[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary proprietary.css ...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary proprietary.css ... |
Date: |
Fri, 15 Nov 2019 10:24:25 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/11/15 10:24:25
Modified files:
server/staging/proprietary: proprietary.css
malware-microsoft.html
proprietary-addictions.html
proprietary-censorship.html
proprietary-surveillance.html
Log message:
* Replace navlinks with SSI;
* change 'a.current' to 'li.active a' to match main navbar;
* remove background under navlinks (Dora www-discuss 2019-11-13);
* margin adjustments.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.css?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/malware-microsoft.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-addictions.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.12&r2=1.13
Patches:
Index: proprietary.css
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.css,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary.css 13 Nov 2019 17:52:31 -0000 1.3
+++ proprietary.css 15 Nov 2019 15:24:24 -0000 1.4
@@ -52,7 +52,6 @@
display: inline-block;
padding: .1em .3em;
margin: .2em;
- background: #f6f1e1;
border: 1px solid #ddd;
}
#TOC a[href], #TOC a[href]:visited,
@@ -73,10 +72,10 @@
position: absolute; top: 0; left: 0;
width: 12em;
height: 100%;
+ overflow: auto;
padding: 0 0 2.5em;
- background: #f6f1e1;
+ border-right: .1em solid #ddd;
margin: 0;
- overflow: auto;
}
#navlinks h3 {
font-size: 1.1em;
@@ -97,16 +96,19 @@
padding: 0 .5em 0 1.5em;
margin: .1em 0;
}
- #navlinks a[href].current,
- #navlinks a[href].current:visited {
+ #navlinks li.active a, #navlinks li.active a:visited {
color: black;
- background: white;
+ font-style: italic;
}
- #navlinks a.current:hover {
+ #navlinks li.active a:hover {
text-decoration: none;
}
.article {
- margin-left: 10.5em;
padding: 0 2%;
+ margin-left: 10.7em;
+ }
+ .translators-notes {
+ padding: 0 2%;
+ margin-left: 11.8em;
}
}
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/malware-microsoft.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-microsoft.html 2 Oct 2018 09:49:49 -0000 1.12
+++ malware-microsoft.html 15 Nov 2019 15:24:24 -0000 1.13
@@ -1,72 +1,74 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.86 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-->
<title>Microsoft's Software Is Malware
- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<link rel="stylesheet" type="text/css" href="proprietary.css"
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
+<div class="article">
+<p class="edu-breadcrumb">
+<a href="/proprietary/proprietary.html">Proprietary malware</a> →
+Microsoft</p>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#if expr="$OUTDATED_SINCE" --><!--#else -->
+<!--#if expr="$LANGUAGE_SUFFIX" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="no" -->
+<!--#include virtual="/server/top-addendum.html" -->
+<!--#endif -->
+<!--#endif -->
+<h2 id="main-heading">Microsoft's Software is Malware</h2>
+
+<div id="about-dir">
+<hr class="thin">
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
-<h2>Microsoft's Software is Malware</h2>
-
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary
-malware</a></p>
-
-<div class="highlight-para">
-<p>
-<em>Malware</em> means software designed to function in ways that
-mistreat or harm the user. (This does not include accidental errors.)
-This page explains how Microsoft software is malware.
-</p>
-
-<p>
-Malware and nonfree software are two different issues. The difference
-between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
-whether the users have control of the program or vice versa</a>. It's
-not directly a question of what the program <em>does</em> when it
-runs. However, in practice nonfree software is often malware,
-because the developer's awareness that the users would be powerless to fix
-any malicious functionalities tempts the developer to impose some.
