www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary proprietary.html...


From: Lorenzo L. Ancora
Subject: www/server/staging/proprietary proprietary.html...
Date: Tue, 24 Nov 2020 10:37:45 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     Lorenzo L. Ancora <lorenzoancora>       20/11/24 10:37:45

Modified files:
        server/staging/proprietary: proprietary.html 
        server/staging/proprietary/workshop: mal.rec 
Added files:
        server/staging/proprietary: proprietary-deception.html 

Log message:
        New malware entry (HP's malicious security upgrades) by RMS

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary-deception.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/workshop/mal.rec?cvsroot=www&r1=1.5&r2=1.6

Patches:
Index: proprietary.html
===================================================================
RCS file: /web/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary.html    19 Feb 2020 21:30:47 -0000      1.18
+++ proprietary.html    24 Nov 2020 15:37:43 -0000      1.19
@@ -1,16 +1,5 @@
-<!DOCTYPE html>
-<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
-<head>
-<meta http-equiv="content-type" content="text/html; charset=utf-8" />
-<link rev="made" href="mailto:webmasters@gnu.org"; />
-<link rel="icon" type="image/png" href="/graphics/gnu-head-mini.png" />
-<meta name="ICBM" content="42.355469,-71.058627" />
-<meta name="DC.title" content="gnu.org" />
-<link rel="stylesheet" type="text/css" href="/reset.css" media="screen" />
-<link rel="stylesheet" type="text/css" href="/mini.css" media="handheld" />
-<link rel="stylesheet" type="text/css" href="/server/staging/layout.css" 
media="screen" />
-<link rel="stylesheet" type="text/css" href="/print.min.css" media="print" />
-<!-- Parent-Version: 1.86 -->
+<!--#include virtual="/server/html5-header.html" -->
+<!-- Parent-Version: 1.94 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                   Please do not edit <ul class="blurbs">!
@@ -24,38 +13,46 @@
 <style type="text/css" media="print,screen">
 <!--
 #skiplinks .button { float: left; margin: .5em; }
-table {
+#skiplinks .button a { display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC {
    display: block;
    max-width: 100%;
    overflow: auto;
    border: .2em solid #e0dfda;
    margin: 2.5em auto;
 }
-table th, table td {
+#TOC th, #TOC td {
    text-align: center;
    padding: .7em;
    border-collapse: collapse;
 }
-table th {
+#TOC th {
    vertical-align: middle;
    font-size: 1.1em;
    font-weight: bold;
    background: #fffae0;
 }
-table td {
+#TOC td {
    vertical-align: top;
 }
-table ul { padding-top: .5em; margin: 0; }
-table ul li { padding-bottom: .5em; margin: 0; list-style: none; }
-table ul li a { display: inline-block; }
-table ol { text-align: left; margin: 0; }
-table ol li { margin: .5em 5%; }
+#TOC ul { padding-top: .5em; margin: 0; }
+#TOC ul li { padding-bottom: .5em; margin: 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
+ #skiplinks a, #skiplinks a:visited {
+   color: #004caa;
+   text-decoration: none;
+}
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 -->
 </style>
 <style type="text/css" media="print,screen">
   .reduced-width { width: 55em; }
 </style>
-<!--#include virtual="/server/staging/banner.html" -->
+<!--#include virtual="/server/banner.html" -->
 <div class="reduced-width">
 
 <h2>Proprietary Software Is Often Malware</h2>
@@ -66,8 +63,7 @@
 </div>
 <div style="clear: both"></div>
 
-<div class="article">
-<div class="about-page">
+<div id="about-section">
 <p>Proprietary software, also called nonfree software,
 means software that doesn't
 <a href="/philosophy/free-sw.html">respect users' freedom and
@@ -92,10 +88,9 @@
 a way to be had.</p>
 <hr class="thin" />
 </div>
-</div>
 
