[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-adobe.html malware-amaz...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-adobe.html malware-amaz... |
Date: |
Sat, 16 Nov 2019 07:55:40 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/11/16 07:55:40
Modified files:
proprietary : malware-adobe.html malware-amazon.html
malware-apple.html malware-appliances.html
malware-games.html malware-mobiles.html
malware-webpages.html proprietary-drm.html
proprietary-insecurity.html
proprietary-interference.html
proprietary-jails.html
proprietary-sabotage.html
proprietary-subscriptions.html
proprietary-surveillance.html
Log message:
Minor fixes.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.306&r2=1.307
Patches:
Index: malware-adobe.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-adobe.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-adobe.html 2 Nov 2019 08:35:11 -0000 1.24
+++ malware-adobe.html 16 Nov 2019 12:55:39 -0000 1.25
@@ -84,10 +84,10 @@
When a program proprietary, and even malware, don't get distracted
by the secondary issues like price.</p>
- <p>Please don't repeat the marketing term “Creative
+ <p><small>(Please don't repeat the marketing term “Creative
Cloud” except to express revulsion for it. The <a
href="/philosophy/words-to-avoid.html#CloudComputing"> term
- “cloud” is designed to cloud users' minds</a>.</p>
+ “cloud” is designed to cloud users' minds</a>.)</small></p>
</li>
<li id="M201305100">
@@ -167,7 +167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-amazon.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-amazon.html 18 Sep 2019 15:41:05 -0000 1.29
+++ malware-amazon.html 16 Nov 2019 12:55:39 -0000 1.30
@@ -182,9 +182,9 @@
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p><small>(These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking security”</a>.</p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
</ul>
@@ -293,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 15:41:05 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.html 31 Oct 2019 11:55:07 -0000 1.118
+++ malware-apple.html 16 Nov 2019 12:55:39 -0000 1.119
@@ -358,7 +358,7 @@
censoring apps for the US government too</a>. Specifically, it is
deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are in Apple. If Apple had not designed
+ <p>The root of these wrongs is in Apple. If Apple had not designed
the iMonsters to let Apple censor applications, Apple would not have
had the power to stop users from installing whatever kind of apps.</p>
</li>
@@ -546,10 +546,10 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
- <p>The article uses the term “lock”
+ <p><small>(The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.)</small></p>
</li>
<li id="M201606080">
@@ -901,7 +901,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/31 11:55:07 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-appliances.html 2 Nov 2019 08:35:11 -0000 1.82
+++ malware-appliances.html 16 Nov 2019 12:55:39 -0000 1.83
@@ -275,9 +275,9 @@
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note that this article misuses the term <a
+ <p><small>(Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
+ referring to crackers.)</small></p>
</li>
<li id="M201708280">
@@ -287,8 +287,8 @@
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p><small>(It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
<li id="M201708230">
@@ -431,9 +431,9 @@
turn the Oculus Rift sensors into spy cameras</a> after breaking into
the computer they are connected to.</p>
- <p>Unfortunately, the article <a
- href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
- as “hackers”</a>.</p>
+ <p><small>(Unfortunately, the article <a
+ href="/philosophy/words-to-avoid.html#Hacker">improperly refers
+ to crackers as “hackers”</a>.)</small></p>
</li>
<li id="M201612230">
@@ -926,7 +926,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-games.html 18 Sep 2019 15:41:05 -0000 1.43
+++ malware-games.html 16 Nov 2019 12:55:39 -0000 1.44
@@ -48,7 +48,7 @@
<ul class="blurbs">
<li id="M209900000">
- <p id="addictiveness">Many games are designed to
+ <p>Many <span>games</span> are designed to
keep gamers compulsively playing—and renewing
their subscription. To achieve this result, developers use <a
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
@@ -85,35 +85,32 @@
<p>Games such as World of Warcraft, which are considered very addictive,
use several of these techniques.</p>
- <p>However, the addictiveness of a game is only one of the determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
+ <p style="margin-top: 1em">The developers of gratis
+ mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
+ turn their products into slot machines</a>. This is clearly
+ described in an infographic. The revenue generated by these games
+ is directly related to the number of strongly addicted gamers
+ (called “whales”) and to the amount of money they are
+ willing to spend. Thus developers carefully study the behavior of
+ millions of users to increase the addictiveness of their games.</p>