-</p>
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="thin">
+</div>
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
</div>
-<div class="summary" style="margin-top: 2em">
-<h3>Type of malware</h3>
+<div id="TOC">
+<h3>Types of Microsoft malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a href="#censorship">Censorship</a></li>-->
- <li><a href="#drm">Digital restrictions
- management</a> or “DRM”—functionalities designed
- to restrict what users can do with the data in their computers.</li>
+ <li><a href="#drm">DRM</a></li>
<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
- <li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
+ <li><a href="#jails">Jails</a></li>
<li><a href="#sabotage">Sabotage</a></li>
<li><a href="#subscriptions">Subscriptions</a></li>
<li><a href="#surveillance">Surveillance</a></li>
- <li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
- manufacturer.</li>
+ <li><a href="#tethers">Tethers</a></li>
+ <li><a href="#tyrants">Tyrants</a></li>
</ul>
</div>
-<h3 id="back-doors">Microsoft Back Doors</h3>
+<h3 id="back-doors">Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT backdoor -->
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -76,7 +78,7 @@
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
- href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+ href="/proprietary/malware-microsoft.html#windows10-forcing">
Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
<p>In Windows 10, the universal back door
@@ -93,14 +95,25 @@
<li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from Windows 8 computers with TPM 2.0</a>, due to potential back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from Windows 8 computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
- <li id="M201112081">
+ <li id="M201307300">
+ <p>Here is a suspicion that
+ we can't prove, but is worth thinking about: <a
+
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+ Writable microcode for Intel and AMD microprocessors</a> may be a
+ vehicle for the NSA to invade computers, with the help of Microsoft,
+ say respected security experts.</p>
+ </li>
+
+ <li id="M201112080.1">
<p>Windows 8 also has a back door for <a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -112,11 +125,27 @@
</ul>
-<h3 id="drm">Microsoft DRM</h3>
+<h3 id="drm">DRM</h3>
+
+<p>Digital restrictions management, or “DRM,” refers to
+functionalities designed to restrict what users can do with the data
+in their computers.</p>
<ul class="blurbs">
-<!-- INSERT DRM -->
- <li id="M200708131">
+ <li id="M201904040">
+ <p>Ebooks “bought” from Microsoft's store check that
+ their DRM is valid by connecting to the store every time their
+ “owner” wants to read them. Microsoft is going to close
+ this store, <a href="https://www.bbc.com/news/technology-47810367">
+ bricking all DRM'ed ebooks it has ever “sold”</a>. (The
+ article additionally highlights the pitfalls of DRM.)</p>
+
+ <p>This is another proof that a DRM-encumbered product doesn't belong
+ to the person who bought it. Microsoft said it will refund customers,
+ but this is no excuse for selling them restricted books.</p>
+ </li>
+
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -127,7 +156,7 @@
</ul>
-<h3 id="insecurity">Microsoft Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -135,7 +164,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT insecurity -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -161,15 +189,13 @@
</ul>
-<h3 id="interference">Microsoft Interference</h3>
+<h3 id="interference">Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
-are like sabotage, but they are not grave enough to qualify for the word
-“sabotage”. Nonetheless, they are nasty and wrong. This
-section describes examples of Microsoft committing interference.</p>
+<p>This section gives examples of Microsoft software harassing or annoying
+the user, or causing trouble for the user. These actions are like
+sabotage but the word “sabotage” is too strong for them.</p>
<ul class="blurbs">
-<!-- INSERT interference -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -196,14 +222,21 @@
go “too far”. We disagree.</p>
</li>
+ <li id="M201612140">
+ <p>The Microsoft Telemetry Compatibility service <a
+
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
+ drastically reduces the performances of machines running
+ Windows 10</a>, and can't be disabled easily.</p>
+ </li>
+
<li id="M201608170">
- <p> After <a href="#windows10-forcing">forcing the download of Windows
10</a>
+ <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
on computers that were running Windows 7 and 8, Microsoft <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users to
“upgrade” to Windows 10</a> when they had turned
it off, in the hope that some day they would fail to say no.
- This was done through <a
+ To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
@@ -242,33 +275,7 @@
</ul>
-<h3 id="jails">Microsoft Jails</h3>
-
-<ul class="blurbs">
-<!-- INSERT jails -->
- <li id="M201706130">
- <p>Windows 10 S was a jail: <a
-
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
- only programs from the Windows Store could be
- installed and executed</a>. It was however possible to <a
-
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
- upgrade to Windows 10 Pro</a>. The successor of Windows
- 10 S is a special configuration of Windows 10 called <a
-
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
- S mode</a>. The major difference with Windows 10 S is that there is
- an easy way to switch out of S mode.</p>
- </li>
-
- <li id="M201210080">
- <p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
- Windows 8 on “mobile devices” (now defunct) was a
- jail</a>.</p>
- </li>
-</ul>
-
-
-<h3 id="sabotage">Microsoft Sabotage</h3>
+<h3 id="sabotage">Sabotage</h3>
<p>The wrongs in this section are not precisely malware, since they do
not involve making the program that runs in a way that hurts the user.
