www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-adobe.html malware-amaz...


From: Therese Godefroy
Subject: www/proprietary malware-adobe.html malware-amaz...
Date: Sat, 16 Nov 2019 07:55:40 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/11/16 07:55:40

Modified files:
        proprietary    : malware-adobe.html malware-amazon.html 
                         malware-apple.html malware-appliances.html 
                         malware-games.html malware-mobiles.html 
                         malware-webpages.html proprietary-drm.html 
                         proprietary-insecurity.html 
                         proprietary-interference.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-subscriptions.html 
                         proprietary-surveillance.html 

Log message:
        Minor fixes.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.306&r2=1.307

Patches:
Index: malware-adobe.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-adobe.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-adobe.html  2 Nov 2019 08:35:11 -0000       1.24
+++ malware-adobe.html  16 Nov 2019 12:55:39 -0000      1.25
@@ -84,10 +84,10 @@
     When a program proprietary, and even malware, don't get distracted
     by the secondary issues like price.</p>
 
-    <p>Please don't repeat the marketing term &ldquo;Creative
+    <p><small>(Please don't repeat the marketing term &ldquo;Creative
     Cloud&rdquo; except to express revulsion for it.  The <a
     href="/philosophy/words-to-avoid.html#CloudComputing"> term
-    &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.</p>
+    &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.)</small></p>
   </li>
 
   <li id="M201305100">
@@ -167,7 +167,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-amazon.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-amazon.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-amazon.html 18 Sep 2019 15:41:05 -0000      1.29
+++ malware-amazon.html 16 Nov 2019 12:55:39 -0000      1.30
@@ -182,9 +182,9 @@
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?</p>
 
-    <p>These crackers are probably hackers too, but please <a
+    <p><small>(These crackers are probably hackers too, but please <a
     href="https://stallman.org/articles/on-hacking.html";> don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
   </li>
 </ul>
 
@@ -293,7 +293,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/18 15:41:05 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.html  31 Oct 2019 11:55:07 -0000      1.118
+++ malware-apple.html  16 Nov 2019 12:55:39 -0000      1.119
@@ -358,7 +358,7 @@
     censoring apps for the US government too</a>. Specifically, it is
     deleting apps developed by Iranians.</p>
 
-    <p>The root of these wrongs are in Apple. If Apple had not designed
+    <p>The root of these wrongs is in Apple. If Apple had not designed
     the iMonsters to let Apple censor applications, Apple would not have
     had the power to stop users from installing whatever kind of apps.</p>
   </li>
@@ -546,10 +546,10 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
-    <p>The article uses the term &ldquo;lock&rdquo;
+    <p><small>(The article uses the term &ldquo;lock&rdquo;
     to describe the DRM, but we prefer to use the term <a
     href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
-    handcuffs</a>.</p>
+    handcuffs</a>.)</small></p>
   </li>
 
   <li id="M201606080">
@@ -901,7 +901,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/31 11:55:07 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-appliances.html     2 Nov 2019 08:35:11 -0000       1.82
+++ malware-appliances.html     16 Nov 2019 12:55:39 -0000      1.83
@@ -275,9 +275,9 @@
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
     its security has been cracked</a>.</p>
 
-    <p>Note that this article misuses the term <a
+    <p><small>(Note that this article misuses the term <a
     href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
-    referring to crackers.</p>
+    referring to crackers.)</small></p>
   </li>
 
   <li id="M201708280">
@@ -287,8 +287,8 @@
 
     <p>Don't be a sucker&mdash;reject all the stings.</p>
 
-    <p>It is unfortunate that the article uses the term <a
-    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
+    <p><small>(It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201708230">
@@ -431,9 +431,9 @@
     turn the Oculus Rift sensors into spy cameras</a> after breaking into
     the computer they are connected to.</p>
 
-    <p>Unfortunately, the article <a
-    href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
-    as &ldquo;hackers&rdquo;</a>.</p>
+    <p><small>(Unfortunately, the article <a
+    href="/philosophy/words-to-avoid.html#Hacker">improperly refers
+    to crackers as &ldquo;hackers&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201612230">
@@ -926,7 +926,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-games.html  18 Sep 2019 15:41:05 -0000      1.43
+++ malware-games.html  16 Nov 2019 12:55:39 -0000      1.44
@@ -48,7 +48,7 @@
 
