietary.html">Proprietary malware</a> &rarr;
+Microsoft</p>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#if expr="$OUTDATED_SINCE" --><!--#else -->
+<!--#if expr="$LANGUAGE_SUFFIX" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="no" -->
+<!--#include virtual="/server/top-addendum.html" -->
+<!--#endif -->
+<!--#endif -->
+<h2 id="main-heading">Microsoft's Software is Malware</h2>
+
+<div id="about-dir">
+<hr class="thin">
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
 
-<h2>Microsoft's Software is Malware</h2>
-
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary
-malware</a></p>
-
-<div class="highlight-para">
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user.  (This does not include accidental errors.)
-This page explains how Microsoft software is malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues.  The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>.  It's
-not directly a question of what the program <em>does</em> when it
-runs.  However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="thin">
+</div>
 
+<div class="important">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
 </div>
 
-<div class="summary" style="margin-top: 2em">
-<h3>Type&nbsp;of malware</h3>
+<div id="TOC">
+<h3>Types of Microsoft malware</h3>
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
-  <li><a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
-    to restrict what users can do with the data in their computers.</li>
+  <li><a href="#drm">DRM</a></li>
   <li><a href="#insecurity">Insecurity</a></li>
   <li><a href="#interference">Interference</a></li>
-  <li><a href="#jails">Jails</a>&mdash;systems
-    that impose censorship on application programs.</li>
+  <li><a href="#jails">Jails</a></li>
   <li><a href="#sabotage">Sabotage</a></li>
   <li><a href="#subscriptions">Subscriptions</a></li>
   <li><a href="#surveillance">Surveillance</a></li>
-  <li><a href="#tyrants">Tyrants</a>&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.</li>
+  <li><a href="#tethers">Tethers</a></li>
+  <li><a href="#tyrants">Tyrants</a></li>
 </ul>
 </div>
 
-<h3 id="back-doors">Microsoft Back Doors</h3>
+<h3 id="back-doors">Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT backdoor -->
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -76,7 +78,7 @@
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
-    href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
     Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
 
     <p>In Windows 10, the universal back door
@@ -93,14 +95,25 @@
 
   <li id="M201308230">
     <p>The German government <a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
-    away from Windows 8 computers with TPM 2.0</a>, due to potential back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>veers
+    away from Windows 8 computers with TPM 2.0</a> (<a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>original
+    article in German</a>), due to potential back
     door capabilities of the TPM 2.0 chip.</p>
   </li>
 
-  <li id="M201112081">
+  <li id="M201307300">
+    <p>Here is a suspicion that
+    we can't prove, but is worth thinking about: <a
+    
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+    Writable microcode for Intel and AMD microprocessors</a> may be a
+    vehicle for the NSA to invade computers, with the help of Microsoft,
+    say respected security experts.</p>
+  </li>
+
+  <li id="M201112080.1">
     <p>Windows 8 also has a back door for <a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
     remotely deleting apps</a>.</p>
 
     <p>You might well decide to let a security service that you trust
@@ -112,11 +125,27 @@
 </ul>
 
 
-<h3 id="drm">Microsoft DRM</h3>
+<h3 id="drm">DRM</h3>
+
+<p>Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
+functionalities designed to restrict what users can do with the data
+in their computers.</p>
 
 <ul class="blurbs">
-<!-- INSERT DRM -->
-  <li id="M200708131">
+  <li id="M201904040">
+    <p>Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
+    &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
+    this store, <a href="https://www.bbc.com/news/technology-47810367";>
+    bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;</a>. (The
+    article additionally highlights the pitfalls of DRM.)</p>
+
+    <p>This is another proof that a DRM-encumbered product doesn't belong
+    to the person who bought it. Microsoft said it will refund customers,
+    but this is no excuse for selling them restricted books.</p>
+  </li>
+
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -127,7 +156,7 @@
 </ul>
 
 
-<h3 id="insecurity">Microsoft Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -135,7 +164,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT insecurity -->
   <li id="M201705120">
     <p>Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to <a
@@ -161,15 +189,13 @@
 </ul>
 
 
-<h3 id="interference">Microsoft Interference</h3>
+<h3 id="interference">Interference</h3>
 