@@ -276,7 +283,32 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
-<!-- INSERT sabotage -->
+ <li id="M201904041">
+ <p>Microsoft has been <a
+
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
+ force-installing a “remediation”
+ program</a> on computers running certain
+ versions of Windows 10. Remediation, in Microsoft's view, means <a
+
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up">
+ tampering with users' settings and files</a>, notably to
+ “repair” any components of the updating system that users
+ may have intentionally disabled, and thus regain full power over
+ them. Microsoft repeatedly pushed faulty versions of this program to
+ users' machines, causing numerous problems, some of which <a
+
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
+ critical</a>.</p>
+
+ <p>This exemplifies the arrogant and manipulative attitude
+ that proprietary software developers have learned to adopt
+ toward the people they are supposedly serving. Migrate to a <a
+ href="/distros/free-distros.html">free operating system</a> if you
+ can!</p>
+
+ <p>If your employer makes you run Windows, tell the financial
+ department how this wastes your time dealing with endless connections
+ and premature hardware failures.</p>
+ </li>
+
<li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
@@ -284,7 +316,7 @@
forcing their owners to switch to Windows 10</a>.</p>
</li>
- <li id="M201704130">
+ <li id="M201704134">
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
has dropped support for Windows 7 and 8 on recent processors</a>
@@ -305,8 +337,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this âupgradeâ was in fact a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -346,7 +379,7 @@
pay exorbitantly</a>.</p>
<p>Microsoft is going to <a
-
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
+
href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -364,22 +397,37 @@
</ul>
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<h3 id="subscriptions">Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT subscriptions -->
<li id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe to Office 365 to be able to create/edit documents</a>.</p>
</li>
</ul>
-<h3 id="surveillance">Microsoft Surveillance</h3>
+<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT surveillance -->
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
+
+ <p>Morally, we see no difference between having human workers listen and
+ having speech-recognition systems listen. Both intrude on privacy.</p>
+ </li>
+
+ <li id="M201908151">
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ on calls</a>.</p>
+
+ <p>That almost certainly means it can do so.</p>
+ </li>
+
<li id="M201710134">
<p>Windows 10 telemetry program sends information to Microsoft about
the user's computer and their use of the computer.</p>
@@ -413,8 +461,8 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
- <p>In order to increase Windows 10's install base, Microsoft <a
+ <li id="M201608170.1">
+ <p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
</li>
@@ -433,12 +481,6 @@
running</a>.</p>
</li>
- <li id="M201512280">
- <p>Microsoft has <a
-
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- backdoored its disk encryption</a>.</p>
- </li>
-
<li id="M201511264">
<p>A downgrade to Windows 10 deleted surveillance-detection
applications. Then another downgrade inserted a general spying
@@ -459,7 +501,7 @@
<li id="M201507300">
<p>Windows 10 <a
-
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
ships with default settings that show no regard for the privacy of
its users</a>, giving Microsoft the “right” to snoop on
the users' files, text input, voice input, location info, contacts,
@@ -505,7 +547,7 @@
<li id="M201405140">
<p><a
-
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p>
</li>
@@ -522,7 +564,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key in Windows</a>, whose functions we don't know.</p>
@@ -530,10 +572,54 @@
</ul>
-<h3 id="tyrants">Microsoft Tyrants</h3>
+<h3 id="tethers">Tethers</h3>
+
+<p>Tethers are functionalities that require constant (or very frequent)
+connection to a server.</p>
+
+<ul class="blurbs">
+ <li id="M201708310">
+ <p>The recent versions of Microsoft Office require the user to <a
+
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
+ connect to Microsoft servers at least every thirty-one
+ days</a>. Otherwise, the software will refuse to edit any documents
+ or create new ones. It will be restricted to viewing and printing.</p>
+ </li>
+</ul>
+
+
+<h3 id="jails">Jails</h3>
+
+<p>Jails are systems that impose censorship on application programs.</p>