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
+ <p><small>(Unfortunately, this article uses “free” to mean
“zero price.” We recommend saying “gratis”
- instead.</p>
+ instead.)</small></p>
+
+ <p style="margin-top: 1em">However, the addictiveness of a game is
+ only one of the determinants of addiction. Equally important are the
+ psychological make-up and life circumstances of the gamer. Gaming
+ addiction, like other addictions, is a form of mental escape from an
+ unrewarding life. The sad truth is that, in the long run, it leads
+ to an even worse life.</p>
+
+ <p style="margin-top: 1em"><small><em>Note:</em>
+ We are not gamers. If you think we have misunderstood
+ some point, or have suggestions for making this text
+ clearer or more correct, please send them to <<a
+ href="mailto:address@hidden">address@hidden</a>>.</small></p>
</li>
<li id="M201908210">
@@ -153,9 +150,9 @@
href="/proprietary/proprietary-addictions.html#addictiveness">
psychological manipulation techniques</a>.</p>
- <p>The article uses “free” to mean “zero
+ <p><small>(The article uses “free” to mean “zero
price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
+ “gratis” instead.)</small></p>
</li>
<li id="M201807310">
@@ -402,7 +399,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 15:41:05 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- malware-mobiles.html 4 Oct 2019 07:31:28 -0000 1.111
+++ malware-mobiles.html 16 Nov 2019 12:55:39 -0000 1.112
@@ -217,9 +217,9 @@
permissions or contained advertising trackers, with seven being more
risky than the average of the 100 most popular Android apps.</p>
- <p>Note that the article refers to these proprietary apps as
+ <p><small>(Note that the article refers to these proprietary apps as
“free”. It should have said “gratis”
- instead.</p>
+ instead.)</small></p>
</li>
<li id="M201807100">
@@ -418,6 +418,13 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M209900001.1">
+ <p>See above for the general universal back door in essentially
+ all mobile phones, which permits converting them into <a
+ class="not-a-duplicate" href="#universal-back-door-phone-modem">
+ full-time listening devices</a>.</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
@@ -584,9 +591,9 @@
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
+ <p><small>(It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em> <a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ href="/philosophy/free-sw.html">free software</a>.)</small></p>
</li>
<li id="M201901050">
@@ -706,9 +713,11 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server.</p>
+
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free software</a>”
- referring to zero price.</p>
+ referring to zero price.)</small></p>
</li>
<li id="M201707270">
@@ -935,7 +944,7 @@
</li>
<li id="M201510300">
- <p>More than 73% and 47% of mobile applications, from Android and iOS
+ <p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
@@ -1152,7 +1161,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 07:31:28 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-webpages.html 4 Feb 2019 07:16:06 -0000 1.27
+++ malware-webpages.html 16 Nov 2019 12:55:39 -0000 1.28
@@ -83,10 +83,12 @@
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
inject a “miner” in web pages</a> served to visitors. This
type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
+ cryptocurrency.</p>
+
+ <p><small>(Note that the article refers to the infected software
as “content management system”. A better term would be
“<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
+ revision system</a>”.)</small></p>
<p>Since the miner was a nonfree JavaScript program,
visitors wouldn't have been affected if they had used <a
@@ -261,7 +263,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:16:06 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-drm.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.html 7 Sep 2019 13:03:42 -0000 1.46
+++ proprietary-drm.html 16 Nov 2019 12:55:39 -0000 1.47
@@ -140,10 +140,10 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
- <p>The article uses the term “lock”
+ <p><small>(The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.)</small></p>
</li>
<li id="M201702020">
@@ -382,7 +382,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 13:03:42 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-insecurity.html 18 Sep 2019 15:41:06 -0000 1.111
+++ proprietary-insecurity.html 16 Nov 2019 12:55:39 -0000 1.112
@@ -74,9 +74,9 @@
permissions or contained advertising trackers, with seven being more
risky than the average of the 100 most popular Android apps.</p>
- <p>Note that the article refers to these proprietary apps as
+ <p><small>(Note that the article refers to these proprietary apps as
“free”. It should have said “gratis”
- instead.</p>
+ instead.)</small></p>
</li>
<li id="M201907080">
@@ -142,9 +142,9 @@
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p><small>(These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking security”</a>.</p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201807100">