-<p>Various proprietary programs often mess up the user's system. They
-are like sabotage, but they are not grave enough to qualify for the word
-&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This
-section describes examples of Microsoft committing interference.</p>
+<p>This section gives examples of Microsoft software harassing or annoying
+the user, or causing trouble for the user.  These actions are like
+sabotage but the word &ldquo;sabotage&rdquo; is too strong for them.</p>
 
 <ul class="blurbs">
-<!-- INSERT interference -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -196,14 +222,21 @@
     go &ldquo;too far&rdquo;. We disagree.</p>
   </li>
 
+  <li id="M201612140">
+    <p>The Microsoft Telemetry Compatibility service <a
+    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs";>
+    drastically reduces the performances of machines running
+    Windows&nbsp;10</a>, and can't be disabled easily.</p>
+  </li>
+
   <li id="M201608170">
-    <p> After <a href="#windows10-forcing">forcing the download of Windows 
10</a>
+    <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
     on computers that were running Windows 7 and 8, Microsoft <a
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
     repeatedly switched on a flag that urged users to
     &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
     it off, in the hope that some day they would fail to say no.
-    This was done through <a
+    To do this, Microsoft used <a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
     malware techniques</a>.</p>
 
@@ -242,33 +275,7 @@
 </ul>
 
 
-<h3 id="jails">Microsoft Jails</h3>
-
-<ul class="blurbs">
-<!-- INSERT jails -->
-  <li id="M201706130">
-    <p>Windows 10 S was a jail: <a
-    
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
-    only programs from the Windows Store could be
-    installed and executed</a>. It was however possible to <a
-    
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
-    upgrade to Windows 10 Pro</a>. The successor of Windows
-    10 S is a special configuration of Windows 10 called <a
-    
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
-    S mode</a>. The major difference with Windows 10 S is that there is
-    an easy way to switch out of S mode.</p>
-  </li>
-
-  <li id="M201210080">
-    <p><a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
-    Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
-    jail</a>.</p>
-  </li>
-</ul>
-
-
-<h3 id="sabotage">Microsoft Sabotage</h3>
+<h3 id="sabotage">Sabotage</h3>
 
 <p>The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
@@ -276,7 +283,32 @@
 actions that harm the users of specific Microsoft software.</p>
 
 <ul class="blurbs">
-<!-- INSERT sabotage -->
+  <li id="M201904041">
+    <p>Microsoft has been  <a
+    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/";>
+    force-installing a &ldquo;remediation&rdquo;
+    program</a> on computers running certain
+    versions of Windows 10. Remediation, in Microsoft's view, means <a
+    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>
+    tampering with users' settings and files</a>, notably to
+    &ldquo;repair&rdquo; any components of the updating system that users
+    may have intentionally disabled, and thus regain full power over
+    them. Microsoft repeatedly pushed faulty versions of this program to
+    users' machines, causing numerous problems, some of which <a
+    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>
+    critical</a>.</p>
+
+    <p>This exemplifies the arrogant and manipulative attitude
+    that proprietary software developers have learned to adopt
+    toward the people they are supposedly serving. Migrate to a <a
+    href="/distros/free-distros.html">free operating system</a> if you
+    can!</p>
+
+    <p>If your employer makes you run Windows, tell the financial
+    department how this wastes your time dealing with endless connections
+    and premature hardware failures.</p>
+  </li>
+
   <li id="M201704194">
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
@@ -284,7 +316,7 @@
     forcing their owners to switch to Windows 10</a>.</p>
   </li>
 
-  <li id="M201704130">
+  <li id="M201704134">
     <p>Microsoft <a
     
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
     has dropped support for Windows 7 and 8 on recent processors</a>
@@ -305,8 +337,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
-    use up much needed resources</a>, but many of the people who let
-    installation proceed found out that this “upgrade” was in fact a <a
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -346,7 +379,7 @@
     pay exorbitantly</a>.</p>
 
     <p>Microsoft is going to <a
-    
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+    
href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
     cut off support for some Internet Explorer versions</a> in the same
     way.</p>
 