 <ul class="blurbs">
   <li id="M209900000">
-    <p id="addictiveness">Many games are designed to
+    <p>Many <span>games</span> are designed to
     keep gamers compulsively playing&mdash;and renewing
     their subscription. To achieve this result, developers use <a
     
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html";>
@@ -85,35 +85,32 @@
     <p>Games such as World of Warcraft, which are considered very addictive,
     use several of these techniques.</p>
 
-    <p>However, the addictiveness of a game is only one of the determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.</p>
-
-    <p><em>Note:</em>&nbsp; We are not gamers. If you think we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;<a
-    href="mailto:address@hidden";>address@hidden</a>&gt;.</p>
-  </li>
-
-  <li id="M209800000">
-    <p>The developers of gratis mobile games apply <a
-    href="/proprietary/proprietary-addictions.html#addictiveness">
-    behavioral manipulation techniques</a> to <a
+    <p style="margin-top: 1em">The developers of gratis
+    mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
-    turn their products into slot machines</a>. This is clearly described
-    in an infographic.</p>
+    turn their products into slot machines</a>. This is clearly
+    described in an infographic. The revenue generated by these games
+    is directly related to the number of strongly addicted gamers
+    (called &ldquo;whales&rdquo;) and to the amount of money they are
+    willing to spend. Thus developers carefully study the behavior of
+    millions of users to increase the addictiveness of their games.</p>
 
-    <p>The revenue generated by these games is directly related to the
-    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-    to the amount of money they are willing to spend. Thus developers
-    carefully study the behavior of millions of users to increase the
-    addictiveness of their games.</p>
-
-    <p>Unfortunately, the article uses &ldquo;free&rdquo; to mean
+    <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
     &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-    instead.</p>
+    instead.)</small></p>
+
+    <p style="margin-top: 1em">However, the addictiveness of a game is
+    only one of the determinants of addiction. Equally important are the
+    psychological make-up and life circumstances of the gamer. Gaming
+    addiction, like other addictions, is a form of mental escape from an
+    unrewarding life. The sad truth is that, in the long run, it leads
+    to an even worse life.</p>
+
+    <p style="margin-top: 1em"><small><em>Note:</em>&nbsp;
+    We are not gamers. If you think we have misunderstood
+    some point, or have suggestions for making this text
+    clearer or more correct, please send them to &lt;<a
+    href="mailto:address@hidden";>address@hidden</a>&gt;.</small></p>
   </li>
 
   <li id="M201908210">
@@ -153,9 +150,9 @@
     href="/proprietary/proprietary-addictions.html#addictiveness">
     psychological manipulation techniques</a>.</p>
 
-    <p>The article uses &ldquo;free&rdquo; to mean &ldquo;zero
+    <p><small>(The article uses &ldquo;free&rdquo; to mean &ldquo;zero
     price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.</p>
+    &ldquo;gratis&rdquo; instead.)</small></p>
   </li>
 
   <li id="M201807310">
@@ -402,7 +399,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/18 15:41:05 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- malware-mobiles.html        4 Oct 2019 07:31:28 -0000       1.111
+++ malware-mobiles.html        16 Nov 2019 12:55:39 -0000      1.112
@@ -217,9 +217,9 @@
     permissions or contained advertising trackers, with seven being more
     risky than the average of the 100 most popular Android apps.</p>
 
-    <p>Note that the article refers to these proprietary apps as
+    <p><small>(Note that the article refers to these proprietary apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-    instead.</p>
+    instead.)</small></p>
   </li>
 
   <li id="M201807100">
@@ -418,6 +418,13 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M209900001.1">
+    <p>See above for the general universal back door in essentially
+    all mobile phones, which permits converting them into <a
+    class="not-a-duplicate" href="#universal-back-door-phone-modem">
+    full-time listening devices</a>.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -584,9 +591,9 @@
     href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
     the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 
-    <p>It is unfortunate that these articles talk about &ldquo;free
+    <p><small>(It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are <em>not</em> <a
-    href="/philosophy/free-sw.html">free software</a>.</p>
+    href="/philosophy/free-sw.html">free software</a>.)</small></p>
   </li>
 