-<p>As of October, 2019, the pages in this directory list around 400
-instances of malicious functionalities (with more than 500 references to
+<p>As of November, 2020, the pages in this directory list around 450
+instances of malicious functionalities (with more than 550 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
 <table id="TOC">
@@ -105,7 +100,7 @@
  </tr>
  <tr>
   <td>
-   <ul id="types" class="columns">
+   <ul class="columns">
     <li><a href="/proprietary/proprietary-addictions.html">Addictions</a></li>
     <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f1">1</a>)</li>
     <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
@@ -128,14 +123,15 @@
    </ul>
   </td>
   <td>
-   <ul id="products">
+   <ul>
     <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
     <li><a href="/proprietary/malware-cars.html">Cars</a></li>
     <li><a href="/proprietary/malware-games.html">Games</a></li>
     <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
     <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
+    <li><a 
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
    </ul>
-   <ul id="companies">
+   <ul>
     <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
     <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
     <li><a href="/proprietary/malware-apple.html">Apple</a></li>
@@ -168,7 +164,6 @@
  </tr>
 </table>
 
-<div class="article">
 <p>Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
 <a href="/philosophy/free-software-even-more-important.html">free
@@ -179,129 +174,56 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M201803210">
-    <p>Some <span>social networking</span> apps are <a
-    href="https://www.jeffbullas.com/facebook-creates-addiction/";>
-    designed to get users addicted</a>. These try to merge into your daily
-    routine by exploiting social pressure and your natural desire for
-    socialization, converting habitual gestures into thorough addiction. As
-    already noted for games, addictiveness is essentially based on random
-    rewards. In the present case, the rewards are messages from friends
-    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
-    software is designed to trigger users' desire for these rewards,
-    and keep this desire alive as long as possible.</p>
-
-    <ul>
-      <li>By default, notifications are sent every time a new item comes
-      in, instead of, say, once a day. They are associated with sounds or
-      vibrations which make them even more compelling. (Remember Pavlov's
-      experiments with rats.) These triggers are often opt-out, and many
-      users don't try to turn them off. They are most effective when the
-      app is installed on a mobile device which is always on and never
-      leaves the user. As a side effect, they may contribute to the <a
-      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
-      addictiveness of &ldquo;smart&rdquo; phones</a>.</li>
-
-      <li>Users are served selected material
-      that is likely to interest   them, based on <a
-      
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>
-      profiling</a>. (This paves the way to <a
-      href="/proprietary/proprietary-manipulation.html">manipulation</a>,
-      by the way.)</li>
-
-      <li>The app interface is designed to make   users
-      stay on the site as long as possible, using <a
-      
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
-      infinite scrolling</a> for example.</li>
-
-      <li>The company that owns the social network tries
-      to cover   users' needs as extensively as possible, by <a
-      
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
-      acquiring other companies</a> if needed. Once users
-      have concentrated   most of their online activities and
-      a lot of their personal data on   a single platform (or
-      a set of platforms that belong to the same   group), they find it <a
-      
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
-      almost impossible to leave</a>. And even if they wanted to, they
-      would have a hard time digging out the relevant options, and the
-      app would aggressively nag them to stay.</li>
-    </ul>
-
-    <p>A good way to minimize the risk of addiction, short of avoiding
-    social media altogether, is to turn off notifications and leave as
-    little as possible of your own data on the platform.</p>
+  <li id="M202011050">
+    <p>HP tricked users into installing a <a
+    
href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer";>mischievous
 update</a> in
+    their printers that made the devices reject all third-party ink
+    cartridges.</p>
   </li>
 
-  <li id="M201910131">
-    <p>Safari occasionally <a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  <li id="M202011090">
+    <p>According to FTC, the
+    company behind the Zoom conferencing software <a
+    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
+    lied to users about its end-to-end encryption</a> for years, at least
+    since 2016.</p>
+
+    <p>People can use free (as in freedom) programs such as <a
+    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
+    better still if installed in a server controlled by the users.</p>
   </li>
 
-  <li id="M201904080">
-    <p>Apple plans to require that <a
-    
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/";>
-    all application software for MacOS be approved by Apple first</a>.</p>
-
-    <p>Offering a checking service as an option could be
-    useful and would not be wrong.  Requiring users to get
-    Apple's approval is tyranny. Apple says the check will
-    only look for malware (not counting the malware that is <a
-    href="/proprietary/malware-apple.html#TOC">part of
-    the operating system</a>), but Apple could change that policy step
-    by step.  Or perhaps Apple will define malware to include any app
-    that China does not like.</p>
-
-    <p>For free software, this means users will need to get Apple's
-    approval after compilation.  This amounts to a system of surveilling
-    the use of free programs.</p>
+  <li id="M202004150">
+    <p>Riot Games’ new anti-cheat is malware; <a
+    
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
+    on system boot at kernel level</a> on Windows. It is insecure software
+    that increases the attack surface of the operating system.</p>
   </li>
 