@@ -364,22 +397,37 @@
 </ul>
 
 
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<h3 id="subscriptions">Subscriptions</h3>
 
 <ul class="blurbs">
-<!-- INSERT subscriptions -->
   <li id="M201507150">
     <p>Microsoft Office forces users <a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
     subscribe to Office 365 to be able to create/edit documents</a>.</p>
   </li>
 </ul>
 
 
-<h3 id="surveillance">Microsoft Surveillance</h3>
+<h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT surveillance -->
+  <li id="M201908210">
+    <p>Microsoft recorded users of Xboxes and had <a
+    
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
+    human workers listen to the recordings</a>.</p>
+
+    <p>Morally, we see no difference between having human workers listen and
+    having speech-recognition systems listen.  Both intrude on privacy.</p>
+  </li>
+
+  <li id="M201908151">
+    <p>Skype refuses to say whether it can <a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html";>eavesdrop
+    on calls</a>.</p>
+
+    <p>That almost certainly means it can do so.</p>
+  </li>
+
   <li id="M201710134">
     <p>Windows 10 telemetry program sends information to Microsoft about
     the user's computer and their use of the computer.</p>
@@ -413,8 +461,8 @@
     now distributes them to another company.</p>
   </li>
 
-  <li id="M201608171">
-    <p>In order to increase Windows 10's install base, Microsoft <a
+  <li id="M201608170.1">
+    <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
     blatantly disregards user choice and privacy</a>.</p>
   </li>
@@ -433,12 +481,6 @@
     running</a>.</p>
   </li>
 
-  <li id="M201512280">
-    <p>Microsoft has <a
-    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-    backdoored its disk encryption</a>.</p>
-  </li>
-
   <li id="M201511264">
     <p>A downgrade to Windows 10 deleted surveillance-detection
     applications.  Then another downgrade inserted a general spying
@@ -459,7 +501,7 @@
 
   <li id="M201507300">
     <p>Windows 10 <a
-    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
+    
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
     ships with default settings that show no regard for the privacy of
     its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on
     the users' files, text input, voice input, location info, contacts,
@@ -505,7 +547,7 @@
 
   <li id="M201405140">
     <p><a
-    
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+    
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
     Microsoft SkyDrive allows the NSA to directly examine users'
     data</a>.</p>
   </li>
@@ -522,7 +564,7 @@
     <p>Spyware in older versions of Windows: <a
     href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
     Windows Update snoops on the user</a>. <a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
     Windows 8.1 snoops on local searches</a>. And there's a <a
     href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
     key in Windows</a>, whose functions we don't know.</p>
@@ -530,10 +572,54 @@
 </ul>
 
 
-<h3 id="tyrants">Microsoft Tyrants</h3>
+<h3 id="tethers">Tethers</h3>
+
+<p>Tethers are functionalities that require constant (or very frequent)
+connection to a server.</p>
+
+<ul class="blurbs">
+  <li id="M201708310">
+    <p>The recent versions of Microsoft Office require the user to <a
+    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    connect to Microsoft servers at least every thirty-one
+    days</a>. Otherwise, the software will refuse to edit any documents
+    or create new ones. It will be restricted to viewing and printing.</p>
+  </li>
+</ul>
+
+
+<h3 id="jails">Jails</h3>
+
+<p>Jails are systems that impose censorship on application programs.</p>
+
+<ul class="blurbs">
+  <li id="M201706130">
+    <p>Windows 10 S was a jail: <a
+    
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
+    only programs from the Windows Store could be
+    installed and executed</a>. It was however possible to <a
+    
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
+    upgrade to Windows 10 Pro</a>. The successor of Windows
+    10 S is a special configuration of Windows 10 called <a
+    
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
+    S mode</a>. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.</p>
+  </li>
+
+  <li id="M201210080">
+    <p><a
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
+    Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
+    jail</a>.</p>
+  </li>
+</ul>
+
+<h3 id="tyrants">Tyrants</h3>
+
+<p>Tyrants are systems that reject any operating system not
+&ldquo;authorized&rdquo; by the manufacturer.</p>
 
 <ul class="blurbs">
-<!-- INSERT tyrants -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -549,11 +635,13 @@
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
   </li>
 </ul>
-
+<div class="column-limit"></div>
 