   <li id="M201901050">
@@ -706,9 +713,11 @@
     <p>The Sarahah app <a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
     uploads all phone numbers and email addresses</a> in user's address
-    book to developer's server.  Note that this article misuses the words
+    book to developer's server.</p>
+
+    <p><small>(Note that this article misuses the words
     &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
-    referring to zero price.</p>
+    referring to zero price.)</small></p>
   </li>
 
   <li id="M201707270">
@@ -935,7 +944,7 @@
   </li>
 
   <li id="M201510300">
-    <p>More than 73% and 47% of mobile applications, from Android and iOS
+    <p>More than 73% and 47% of mobile applications, for Android and iOS
     respectively <a href="https://techscience.org/a/2015103001/";>share
     personal, behavioral and location information</a> of their users with
     third parties.</p>
@@ -1152,7 +1161,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/04 07:31:28 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-webpages.html       4 Feb 2019 07:16:06 -0000       1.27
+++ malware-webpages.html       16 Nov 2019 12:55:39 -0000      1.28
@@ -83,10 +83,12 @@
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
     inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
     type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
+    cryptocurrency.</p>
+
+    <p><small>(Note that the article refers to the infected software
     as &ldquo;content management system&rdquo;. A better term would be
     &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
-    revision system</a>&rdquo;.)</p>
+    revision system</a>&rdquo;.)</small></p>
 
     <p>Since the miner was a nonfree JavaScript program,
     visitors wouldn't have been affected if they had used <a
@@ -261,7 +263,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/04 07:16:06 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-drm.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-drm.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.html        7 Sep 2019 13:03:42 -0000       1.46
+++ proprietary-drm.html        16 Nov 2019 12:55:39 -0000      1.47
@@ -140,10 +140,10 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
-    <p>The article uses the term &ldquo;lock&rdquo;
+    <p><small>(The article uses the term &ldquo;lock&rdquo;
     to describe the DRM, but we prefer to use the term <a
     href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
-    handcuffs</a>.</p>
+    handcuffs</a>.)</small></p>
   </li>
 
   <li id="M201702020">
@@ -382,7 +382,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/07 13:03:42 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-insecurity.html 18 Sep 2019 15:41:06 -0000      1.111
+++ proprietary-insecurity.html 16 Nov 2019 12:55:39 -0000      1.112
@@ -74,9 +74,9 @@
     permissions or contained advertising trackers, with seven being more
     risky than the average of the 100 most popular Android apps.</p>
 
-    <p>Note that the article refers to these proprietary apps as
+    <p><small>(Note that the article refers to these proprietary apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-    instead.</p>
+    instead.)</small></p>
   </li>
 
   <li id="M201907080">
@@ -142,9 +142,9 @@
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?</p>
 
-    <p>These crackers are probably hackers too, but please <a
+    <p><small>(These crackers are probably hackers too, but please <a
     href="https://stallman.org/articles/on-hacking.html";> don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201807100">
@@ -195,9 +195,9 @@
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
     its security has been cracked</a>.</p>
 
-    <p>Note that this article misuses the term <a
+    <p><small>(Note that this article misuses the term <a
     href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
-    referring to crackers.</p>
+    referring to crackers.)</small></p>
   </li>
 
   <li id="M201708280">
@@ -207,8 +207,8 @@
 
     <p>Don't be a sucker&mdash;reject all the stings.</p>
 
-    <p>It is unfortunate that the article uses the term <a
-    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
+    <p><small>(It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201706200.1">
@@ -310,9 +310,9 @@
     turn the Oculus Rift sensors into spy cameras</a> after breaking into
     the computer they are connected to.</p>
 
-    <p>Unfortunately, the article <a
-    href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
-    as &ldquo;hackers&rdquo;</a>.</p>
+    <p><small>(Unfortunately, the article <a
+    href="/philosophy/words-to-avoid.html#Hacker">improperly refers
+    to crackers as &ldquo;hackers&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201701270">
@@ -714,7 +714,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/18 15:41:06 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-interference.html       15 Aug 2019 10:16:23 -0000      1.53
+++ proprietary-interference.html       16 Nov 2019 12:55:39 -0000      1.54
@@ -88,10 +88,12 @@
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
     inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
     type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
+    cryptocurrency.</p>
+
+    <p><small>(Note that the article refers to the infected software
     as &ldquo;content management system&rdquo;. A better term would be
     &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
-    revision system</a>&rdquo;.)</p>
+    revision system</a>&rdquo;.)</small></p>
 