-  <li id="M201910130">
-    <p>The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it <a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history</a>, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.</p>
-
-    <p>Note: The <a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-    Washington Post version of the article</a> (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;</p>
+  <li id="M202003260">
+    <p>The Apple iOS version of Zoom <a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is
+    sending users' data to Facebook</a> even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.</p>
   </li>
 
-  <li id="M201910070">
-    <p>Apple <a
-    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
-    censors the Taiwan flag in iOS</a> on behalf of the Chinese
-    government. When the region is set to Hong Kong, this flag is not
-    visible in the emoji selection widget but is still accessible. When the
-    region is set to mainland China, all attempts to display it will result
-    in the &ldquo;empty emoji&rdquo; icon as if the flag never existed.</p>
-
-    <p>Thus, not only does Apple use the App Store as an instrument
-    of censorship, it also uses the iThing operating system for that
-    purpose.</p>
+  <li id="M202011060">
+    <p>A new app published by Google <a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>lets
+    banks and creditors deactivate people's Android devices</a> if they
+    fail to make payments. If someone's device gets deactivated, it will
+    be limited to basic functionality, such as emergency calling and
+    access to settings.</p>
   </li>
 </ul>
-</div>
+
 </div>
 
 </div><!-- for id="content", starts in the include above -->
-<!--#include virtual="/server/staging/nav-bar/test9/footer-text.html" -->
+<!--#include virtual="/server/footer.html" -->
 <div id="footer">
 <div class="unprintable">
 
@@ -347,7 +269,8 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free 
Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 
+Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -357,7 +280,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/19 21:30:47 $
+$Date: 2020/11/24 15:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/server/staging/proprietary/workshop/mal.rec,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- workshop/mal.rec    31 Aug 2019 15:51:33 -0000      1.5
+++ workshop/mal.rec    24 Nov 2020 15:37:45 -0000      1.6
@@ -1,7 +1,7 @@
 # This is the source file for malware examples in
 # https://www.gnu.org/proprietary/
 
-# Copyright (C) 2018, 2019 Free Software Foundation, Inc.
+# Copyright (C) 2018, 2019, 2020 Free Software Foundation, Inc.
 
 # Copying and distribution of this file, with or without modification,
 # are permitted in any medium without royalty provided the copyright
@@ -16,7 +16,6 @@
 %mandatory: Target
 %type: Added range 20300000 20000000
 %type: Id range 210000000 200000000
-%type: RT int
 
