[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary workshop/targets.rec workshop/m...
From: |
Therese Godefroy |
Subject: |
www/proprietary workshop/targets.rec workshop/m... |
Date: |
Sat, 15 Feb 2020 09:25:46 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 20/02/15 09:25:46
Modified files:
proprietary/workshop: targets.rec mal.rec
proprietary : malware-cars.html malware-games.html
malware-mobiles.html
proprietary-addictions.html
proprietary-deception.html
proprietary-surveillance.html proprietary.html
proprietary-sabotage.html
Log message:
Snooping and sabotage by employer's software (www-discuss 2019-12-17);
Deceptive apps bypassing user's permissions (www-discuss 2020-02-02);
Surveillance by modern cars (www-discuss 2020-02-02);
Loot boxes: add a paragraph to the "addictiveness" entry.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/targets.rec?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.100&r2=1.101
Patches:
Index: workshop/targets.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/targets.rec,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- workshop/targets.rec 16 Nov 2019 12:50:43 -0000 1.15
+++ workshop/targets.rec 15 Feb 2020 14:25:45 -0000 1.16
@@ -38,7 +38,7 @@
Targets: back-doors drm insecurity interference sabotage subscriptions
surveillance tethers jails tyrants
Page: malware-mobiles.html
-Targets: phone-communications back-doors drm insecurity interference
manipulation sabotage surveillance jails tyrants
+Targets: phone-communications back-doors deception drm insecurity interference
manipulation sabotage surveillance jails tyrants
Page: malware-webpages.html
Targets: malware-webpages
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- workshop/mal.rec 6 Feb 2020 16:03:44 -0000 1.185
+++ workshop/mal.rec 15 Feb 2020 14:25:45 -0000 1.186
@@ -25,6 +25,53 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2020-02-15
+Id: 201912090
+RT: www-discuss 2019-12-17 (iMonsters and Android phones)
+PubDate: 2019-12-09
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>iMonsters and Android phones,
++ when used for work, give employers powerful <a
++
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
++ snooping and sabotage capabilities</a> if they install their own
++ software on the device. Many employers demand to do this. For the
++ employee, this is simply nonfree software, as fundamentally unjust
++ and as dangerous as any other nonfree software.</p>
+
+Added: 2020-02-15
+Id: 202002020
+RT: www-discuss 2020-02-02 (malware)
+PubDate: 2019-07-10
+Target: proprietary-deception.html proprietary-deception
+Target: malware-mobiles.html deception
+Keywords:
+Blurb: <p>Many Android apps fool their users by asking
++ them to decide what permissions to give the program, and then <a
++
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
++ bypassing these permissions</a>.</p>
++
++ <p>The Android system is supposed to prevent data leaks by running apps
++ in isolated sandboxes, but developers have found ways to access the
++ data by other means, and there is nothing the user can do to stop
++ them from doing so, since both the system and the apps are nonfree.</p>
+
+Added: 2020-02-15
+Id: 201912171
+RT: www-discuss 2020-02-02 (malware)
+PubDate: 2019-12-17
+Target: proprietary-surveillance.html SpywareInVehicles
+Target: malware-cars.html malware-cars
+Keywords:
+Blurb: <p>Most modern cars now <a
++ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
++ record and send various kinds of data to the manufacturer</a>. For
++ the user, access to the data is nearly impossible, as it involves
++ cracking the car's computer, which is always hidden and running with
++ proprietary software.</p>
+
Added: 2020-02-01
Id: 202001290
RT:
@@ -1181,6 +1228,7 @@
Id: 209900000
RT: www-discuss 2019-11-13 (Game addictiveness, new version)
PubDate: 2010-03-08
+PubDate: 2017-09-28
PubDate: 2015-01-00
Target: proprietary-addictions.html addictiveness
Target: malware-games.html malware-games
@@ -1222,6 +1270,12 @@
+ <p>Games such as World of Warcraft, which are considered very addictive,
+ use several of these techniques.</p>
+
++ <p style="margin-top: 1em">“Loot boxes“ are a direct
++ application of the random reward mechanism, and their addictiveness
++ is enhanced by seductive animation. They are <a
++
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">
++ akin to gambling</a>.</p>
++
+ <p style="margin-top: 1em">The developers of gratis
+ mobile games apply the techniques described above to <a
+ href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
@@ -1232,8 +1286,8 @@
+ willing to spend. Thus developers carefully study the behavior of