     <p>Since the miner was a nonfree JavaScript program,
     visitors wouldn't have been affected if they had used <a
@@ -269,7 +271,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/08/15 10:16:23 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-jails.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-jails.html      21 Oct 2019 06:53:51 -0000      1.46
+++ proprietary-jails.html      16 Nov 2019 12:55:39 -0000      1.47
@@ -133,7 +133,7 @@
     censoring apps for the US government too</a>. Specifically, it is
     deleting apps developed by Iranians.</p>
 
-    <p>The root of these wrongs are in Apple. If Apple had not designed
+    <p>The root of these wrongs is in Apple. If Apple had not designed
     the iMonsters to let Apple censor applications, Apple would not have
     had the power to stop users from installing whatever kind of apps.</p>
   </li>
@@ -322,7 +322,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/21 06:53:51 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-sabotage.html   2 Nov 2019 08:35:11 -0000       1.98
+++ proprietary-sabotage.html   16 Nov 2019 12:55:39 -0000      1.99
@@ -288,10 +288,10 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
-    <p>The article uses the term &ldquo;lock&rdquo;
+    <p><small>(The article uses the term &ldquo;lock&rdquo;
     to describe the DRM, but we prefer to use the term <a
     href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
-    handcuffs</a>.</p>
+    handcuffs</a>.)</small></p>
   </li>
 
   <li id="M201612200">
@@ -632,7 +632,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-subscriptions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-subscriptions.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-subscriptions.html      2 Nov 2019 08:35:11 -0000       1.30
+++ proprietary-subscriptions.html      16 Nov 2019 12:55:39 -0000      1.31
@@ -100,10 +100,10 @@
     When a program proprietary, and even malware, don't get distracted
     by the secondary issues like price.</p>
 
-    <p>Please don't repeat the marketing term &ldquo;Creative
+    <p><small>(Please don't repeat the marketing term &ldquo;Creative
     Cloud&rdquo; except to express revulsion for it.  The <a
     href="/philosophy/words-to-avoid.html#CloudComputing"> term
-    &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.</p>
+    &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.)</small></p>
   </li>
 </ul>
 
@@ -165,7 +165,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/02 08:35:11 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary-surveillance.html       31 Oct 2019 11:55:07 -0000      1.306
+++ proprietary-surveillance.html       16 Nov 2019 12:55:39 -0000      1.307
@@ -1021,9 +1021,9 @@
     href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
     the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 
-    <p>It is unfortunate that these articles talk about &ldquo;free
+    <p><small>(It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are <em>not</em> <a
-    href="/philosophy/free-sw.html">free software</a>.</p>
+    href="/philosophy/free-sw.html">free software</a>.)</small></p>
   </li>
 
   <li id="M201901050">
@@ -1140,9 +1140,11 @@
     <p>The Sarahah app <a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
     uploads all phone numbers and email addresses</a> in user's address
-    book to developer's server.  Note that this article misuses the words
+    book to developer's server.</p>
+
+    <p><small>(Note that this article misuses the words
     &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
-    referring to zero price.</p>
+    referring to zero price.)</small></p>
   </li>
 
   <li id="M201707270">
@@ -1361,7 +1363,7 @@
   </li>
 
   <li id="M201510300">
-    <p>More than 73% and 47% of mobile applications, from Android and iOS
+    <p>More than 73% and 47% of mobile applications, for Android and iOS
     respectively <a href="https://techscience.org/a/2015103001/";>share
     personal, behavioral and location information</a> of their users with
     third parties.</p>
@@ -1587,8 +1589,8 @@
 
     <p>Don't be a sucker&mdash;reject all the stings.</p>
 
-    <p>It is unfortunate that the article uses the term <a
-    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
+    <p><small>(It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
   </li>
 </ul>
 
@@ -2004,9 +2006,9 @@
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?</p>
 
-    <p>These crackers are probably hackers too, but please <a
+    <p><small>(These crackers are probably hackers too, but please <a
     href="https://stallman.org/articles/on-hacking.html";> don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
   </li>
 
   <li id="M201804140">
@@ -2534,7 +2536,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/31 11:55:07 $
+$Date: 2019/11/16 12:55:39 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]