+
+<ul class="blurbs">
+ <li id="M201706130">
+ <p>Windows 10 S was a jail: <a
+
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
+ only programs from the Windows Store could be
+ installed and executed</a>. It was however possible to <a
+
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
+ upgrade to Windows 10 Pro</a>. The successor of Windows
+ 10 S is a special configuration of Windows 10 called <a
+
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
+ S mode</a>. The major difference with Windows 10 S is that there is
+ an easy way to switch out of S mode.</p>
+ </li>
+
+ <li id="M201210080">
+ <p><a
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
+ Windows 8 on “mobile devices” (now defunct) was a
+ jail</a>.</p>
+ </li>
+</ul>
+
+<h3 id="tyrants">Tyrants</h3>
+
+<p>Tyrants are systems that reject any operating system not
+“authorized” by the manufacturer.</p>
<ul class="blurbs">
-<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -549,11 +635,13 @@
Mobile devices that come with Windows 8 are tyrants</a>.</p>
</li>
</ul>
-
+<div class="column-limit"></div>
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
+</div>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -601,7 +689,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -611,10 +699,10 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/02 09:49:49 $
+$Date: 2019/11/15 15:24:24 $
<!-- timestamp end -->
</p>
</div>
-</div>
+</div><!-- for class="inner", starts in the banner include -->
</body>
</html>
Index: proprietary-addictions.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-addictions.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-addictions.html 13 Nov 2019 17:47:29 -0000 1.5
+++ proprietary-addictions.html 15 Nov 2019 15:24:24 -0000 1.6
@@ -13,50 +13,8 @@
<link rel="stylesheet" type="text/css" href="proprietary.css"
media="screen,print" />
<!--#include virtual="/proprietary/po/proprietary-addictions.translist" -->
<!--#include virtual="/server/banner.html" -->
-<div id="navlinks">
-<h3>Proprietary malware</h3>
-<h4>By type:</h4>
-<ul>
- <li><a class="current"
href="/proprietary/proprietary-addictions.html#main-heading">Addictions</a></li>
- <li><a
href="/proprietary/proprietary-back-doors.html#main-heading">Back doors</a></li>
- <li><a
href="/proprietary/proprietary-censorship.html#main-heading">Censorship</a></li>
- <li><a
href="/proprietary/proprietary-coverups.html#main-heading">Coverups</a></li>
- <li><a
href="/proprietary/proprietary-deception.html#main-heading">Deception</a></li>
- <li><a href="/proprietary/proprietary-drm.html#main-heading">DRM</a></li>
- <li><a href="/proprietary/proprietary-fraud.html#main-heading">Fraud</a></li>
- <li><a
href="/proprietary/proprietary-incompatibility.html#main-heading">Incompatibility</a></li>
- <li><a
href="/proprietary/proprietary-insecurity.html#main-heading">Insecurity</a></li>
- <li><a
href="/proprietary/proprietary-interference.html#main-heading">Interference</a></li>
- <li><a href="/proprietary/proprietary-jails.html#main-heading">Jails</a></li>
- <li><a
href="/proprietary/proprietary-manipulation.html#main-heading">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html#main-heading">Obsolescence</a></li>
- <li><a
href="/proprietary/proprietary-sabotage.html#main-heading">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html#main-heading">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html#main-heading">Surveillance</a></li>
- <li><a
href="/proprietary/proprietary-tethers.html#main-heading">Tethers</a></li>
- <li><a
href="/proprietary/proprietary-tyrants.html#main-heading">Tyrants</a></li>
- <li><a href="/proprietary/potential-malware.html#main-heading">In the
pipe</a></li>
-</ul>
-<h4>By product:</h4>
-<ul>
- <li><a
href="/proprietary/malware-appliances.html#main-heading">Appliances</a></li>
- <li><a href="/proprietary/malware-cars.html#main-heading">Cars</a></li>
- <li><a href="/proprietary/malware-games.html#main-heading">Games</a></li>
- <li><a href="/proprietary/malware-mobiles.html#main-heading">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html#main-heading">Webpages</a></li>
-</ul>
-<h4>By company:</h4>
-<ul>
- <li><a href="/proprietary/malware-adobe.html#main-heading">Adobe</a></li>
- <li><a href="/proprietary/malware-amazon.html#main-heading">Amazon</a></li>
- <li><a href="/proprietary/malware-apple.html#main-heading">Apple</a></li>
- <li><a href="/proprietary/malware-google.html#main-heading">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html#main-heading">Microsoft</a></li>
-</ul>
-</div>
-
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