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
 
+</div>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -601,7 +689,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -611,10 +699,10 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/02 09:49:49 $
+$Date: 2019/11/15 15:24:24 $
 <!-- timestamp end -->
 </p>
 </div>
-</div>
+</div><!-- for class="inner", starts in the banner include -->
 </body>
 </html>

Index: proprietary-addictions.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-addictions.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-addictions.html 13 Nov 2019 17:47:29 -0000      1.5
+++ proprietary-addictions.html 15 Nov 2019 15:24:24 -0000      1.6
@@ -13,50 +13,8 @@
 <link rel="stylesheet" type="text/css" href="proprietary.css" 
media="screen,print" />
  <!--#include virtual="/proprietary/po/proprietary-addictions.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<div id="navlinks">
-<h3>Proprietary malware</h3>
-<h4>By type:</h4>
-<ul>
-  <li><a class="current" 
href="/proprietary/proprietary-addictions.html#main-heading">Addictions</a></li>
-  <li><a 
href="/proprietary/proprietary-back-doors.html#main-heading">Back&nbsp;doors</a></li>
-  <li><a 
href="/proprietary/proprietary-censorship.html#main-heading">Censorship</a></li>
-  <li><a 
href="/proprietary/proprietary-coverups.html#main-heading">Coverups</a></li>
-  <li><a 
href="/proprietary/proprietary-deception.html#main-heading">Deception</a></li>
-  <li><a href="/proprietary/proprietary-drm.html#main-heading">DRM</a></li>
-  <li><a href="/proprietary/proprietary-fraud.html#main-heading">Fraud</a></li>
-  <li><a 
href="/proprietary/proprietary-incompatibility.html#main-heading">Incompatibility</a></li>
-  <li><a 
href="/proprietary/proprietary-insecurity.html#main-heading">Insecurity</a></li>
-  <li><a 
href="/proprietary/proprietary-interference.html#main-heading">Interference</a></li>
-  <li><a href="/proprietary/proprietary-jails.html#main-heading">Jails</a></li>
-  <li><a 
href="/proprietary/proprietary-manipulation.html#main-heading">Manipulation</a></li>
-  <li><a 
href="/proprietary/proprietary-obsolescence.html#main-heading">Obsolescence</a></li>
-  <li><a 
href="/proprietary/proprietary-sabotage.html#main-heading">Sabotage</a></li>
-  <li><a 
href="/proprietary/proprietary-subscriptions.html#main-heading">Subscriptions</a></li>
-  <li><a 
href="/proprietary/proprietary-surveillance.html#main-heading">Surveillance</a></li>
-  <li><a 
href="/proprietary/proprietary-tethers.html#main-heading">Tethers</a></li>
-  <li><a 
href="/proprietary/proprietary-tyrants.html#main-heading">Tyrants</a></li>
-  <li><a href="/proprietary/potential-malware.html#main-heading">In the 
pipe</a></li>
-</ul>
-<h4>By product:</h4>
-<ul>
-  <li><a 
href="/proprietary/malware-appliances.html#main-heading">Appliances</a></li>
-  <li><a href="/proprietary/malware-cars.html#main-heading">Cars</a></li>
-  <li><a href="/proprietary/malware-games.html#main-heading">Games</a></li>
-  <li><a href="/proprietary/malware-mobiles.html#main-heading">Mobiles</a></li>
-  <li><a 
href="/proprietary/malware-webpages.html#main-heading">Webpages</a></li>
-</ul>
-<h4>By company:</h4>
-<ul>
-  <li><a href="/proprietary/malware-adobe.html#main-heading">Adobe</a></li>
-  <li><a href="/proprietary/malware-amazon.html#main-heading">Amazon</a></li>
-  <li><a href="/proprietary/malware-apple.html#main-heading">Apple</a></li>
-  <li><a href="/proprietary/malware-google.html#main-heading">Google</a></li>
-  <li><a 
href="/proprietary/malware-microsoft.html#main-heading">Microsoft</a></li>
-</ul>
-</div>
-
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
 <div class="article">
-
 <p class="edu-breadcrumb">
 <a href="/proprietary/proprietary.html">Proprietary malware</a> &rarr;
 Addictions</p>
@@ -103,16 +61,16 @@
 