 # The fields "Added" (if any) and "Id" should come first, in this order.
 # Each line within a blurb should start with a + sign, including blank
@@ -25,16 +24,1041 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
-Added: 2019-08-16
+Added: 2020-11-24
+Id: 202011050
+RT:
+PubDate: 2020-11-05
+Target: proprietary-deception.html proprietary-deception
+Keywords: hp printer security update upgrade cartridge
+Blurb: <p>HP tricked users into installing a <a
++   
href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer";>mischievous
 update</a> in
++   their printers that made the devices reject all third-party ink
++   cartridges.</p>
+
+Added: 2020-11-23
+Id: 202011090
+RT: 1648629
+PubDate: 2020-11-09
+Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Keywords: Zoom, Conferencing, encryption, e2ee
+Blurb: <p>According to FTC, the
++   company behind the Zoom conferencing software <a
++   
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
++   lied to users about its end-to-end encryption</a> for years, at least
++   since 2016.</p>
++
++   <p>People can use free (as in freedom) programs such as <a
++   href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
++   better still if installed in a server controlled by the users.</p>
+
+Added: 2020-11-21
+Id: 202004150
+RT: 1634942
+PubDate: 2020-04-15
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-games.html malware-games
+Target: proprietary-interference.html proprietary-interference
+Keywords: Riot Games, Anti-cheat
+Blurb: <p>Riot Games’ new anti-cheat is malware; <a
++   
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
++   on system boot at kernel level</a> on Windows. It is insecure software
++   that increases the attack surface of the operating system.</p>
+
+Added: 2020-11-19
+Id: 202003260
+RT: 1647406
+PubDate: 2020-03-26
+Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Target: proprietary-surveillance.html SpywareInMobileApps
+Keywords: Zoom, Conferencing, Apple, iOS
+Blurb: <p>The Apple iOS version of Zoom <a
++   
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is
++   sending users' data to Facebook</a> even if the user doesn't have
++   a Facebook account. According to the article, Zoom and Facebook
++   don't even mention this surveillance on their privacy policy page,
++   making this an obvious violation of people's privacy even in their
++   own terms.</p>
+
+Added: 2020-11-14
+Id: 201905281
+RT: 1635381
+PubDate: 2019-05-28
+Target: malware-microsoft.html surveillance
+Target: proprietary-surveillance.html SpywareInNetworks
+Keywords: Microsoft Account, Phone Number
+Blurb: <p>Microsoft <a
++   
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08";>forces
++   people to give their phone number</a> in order to be able to create an 
account on
++   the company's network. On top of mistreating their users by providing
++   nonfree software, Microsoft is tracking their lives outside the computer 
and
++   violates their privacy.</p>
+
+Added: 2020-11-14
+Id: 202011060
+RT: 1644744
+PubDate: 2020-11-06
+Target: malware-google.html sabotage
+Target: malware-mobiles.html sabotage
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: proprietary-back-doors.html universal
+Keywords: Google, Google Apps, Mobile
+Blurb: <p>A new app published by Google <a
++   
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>lets
++   banks and creditors deactivate people's Android devices</a> if they
++   fail to make payments. If someone's device gets deactivated, it will
++   be limited to basic functionality, such as emergency calling and
++   access to settings.</p>
+
+Added: 2020-11-10
+Id: 202006120
+RT: 1635806
+PubDate: 2020-06-12
+Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Target: proprietary-censorship.html online-conferencing
+Keywords: Zoom, Censorship, China
+Blurb: <p>The company behind Zoom does not only deny
++   users' computer freedom by developing this piece
++   of nonfree software, it also violates users' civil rights by <a
++   
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship";>banning
++   events and censoring users</a> to serve the agenda of governments.</p>
++
++   <p>Freedom respecting programs such as <a
++   href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton
++   can be used instead, better still if installed in a server controlled
++   by its users.</p>
+
+Added: 2020-11-02
+Id: 202010221
+RT: 1635381
+PubDate: 2020-10-22
+Target: proprietary-surveillance.html SpywareInGames
+Target: malware-microsoft.html surveillance
+Target: malware-games.html malware-games
+Keywords: Minetest Minecraft Microsoft Accounts Surveillance
+Blurb: <p>Microsoft is imposing its
++   surveillance on the game of Minecraft by <a
++   
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java";>requiring
++   every player to open an account on Microsoft's network</a>. Microsoft
++   has bought the game and will merge all accounts into its network,
++   which will give them access to people's data.</p>
++
++   <p>Minecraft players <a
++   href="https://directory.fsf.org/wiki/Minetest";>can play Minetest</a>