<div class="article">
-
<p class="edu-breadcrumb">
<a href="/proprietary/proprietary.html">Proprietary malware</a> →
Addictions</p>
@@ -103,16 +61,16 @@
<ul class="blurbs">
<li id="M209900000">
- <p>Many <strong>games</strong> are designed to
+ <p>Many <span>games</span> are designed to
keep gamers compulsively playing—and renewing
their subscription. To achieve this result, developers use <a
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
techniques that derive from behavioral and brain research</a>:</p>
<dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the user is trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
+ <dd>An environment in which the user is trained to “push
+ the lever“, i.e. do a certain action over and over again
+ in order to get a reward.</dd>
<dt>Virtual food pellets</dt>
<dd>Items that have nothing to do with the game itself, but are
@@ -137,37 +95,38 @@
(e.g., Farmville, Ultima Online, Animal Crossing).</dd>
</dl>
- <p style="margin-top: 1em">Games such as World of Warcraft, which are
considered very addictive,
- use several of these techniques.</p>
+ <p>Games such as World of Warcraft, which are considered very
+ addictive, use several of these techniques.</p>
- <p style="margin-top: 1em">The developers of gratis mobile games apply the
<a
- href="#M209900000">techniques described above</a> to <a
+ <p style="margin-top: 1em">The developers of gratis
+ mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic. The revenue generated by these games is directly
related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.
+ turn their products into slot machines</a>. This is clearly
+ described in an infographic. The revenue generated by these games
+ is directly related to the number of strongly addicted gamers
+ (called “whales”) and to the amount of money they are
+ willing to spend. Thus developers carefully study the behavior of
+ millions of users to increase the addictiveness of their games.<br />
<small>(Unfortunately, this article uses “free” to mean
“zero price.” We recommend saying “gratis”
instead.)</small></p>
- <p style="margin-top: 1em">However, the addictiveness of a game is only
one of the determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p style="margin-top: 1em"><small><em>Note:</em> We are not gamers.
If you think we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
+ <p style="margin-top: 1em">However, the addictiveness of a game is
+ only one of the determinants of addiction. Equally important are the
+ psychological make-up and life circumstances of the gamer. Gaming
+ addiction, like other addictions, is a form of mental escape from an
+ unrewarding life. The sad truth is that, in the long run, it leads
+ to an even worse life.</p>
+
+ <p style="margin-top: 1em"><small><em>Note:</em>
+ We are not gamers. If you think we have misunderstood
+ some point, or have suggestions for making this text
+ clearer or more correct, please send them to <<a
href="mailto:address@hidden">address@hidden</a>>.</small></p>
-
</li>
- <li id="M209700000">
- <p id="M201902220"><strong>On-line gambling</strong> services (and their
nonfree
+ <li id="M201902220">
+ <p><span>On-line gambling</span> services (and their nonfree
client programs) are <a
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds">
designed to be addictive</a>, much like on-line games. They achieve
@@ -184,19 +143,17 @@
addictive behaviors without losing the user anything.</p>
</li>
- <li id="M209600000">
- <p>Some <strong>social networking</strong> apps are <a
+ <li id="M201803210">
+ <p>Some <span>social network</span> apps are <a
href="https://www.jeffbullas.com/facebook-creates-addiction/">
- designed to get users addicted</a>. These try to merge into your
- daily routine by exploiting social pressure and your natural desire
- for socialization, converting habitual gestures into thorough
- addiction. As already noted for <a
- href="#M209900000">games</a>, addictiveness is essentially based
- on random rewards. In the present case, the rewards are messages
- from friends and followers, “likes,” news, interesting
- videos, etc. The software is designed to trigger users' desire
- for these rewards, and keep this desire alive as long as
- possible.</p>
+ designed to get users addicted</a>. These try to merge into your daily
+ routine by exploiting social pressure and your natural desire for
+ socialization, converting habitual gestures into thorough addiction. As
+ already noted for games, addictiveness is essentially based on random
+ rewards. In the present case, the rewards are messages from friends