 <ul class="blurbs">
   <li id="M209900000">
-    <p>Many <strong>games</strong> are designed to
+    <p>Many <span>games</span> are designed to
     keep gamers compulsively playing&mdash;and renewing
     their subscription. To achieve this result, developers use <a
     
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html";>
     techniques that derive from behavioral and brain research</a>:</p>
 
     <dl class="compact"><dt>The Skinner Box</dt>
-      <dd>An environment in which the user is trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.</dd>
+      <dd>An environment in which the user is trained to &ldquo;push
+      the lever&ldquo;, i.e. do a certain action over and over again
+      in order to get a reward.</dd>
 
       <dt>Virtual food pellets</dt>
       <dd>Items that have nothing to do with the game itself, but are
@@ -137,37 +95,38 @@
       (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
     </dl>
 
-    <p style="margin-top: 1em">Games such as World of Warcraft, which are 
considered very addictive,
-    use several of these techniques.</p>
+    <p>Games such as World of Warcraft, which are considered very
+    addictive, use several of these techniques.</p>
 
-    <p style="margin-top: 1em">The developers of gratis mobile games apply the 
<a
-    href="#M209900000">techniques described above</a> to <a
+    <p style="margin-top: 1em">The developers of gratis
+    mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
-    turn their products into slot machines</a>. This is clearly described
-    in an infographic. The revenue generated by these games is directly 
related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.
+    turn their products into slot machines</a>. This is clearly
+    described in an infographic. The revenue generated by these games
+    is directly related to the number of strongly addicted gamers
+    (called &ldquo;whales&rdquo;) and to the amount of money they are
+    willing to spend. Thus developers carefully study the behavior of
+    millions of users to increase the addictiveness of their games.<br />
     <small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
     &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)</small></p>
 
-    <p style="margin-top: 1em">However, the addictiveness of a game is only 
one of the determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.</p>
-
-    <p style="margin-top: 1em"><small><em>Note:</em>&nbsp; We are not gamers. 
If you think we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;<a
+    <p style="margin-top: 1em">However, the addictiveness of a game is
+    only one of the determinants of addiction. Equally important are the
+    psychological make-up and life circumstances of the gamer. Gaming
+    addiction, like other addictions, is a form of mental escape from an
+    unrewarding life. The sad truth is that, in the long run, it leads
+    to an even worse life.</p>
+
+    <p style="margin-top: 1em"><small><em>Note:</em>&nbsp;
+    We are not gamers. If you think we have misunderstood
+    some point, or have suggestions for making this text
+    clearer or more correct, please send them to &lt;<a
     href="mailto:address@hidden";>address@hidden</a>&gt;.</small></p>
-
   </li>
 
-  <li id="M209700000">
-    <p id="M201902220"><strong>On-line gambling</strong> services (and their 
nonfree
+  <li id="M201902220">
+    <p><span>On-line gambling</span> services (and their nonfree
     client programs) are <a
     
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds";>
     designed to be addictive</a>, much like on-line games. They achieve 
@@ -184,19 +143,17 @@
     addictive behaviors without losing the user anything.</p>
   </li>
 
-  <li id="M209600000">
-    <p>Some <strong>social networking</strong> apps are <a
+  <li id="M201803210">
+    <p>Some <span>social network</span> apps are <a
     href="https://www.jeffbullas.com/facebook-creates-addiction/";>
-    designed to get users addicted</a>. These try to merge into your
-    daily routine by exploiting social pressure and your natural desire
-    for socialization, converting habitual gestures into thorough
-    addiction. As already noted for <a
-    href="#M209900000">games</a>, addictiveness is essentially based
-    on random rewards. In the present case, the rewards are messages
-    from friends and followers, &ldquo;likes,&rdquo; news, interesting
-    videos, etc. The software is designed to trigger users' desire
-    for these rewards, and keep this desire alive as long as
-    possible.</p>
+    designed to get users addicted</a>. These try to merge into your daily
+    routine by exploiting social pressure and your natural desire for
+    socialization, converting habitual gestures into thorough addiction. As
+    already noted for games, addictiveness is essentially based on random
+    rewards. In the present case, the rewards are messages from friends
+    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
+    software is designed to trigger users' desire for these rewards,
+    and keep this desire alive as long as possible.</p>
 