++   instead. The essential advantage of Minetest is that it is free
++   software, meaning it respects the user's computer freedom. As a bonus,
++   it offers more options.</p>
+
+Added: 2020-11-02
+Id: 201912160
+RT: 1635381
+PubDate: 2019-12-16
+Target: malware-microsoft.html surveillance
+Target: proprietary-surveillance.html SpywareInWindows
+Keywords: Microsoft Windows Accounts
+Blurb: <p>Microsoft is <a
++   
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/";>tricking
++   users to create an account on their network</a> to be able to install
++   and use the Windows operating system, which is malware. The account can
++   be used for surveillance and/or violating people's rights in many ways,
++   such as turning their purchased software to a subscription product.</p>
+
+Added: 2020-10-28
+Id: 202010220
+RT: www-discuss 2020-10-22 (game that draws people to spend)
+PubDate: 2020-10-22
+Target: proprietary-addictions.html proprietary-addictions
+Target: malware-games.html malware-games
+Keywords: genshin game
+Blurb: <p>The addictive Genshin Impact relentlessly <a
++   
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world";>coerces
++   players to spend money by overwhelming the game play with loot
++   boxes</a>.</p>
+
+Added: 2020-10-16
+Id: 202009100
+RT: www-discuss 2020-10-14 ("Smart" watches for children)
+PubDate: 2020-09-10
+Target: proprietary-surveillance.html SpywareOnSmartWatches
+Keywords: JBC Polywell Starlian Pingonaut ANIO Xplora
+Blurb: <p>Internet-enabled watches with proprietary software
++   are malware, violating people (specially children's)
++   privacy. In addition, they have a lot of security flaws. They <a
++   
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/";>
++   permit security breakers (and unauthorized people) to access</a> the 
watch.</p>
++
++   <p>Thus, ill-intentioned unauthorized people can intercept communications 
between parent and child and spoof messages to and from the watch, possibly 
endangering the child.</p>
++
++   <p><small>(Note that this article misuses the word &ldquo;<a
++   href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;
++   to mean &ldquo;crackers.&rdquo;)</small></p>
+
+Added: 2020-10-06
+Id: 202003110
+RT: #1505594
+PubDate: 2020-03-11
+Target: proprietary-addictions.html proprietary-addictions
+Target: malware-games.html malware-games
+Keywords:
+Blurb: <p>Roblox (among many other games)
++   created anti-features which sucker children into <a
++   
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge";>
++   utilizing third-party payment services without authorization.</a></p>
+
+Added: 2020-09-30
+Id: 202007270
+RT: www-discuss 2020-09-30 (Tethered sous-vide cooker sabotaged)
+PubDate: 2020-07-27
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>The Mellow sous-vide cooker is
++   tethered to a server. The company suddenly <a
++   
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/";>
++   turned this tethering into a subscription</a>, forbidding users from
++   taking advantage of the &ldquo;advanced features&rdquo; of the cooker
++   unless they pay a monthly fee.</p>
+
+Added: 2020-09-28
+Id: 202009183
+RT: www-discuss 2020-09-20 (Instagram snooping)
+PubDate: 2020-09-18
+Target: proprietary-surveillance.html SpywareIniThings
+Keywords: facebook instagram ios
+Blurb: <p>Facebook <a
++   
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html";>snoops
++   on Instagram</a> users by surreptitously turning on the device's
++   camera.</p>
+
+Added: 2020-09-28
+Id: 202009270
+RT: 1618695
+PubDate: 2020-09-27
+Target: proprietary-surveillance.html SpywareAtHome
+Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Keywords:
+Blurb: <p>Many employers are using nonfree
++   software, including videoconference software, to <a
++   
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance";>
++   surveil and monitor staff working at home</a>. If the program reports
++   whether you are &ldquo;active,&rdquo; that is in effect a malicious
++   surveillance feature.</p>
+
+Added: 2020-09-23
+Id: 202008182
+RT: www-discuss 2020-09-18 (Oculus headsets will break without...)
+PubDate: 2020-08-18
+Target: proprietary-surveillance.html SpywareInVR
+Target: proprietary-sabotage.html proprietary-sabotage
+Keywords: oculus facebook surveillance
+Blurb: <p>Oculus headsets <a
++   
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>require
++   users to identify themselves to Facebook</a>. This will give Facebook
++   free rein to pervasively snoop on Oculus users.</p>
+
+Added: 2020-09-02
+Id: 202008300
+RT: www-discuss 2020-08-30 (Apple is putting the squeeze...)
+PubDate: 2020-08-30
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
+Keywords:
+Blurb: <p>Apple is <a
++   
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers";>
++   putting the squeeze on all business</a> conducted through apps
++   for iMonsters.</p>
++
++   <p>This is a symptom of a very big injustice: that Apple has the
++   power to decide what software can be installed on an iMonster.
++   That it is a jail.</p>