+ and followers, “likes,” news, interesting videos, etc. The
+ software is designed to trigger users' desire for these rewards,
+ and keep this desire alive as long as possible.</p>
<ul>
<li>By default, notifications are sent every time a new item comes
@@ -206,32 +163,30 @@
users don't try to turn them off. They are most effective when the
app is installed on a mobile device which is always on and never
leaves the user. As a side effect, they may contribute to the <a
-
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction">
- addictiveness of “smart” phones</a>.</li>
- <li>Users are served selected material that is likely to interest
- them, based on <a
+ <li>Users are served selected material
+ that is likely to interest them, based on <a
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611">
profiling</a>. (This paves the way to <a
href="/proprietary/proprietary-manipulation.html">manipulation</a>,
by the way.)</li>
- <li>The app interface is designed to make
- users stay on the site as long as possible, using <a
+ <li>The app interface is designed to make users
+ stay on the site as long as possible, using <a
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1">
infinite scrolling</a> for example.</li>
- <li>The company that own the social network tries to cover
- users' needs as extensively as possible, by <a
+ <li>The company that owns the social network tries
+ to cover users' needs as extensively as possible, by <a
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook">
- acquiring other companies</a> if needed. Once users have concentrated
- most of their online activities and a lot of their personal data on
- a single platform (or a set of platforms that belong to the same
- group), they find it <a
+ acquiring other companies</a> if needed. Once users
+ have concentrated most of their online activities and
+ a lot of their personal data on a single platform (or
+ a set of platforms that belong to the same group), they find it <a
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram">
almost impossible to leave</a>. And even if they wanted to, they
would have a hard time digging out the relevant options, and the
- app would aggressively nag them into staying.</li>
+ app would aggressively nag them to stay.</li>
</ul>
<p>A good way to minimize the risk of addiction, short of avoiding
@@ -367,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/13 17:47:29 $
+$Date: 2019/11/15 15:24:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-censorship.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-censorship.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-censorship.html 2 Nov 2019 15:38:10 -0000 1.6
+++ proprietary-censorship.html 15 Nov 2019 15:24:24 -0000 1.7
@@ -1,5 +1,6 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.86 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Please do not edit <ul class="blurbs">!
@@ -8,26 +9,22 @@
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-->
<title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
-<style type="text/css" media="print,screen"><!--
-.article h2 { font-size: 1.8em; }
-#about-dir { font-size: .91em; color: #444; }
-#about-page { font-style: italic; }
-#about-page p { margin: .5em 0; }
-.important { margin: 2em 0; }
-@media (min-width: 57em) {
- h3 { margin-left: -5% }
- .summary h3 { margin-left: 0; }
-}
---></style>
+<link rel="stylesheet" type="text/css" href="proprietary.css"
media="screen,print" />
<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
+<div class="article">
<p class="edu-breadcrumb">
<a href="/proprietary/proprietary.html">Proprietary malware</a> →
Censorship</p>
-
-<div class="article reduced-width">
-
-<h2>Proprietary Censorship</h2>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#if expr="$OUTDATED_SINCE" --><!--#else -->
+<!--#if expr="$LANGUAGE_SUFFIX" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="no" -->
+<!--#include virtual="/server/top-addendum.html" -->
+<!--#endif -->
+<!--#endif -->
+<h2 id="main-heading">Proprietary Censorship</h2>
<div id="about-dir">
<hr class="thin" />
@@ -37,13 +34,16 @@
href="/philosophy/free-software-even-more-important.html">that is the
basic injustice</a>. The developers and manufacturers often exercise
that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
<hr class="thin" />
</div>
<div id="about-page">
-<p>Here are examples of proprietary systems that impose censorship on
-what their users can access. We have a <a
-href="/proprietary/proprietary-jails.html">separate
+<p>One kind of malicious functionality is censorship of what
+users can access. Here are examples of programs which do this.