     <ul>
       <li>By default, notifications are sent every time a new item comes
@@ -206,32 +163,30 @@
       users don't try to turn them off. They are most effective when the
       app is installed on a mobile device which is always on and never
       leaves the user. As a side effect, they may contribute to the <a
-      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
-      addictiveness of &ldquo;smart&rdquo; phones</a>.</li>
 
-      <li>Users are served selected material that is likely to interest
-      them, based on <a
+      <li>Users are served selected material
+      that is likely to interest them, based on <a
       
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>
       profiling</a>. (This paves the way to <a
       href="/proprietary/proprietary-manipulation.html">manipulation</a>,
       by the way.)</li>
 
-      <li>The app interface is designed to make
-      users stay on the site as long as possible, using <a
+      <li>The app interface is designed to make users
+      stay on the site as long as possible, using <a
       
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
       infinite scrolling</a> for example.</li>
 
-      <li>The company that own the social network tries to cover
-      users' needs as extensively as possible, by <a
+      <li>The company that owns the social network tries
+      to cover users' needs as extensively as possible, by <a
       
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
-      acquiring other companies</a> if needed. Once users have concentrated
-      most of their online activities and a lot of their personal data on
-      a single platform (or a set of platforms that belong to the same
-      group), they find it <a
+      acquiring other companies</a> if needed. Once users
+      have concentrated most of their online activities and
+      a lot of their personal data on a single platform (or
+      a set of platforms that belong to the same group), they find it <a
       
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
       almost impossible to leave</a>. And even if they wanted to, they
       would have a hard time digging out the relevant options, and the
-      app would aggressively nag them into staying.</li>
+      app would aggressively nag them to stay.</li>
     </ul>
 
     <p>A good way to minimize the risk of addiction, short of avoiding
@@ -367,7 +322,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/13 17:47:29 $
+$Date: 2019/11/15 15:24:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-censorship.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-censorship.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-censorship.html 2 Nov 2019 15:38:10 -0000       1.6
+++ proprietary-censorship.html 15 Nov 2019 15:24:24 -0000      1.7
@@ -1,5 +1,6 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.86 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                   Please do not edit <ul class="blurbs">!
@@ -8,26 +9,22 @@
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
-<style type="text/css" media="print,screen"><!--
-.article h2 { font-size: 1.8em; }
-#about-dir { font-size: .91em; color: #444; }
-#about-page { font-style: italic; }
-#about-page p { margin: .5em 0; }
-.important { margin: 2em 0; }
-@media  (min-width: 57em) {
-   h3 { margin-left: -5% }
-   .summary h3 { margin-left: 0; }
-}
---></style>
+<link rel="stylesheet" type="text/css" href="proprietary.css" 
media="screen,print" />
  <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
+<div class="article">
 <p class="edu-breadcrumb">
 <a href="/proprietary/proprietary.html">Proprietary malware</a> &rarr;
 Censorship</p>
-
-<div class="article reduced-width">
-
-<h2>Proprietary Censorship</h2>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#if expr="$OUTDATED_SINCE" --><!--#else -->
+<!--#if expr="$LANGUAGE_SUFFIX" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="no" -->
+<!--#include virtual="/server/top-addendum.html" -->
+<!--#endif -->
+<!--#endif -->
+<h2 id="main-heading">Proprietary Censorship</h2>
 
 <div id="about-dir">
 <hr class="thin" />
@@ -37,13 +34,16 @@
 href="/philosophy/free-software-even-more-important.html">that is the
 basic injustice</a>. The developers and manufacturers often exercise
 that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
 <hr class="thin" />
 </div>
 
 <div id="about-page">
-<p>Here are examples of proprietary systems that impose censorship on
-what their users can access. We have a <a
-href="/proprietary/proprietary-jails.html">separate
+<p>One kind of malicious functionality is censorship of what
+users can access.  Here are examples of programs which do this.
+We have a <a
+href="/proprietary/proprietary-jails.html#about-page">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;).</p>
 