@@ -195,9 +195,9 @@
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note that this article misuses the term <a
+ <p><small>(Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
+ referring to crackers.)</small></p>
</li>
<li id="M201708280">
@@ -207,8 +207,8 @@
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p><small>(It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
<li id="M201706200.1">
@@ -310,9 +310,9 @@
turn the Oculus Rift sensors into spy cameras</a> after breaking into
the computer they are connected to.</p>
- <p>Unfortunately, the article <a
- href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
- as “hackers”</a>.</p>
+ <p><small>(Unfortunately, the article <a
+ href="/philosophy/words-to-avoid.html#Hacker">improperly refers
+ to crackers as “hackers”</a>.)</small></p>
</li>
<li id="M201701270">
@@ -714,7 +714,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 15:41:06 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-interference.html 15 Aug 2019 10:16:23 -0000 1.53
+++ proprietary-interference.html 16 Nov 2019 12:55:39 -0000 1.54
@@ -88,10 +88,12 @@
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
inject a “miner” in web pages</a> served to visitors. This
type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
+ cryptocurrency.</p>
+
+ <p><small>(Note that the article refers to the infected software
as “content management system”. A better term would be
“<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
+ revision system</a>”.)</small></p>
<p>Since the miner was a nonfree JavaScript program,
visitors wouldn't have been affected if they had used <a
@@ -269,7 +271,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/15 10:16:23 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-jails.html 21 Oct 2019 06:53:51 -0000 1.46
+++ proprietary-jails.html 16 Nov 2019 12:55:39 -0000 1.47
@@ -133,7 +133,7 @@
censoring apps for the US government too</a>. Specifically, it is
deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are in Apple. If Apple had not designed
+ <p>The root of these wrongs is in Apple. If Apple had not designed
the iMonsters to let Apple censor applications, Apple would not have
had the power to stop users from installing whatever kind of apps.</p>
</li>
@@ -322,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 06:53:51 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-sabotage.html 2 Nov 2019 08:35:11 -0000 1.98
+++ proprietary-sabotage.html 16 Nov 2019 12:55:39 -0000 1.99
@@ -288,10 +288,10 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
- <p>The article uses the term “lock”
+ <p><small>(The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.)</small></p>
</li>
<li id="M201612200">
@@ -632,7 +632,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-subscriptions.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-subscriptions.html 2 Nov 2019 08:35:11 -0000 1.30
+++ proprietary-subscriptions.html 16 Nov 2019 12:55:39 -0000 1.31
@@ -100,10 +100,10 @@
When a program proprietary, and even malware, don't get distracted
by the secondary issues like price.</p>
- <p>Please don't repeat the marketing term “Creative
+ <p><small>(Please don't repeat the marketing term “Creative
Cloud” except to express revulsion for it. The <a
href="/philosophy/words-to-avoid.html#CloudComputing"> term
- “cloud” is designed to cloud users' minds</a>.</p>
+ “cloud” is designed to cloud users' minds</a>.)</small></p>
</li>
</ul>
@@ -165,7 +165,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary-surveillance.html 31 Oct 2019 11:55:07 -0000 1.306
+++ proprietary-surveillance.html 16 Nov 2019 12:55:39 -0000 1.307
@@ -1021,9 +1021,9 @@
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
+ <p><small>(It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em> <a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ href="/philosophy/free-sw.html">free software</a>.)</small></p>
</li>
<li id="M201901050">
@@ -1140,9 +1140,11 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server.</p>
+
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free software</a>”
- referring to zero price.</p>
+ referring to zero price.)</small></p>
</li>
<li id="M201707270">
@@ -1361,7 +1363,7 @@
</li>
<li id="M201510300">
- <p>More than 73% and 47% of mobile applications, from Android and iOS
+ <p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
@@ -1587,8 +1589,8 @@
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p><small>(It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
@@ -2004,9 +2006,9 @@
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p><small>(These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking security”</a>.</p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -2534,7 +2536,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/31 11:55:07 $
+$Date: 2019/11/16 12:55:39 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-adobe.html malware-amaz...,
Therese Godefroy <=