+We have a <a
+href="/proprietary/proprietary-jails.html#about-page">separate
list of proprietary systems that censor installation</a> of
application programs (we call them “jails”).</p>
@@ -179,7 +179,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/02 15:38:10 $
+$Date: 2019/11/15 15:24:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file:
/webcvs/www/www/server/staging/proprietary/proprietary-surveillance.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-surveillance.html 13 Nov 2019 11:38:15 -0000 1.12
+++ proprietary-surveillance.html 15 Nov 2019 15:24:24 -0000 1.13
@@ -29,49 +29,7 @@
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
<!--#include virtual="/server/banner.html" -->
-<p style="display: none"><a href="#main-heading">Skip menu</a></p>
-<div id="navlinks">
-<h3>Proprietary malware</h3>
-<h4>By type:</h4>
-<ul>
- <li><a
href="/proprietary/proprietary-addictions.html#main-heading">Addictions</a></li>
- <li><a
href="/proprietary/proprietary-back-doors.html#main-heading">Back doors</a></li>
- <li><a
href="/proprietary/proprietary-censorship.html#main-heading">Censorship</a></li>
- <li><a
href="/proprietary/proprietary-coverups.html#main-heading">Coverups</a></li>
- <li><a
href="/proprietary/proprietary-deception.html#main-heading">Deception</a></li>
- <li><a href="/proprietary/proprietary-drm.html#main-heading">DRM</a></li>
- <li><a href="/proprietary/proprietary-fraud.html#main-heading">Fraud</a></li>
- <li><a
href="/proprietary/proprietary-incompatibility.html#main-heading">Incompatibility</a></li>
- <li><a
href="/proprietary/proprietary-insecurity.html#main-heading">Insecurity</a></li>
- <li><a
href="/proprietary/proprietary-interference.html#main-heading">Interference</a></li>
- <li><a href="/proprietary/proprietary-jails.html#main-heading">Jails</a></li>
- <li><a
href="/proprietary/proprietary-manipulation.html#main-heading">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html#main-heading">Obsolescence</a></li>
- <li><a
href="/proprietary/proprietary-sabotage.html#main-heading">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html#main-heading">Subscriptions</a></li>
- <li><a class="current"
href="/proprietary/proprietary-surveillance.html#main-heading">Surveillance</a></li>
- <li><a
href="/proprietary/proprietary-tethers.html#main-heading">Tethers</a></li>
- <li><a
href="/proprietary/proprietary-tyrants.html#main-heading">Tyrants</a></li>
- <li><a href="/proprietary/potential-malware.html#main-heading">In the
pipe</a></li>
-</ul>
-<h4>By product:</h4>
-<ul>
- <li><a
href="/proprietary/malware-appliances.html#main-heading">Appliances</a></li>
- <li><a href="/proprietary/malware-cars.html#main-heading">Cars</a></li>
- <li><a href="/proprietary/malware-games.html#main-heading">Games</a></li>
- <li><a href="/proprietary/malware-mobiles.html#main-heading">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html#main-heading">Webpages</a></li>
-</ul>
-<h4>By company:</h4>
-<ul>
- <li><a href="/proprietary/malware-adobe.html#main-heading">Adobe</a></li>
- <li><a href="/proprietary/malware-amazon.html#main-heading">Amazon</a></li>
- <li><a href="/proprietary/malware-apple.html#main-heading">Apple</a></li>
- <li><a href="/proprietary/malware-google.html#main-heading">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html#main-heading">Microsoft</a></li>
-</ul>
-</div>
-
+<!--#include virtual="/server/staging/proprietary/proprietary-menu.html" -->
<div class="article">
<p class="edu-breadcrumb">
<a href="/proprietary/proprietary.html">Proprietary malware</a> →
@@ -2576,7 +2534,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/13 11:38:15 $
+$Date: 2019/11/15 15:24:24 $
<!-- timestamp end -->
</p>
</div>
- www/server/staging/proprietary proprietary.css ...,
Therese Godefroy <=