@@ -179,7 +179,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/02 15:38:10 $
+$Date: 2019/11/15 15:24:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: 
/webcvs/www/www/server/staging/proprietary/proprietary-surveillance.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-surveillance.html       13 Nov 2019 11:38:15 -0000      1.12
+++ proprietary-surveillance.html       15 Nov 2019 15:24:24 -0000      1.13
@@ -29,49 +29,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<p style="display: none"><a href="#main-heading">Skip menu</a></p>
-<div id="navlinks">
-<h3>Proprietary malware</h3>
-<h4>By type:</h4>
-<ul>
-  <li><a 
href="/proprietary/proprietary-addictions.html#main-heading">Addictions</a></li>
-  <li><a 
href="/proprietary/proprietary-back-doors.html#main-heading">Back&nbsp;doors</a></li>
-  <li><a 
href="/proprietary/proprietary-censorship.html#main-heading">Censorship</a></li>
-  <li><a 
href="/proprietary/proprietary-coverups.html#main-heading">Coverups</a></li>
-  <li><a 
href="/proprietary/proprietary-deception.html#main-heading">Deception</a></li>
-  <li><a href="/proprietary/proprietary-drm.html#main-heading">DRM</a></li>
-  <li><a href="/proprietary/proprietary-fraud.html#main-heading">Fraud</a></li>
-  <li><a 
href="/proprietary/proprietary-incompatibility.html#main-heading">Incompatibility</a></li>
-  <li><a 
href="/proprietary/proprietary-insecurity.html#main-heading">Insecurity</a></li>
-  <li><a 
href="/proprietary/proprietary-interference.html#main-heading">Interference</a></li>
-  <li><a href="/proprietary/proprietary-jails.html#main-heading">Jails</a></li>
-  <li><a 
href="/proprietary/proprietary-manipulation.html#main-heading">Manipulation</a></li>
-  <li><a 
href="/proprietary/proprietary-obsolescence.html#main-heading">Obsolescence</a></li>
-  <li><a 
href="/proprietary/proprietary-sabotage.html#main-heading">Sabotage</a></li>
-  <li><a 
href="/proprietary/proprietary-subscriptions.html#main-heading">Subscriptions</a></li>
-  <li><a class="current" 
href="/proprietary/proprietary-surveillance.html#main-heading">Surveillance</a></li>
-  <li><a 
href="/proprietary/proprietary-tethers.html#main-heading">Tethers</a></li>
-  <li><a 
href="/proprietary/proprietary-tyrants.html#main-heading">Tyrants</a></li>
-  <li><a href="/proprietary/potential-malware.html#main-heading">In the 
pipe</a></li>
-</ul>
-<h4>By product:</h4>
-<ul>
-  <li><a 
href="/proprietary/malware-appliances.html#main-heading">Appliances</a></li>
-  <li><a href="/proprietary/malware-cars.html#main-heading">Cars</a></li>
-  <li><a href="/proprietary/malware-games.html#main-heading">Games</a></li>
-  <li><a href="/proprietary/malware-mobiles.html#main-heading">Mobiles</a></li>
-  <li><a 
href="/proprietary/malware-webpages.html#main-heading">Webpages</a></li>
-</ul>
-<h4>By company:</h4>
-<ul>
-  <li><a href="/proprietary/malware-adobe.html#main-heading">Adobe</a></li>
-  <li><a href="/proprietary/malware-amazon.html#main-heading">Amazon</a></li>
-  <li><a href="/proprietary/malware-apple.html#main-heading">Apple</a></li>
-  <li><a href="/proprietary/malware-google.html#main-heading">Google</a></li>
-  <li><a 
href="/proprietary/malware-microsoft.html#main-heading">Microsoft</a></li>
-</ul>
-</div>
-
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
 <div class="article">
 <p class="edu-breadcrumb">
 <a href="/proprietary/proprietary.html">Proprietary malware</a> &rarr;
@@ -2576,7 +2534,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/13 11:38:15 $
+$Date: 2019/11/15 15:24:24 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]