+ millions of users to increase the addictiveness of their games.</p>
+
-+ <p><small>(Unfortunately, this article uses “free” to mean
-+ “zero price.” We recommend saying “gratis”
++ <p><small>(Unfortunately, the last two articles use “free” to
++ mean “zero price.” We recommend saying “gratis”
+ instead.)</small></p>
+
+ <p style="margin-top: 1em">However, the addictiveness of a game is
Index: malware-cars.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-cars.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-cars.html 18 Nov 2019 10:27:57 -0000 1.30
+++ malware-cars.html 15 Feb 2020 14:25:46 -0000 1.31
@@ -51,6 +51,15 @@
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
+ </li>
+
<li id="M201909160">
<p>Tesla users claim Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
@@ -342,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-games.html 18 Nov 2019 10:27:57 -0000 1.45
+++ malware-games.html 15 Feb 2020 14:25:46 -0000 1.46
@@ -89,6 +89,12 @@
<p>Games such as World of Warcraft, which are considered very addictive,
use several of these techniques.</p>
+ <p style="margin-top: 1em">“Loot boxes“ are a direct
+ application of the random reward mechanism, and their addictiveness
+ is enhanced by seductive animation. They are <a
+
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">
+ akin to gambling</a>.</p>
+
<p style="margin-top: 1em">The developers of gratis
mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
@@ -99,8 +105,8 @@
willing to spend. Thus developers carefully study the behavior of
millions of users to increase the addictiveness of their games.</p>
- <p><small>(Unfortunately, this article uses “free” to mean
- “zero price.” We recommend saying “gratis”
+ <p><small>(Unfortunately, the last two articles use “free” to
+ mean “zero price.” We recommend saying “gratis”
instead.)</small></p>
<p style="margin-top: 1em">However, the addictiveness of a game is
@@ -404,7 +410,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.html 20 Jan 2020 18:33:28 -0000 1.117
+++ malware-mobiles.html 15 Feb 2020 14:25:46 -0000 1.118
@@ -114,6 +114,7 @@
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a href="#censorship">Censorship</a></li>-->
+ <li><a href="#deception">Deception</a></li>
<li><a href="#drm">DRM</a></li>
<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
@@ -203,6 +204,23 @@
</ul>
+<h3 id="deception">deception</h3>
+
+<ul class="blurbs">
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+</ul>
+
+
<h3 id="drm">DRM</h3>
<p>Digital restrictions management, or “DRM,” refers to
@@ -444,6 +462,16 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
@@ -1186,7 +1214,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/01/20 18:33:28 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-addictions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-addictions.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-addictions.html 18 Nov 2019 10:27:57 -0000 1.21
+++ proprietary-addictions.html 15 Feb 2020 14:25:46 -0000 1.22
@@ -99,6 +99,12 @@
<p>Games such as World of Warcraft, which are considered very addictive,
use several of these techniques.</p>
+ <p style="margin-top: 1em">“Loot boxes“ are a direct
+ application of the random reward mechanism, and their addictiveness
+ is enhanced by seductive animation. They are <a
+
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">
+ akin to gambling</a>.</p>
+
<p style="margin-top: 1em">The developers of gratis
mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
@@ -109,8 +115,8 @@
willing to spend. Thus developers carefully study the behavior of
millions of users to increase the addictiveness of their games.</p>
- <p><small>(Unfortunately, this article uses “free” to mean
- “zero price.” We recommend saying “gratis”
+ <p><small>(Unfortunately, the last two articles use “free” to
+ mean “zero price.” We recommend saying “gratis”
instead.)</small></p>
<p style="margin-top: 1em">However, the addictiveness of a game is
@@ -326,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-deception.html 23 Nov 2019 14:58:54 -0000 1.43
+++ proprietary-deception.html 15 Feb 2020 14:25:46 -0000 1.44
@@ -60,6 +60,18 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+
<li id="M201904150">
<p id="M201509210">Volkswagen programmed its car engine computers to <a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
@@ -190,7 +202,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 14:58:54 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary-surveillance.html 1 Feb 2020 14:25:41 -0000 1.310
+++ proprietary-surveillance.html 15 Feb 2020 14:25:46 -0000 1.311
@@ -822,6 +822,16 @@
surveillance for other companies as well as for Amazon</a>.</p>
</li>
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201910130">
<p>The Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
@@ -2093,6 +2103,15 @@
</div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
+ </li>
+
<li id="M201903290">
<p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
@@ -2542,7 +2561,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/01 14:25:41 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.html 1 Feb 2020 14:19:02 -0000 1.200
+++ proprietary.html 15 Feb 2020 14:25:46 -0000 1.201
@@ -173,6 +173,37 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
+ </li>
+
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M202001290">
<p>The Amazon Ring app does <a
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
@@ -195,79 +226,6 @@
a secret secondary malicious purpose. All this is in addition to the
malware of Android itself.</p>
</li>
-
- <li id="M201912170">
- <p>Some security breakers (wrongly referred in this article as <a
-
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
-
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers and microphones</a>.</p>
- </li>
-
- <li id="M201803210">
- <p>Some <span>social networking</span> apps are <a
- href="https://www.jeffbullas.com/facebook-creates-addiction/">
- designed to get users addicted</a>. These try to merge into your daily
- routine by exploiting social pressure and your natural desire for
- socialization, converting habitual gestures into thorough addiction. As
- already noted for games, addictiveness is essentially based on random
- rewards. In the present case, the rewards are messages from friends
- and followers, “likes,” news, interesting videos, etc. The
- software is designed to trigger users' desire for these rewards,
- and keep this desire alive as long as possible.</p>
-
- <ul>
- <li>By default, notifications are sent every time a new item comes
- in, instead of, say, once a day. They are associated with sounds or
- vibrations which make them even more compelling. (Remember Pavlov's
- experiments with rats.) These triggers are often opt-out, and many
- users don't try to turn them off. They are most effective when the
- app is installed on a mobile device which is always on and never
- leaves the user. As a side effect, they may contribute to the <a
-
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction">
- addictiveness of “smart” phones</a>.</li>
-
- <li>Users are served selected material
- that is likely to interest them, based on <a
-
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611">
- profiling</a>. (This paves the way to <a
- href="/proprietary/proprietary-manipulation.html">manipulation</a>,
- by the way.)</li>
-
- <li>The app interface is designed to make users
- stay on the site as long as possible, using <a
-
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1">
- infinite scrolling</a> for example.</li>
-
- <li>The company that owns the social network tries
- to cover users' needs as extensively as possible, by <a
-
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook">
- acquiring other companies</a> if needed. Once users
- have concentrated most of their online activities and
- a lot of their personal data on a single platform (or
- a set of platforms that belong to the same group), they find it <a
-
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram">
- almost impossible to leave</a>. And even if they wanted to, they
- would have a hard time digging out the relevant options, and the
- app would aggressively nag them to stay.</li>
- </ul>
-
- <p>A good way to minimize the risk of addiction, short of avoiding
- social media altogether, is to turn off notifications and leave as
- little as possible of your own data on the platform.</p>
- </li>
-
- <li id="M201910131">
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
- “fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
- contains the websites of political opponents. By linking the requests
- originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
- </li>
</ul>
</div>
@@ -329,7 +287,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/01 14:19:02 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-sabotage.html 18 Nov 2019 10:27:57 -0000 1.100
+++ proprietary-sabotage.html 15 Feb 2020 14:25:46 -0000 1.101
@@ -56,6 +56,16 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201910071">
<p>Adobe has <a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">
@@ -653,7 +663,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary workshop/targets.rec workshop/m...,
Therese Godefroy <=