+
+Added: 2020-08-21
+Id: 202008181
+RT: www-discuss 2020-08-20 (Toyota spyware)
+PubDate: 2020-08-18
+Target: proprietary-surveillance.html SpywareInVehicles
+Target: malware-cars.html malware-cars
+Keywords:
+Blurb: <p>New Toyotas will <a
++   href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/";>
++   upload data to AWS to help create custom insurance premiums</a>
++   based on driver behaviour.</p>
++
++   <p>Before you buy a &ldquo;connected&rdquo; car, make sure you can
++   disconnect its cellular antenna and its GPS antenna.  If you want
++   GPS navigation, get a separate navigator which runs free software
++   and works with Open Street Map.</p>
+
+Added: 2020-08-21
+Id: 202008180
+RT: www-discuss 2020-08-20 (Apple's power over developers)
+PubDate: 2020-08-18
+PubDate: 2019-03-17
+Target: malware-apple.html subscriptions
+Target: proprietary-subscriptions.html proprietary-subscriptions
+Keywords:
+Blurb: <p>Apple can remotely <a
++   
href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games";>
++   cut off any developer's access to the tools for developing software</a>
++   for iOS or MacOS.</p>
++
++   <p>Epic (Apple's target in this example)
++   makes nonfree games which have their own <a
++   
href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/";>
++   malicious features</a>, but that doesn't make it acceptable for Apple
++   to have this sort of power.</p>
+
+Added: 2020-08-20
+Id: 202008110
+RT: www-discuss 2020-08-18 (TikTok surveillance through an Android bug)
+PubDate: Aug 11, 2020-08-11
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-google.html insecurity
+Keywords:
+Blurb: <p>TikTok <a
++   
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
++   exploited an Android vulnerability</a> to obtain user MAC
++   addresses.</p>
+
+Added: 2020-08-18
+Id: 202004200
+RT: www-discuss 2020-08-16 (Apple uses Siri to listen to people...)
+PubDate: 2020-04-20
+Target: malware-apple.html surveillance
+Target: proprietary-surveillance.html SpywareIniThings
+Keywords:
+Blurb: <p>Apple whistleblower Thomas Le Bonniec reports that Apple
++   made a practice of surreptitiously activating the Siri software to <a
++   
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf";>
++   record users' conversations when they had not activated Siri</a>.
++   This was not just occasional, it was systematic practice.</p>
++
++   <p>His job was to listen to these recordings, in a group that made
++   transcripts of them. He does not believes that Apple has ceased this
++   practice.</p>
++
++   <p>The only reliable way to prevent this is, for the program that
++   controls access to the microphone to decide when the user has
++   &ldquo;activated&rdquo; any service, to be free software, and the
++   operating system under it free as well. This way, users could make
++   sure Apple can't listen to them.</p>
+
+Added: 2020-08-14
+Id: 202008030
+RT: www-discuss 2020-08-09 (ADT alarm systems will snoop for Google.)
+PubDate: 2020-08-03
+Target: malware-google.html surveillance
+Target: proprietary-back-doors.html spy
+Target: proprietary-surveillance.html SpywareAtHome
+Keywords:
+Blurb: <p>Google Nest <a
++   
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
++   is taking over ADT</a>. Google sent out a software
++   update to its speaker devices using their back door <a
++   href="https://www.protocol.com/google-smart-speaker-alarm-adt";> that
++   listens for things like smoke alarms</a> and then notifies your phone
++   that an alarm is happening. This means the devices now listen for more
++   than just their wake words. Google says the software update was sent
++   out prematurely and on accident and Google was planning on disclosing
++   this new feature and offering it to customers who pay for it.</p>
+
+Added: 2020-08-12
+Id: 202007280
+RT: www-discuss 2020-08-11 (Tethered eyeglass display)
+PubDate: 2020-07-28
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>The Focals eyeglass display, with snooping
++   microphone, has been eliminated.  Google eliminated
++   it by buying the manufacturer and shutting it down.  It also <a
++   
href="https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010";>shut
++   down the server these devices depend on</a>, which caused the ones
++   already sold to cease to function.</p>
++
++   <p>It may be a good thing to wipe out this product&mdash;for
++   &ldquo;smart,&rdquo; read &ldquo;snoop&rdquo;&mdash;but Google
++   didn't do that for the sake of privacy.  Rather, it was eliminating
++   competition for its own snooping product.</p>
+
+Added: 2020-07-09
+Id: 202006300
+RT: www-discuss 2020-07-08 ("bossware" advertises that it is malware)
+PubDate: 2020-06-30
+Target: proprietary-surveillance.html SpywareAtHome
+Keywords:
+Blurb: <p>&ldquo;Bossware&rdquo; is malware that bosses <a
++   
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
++   coerce workers into installing in their own computers</a>, so the
++   bosses can spy on them.</p>
++
++   <p>This shows why requiring the user's &ldquo;consent&rdquo; is not
++   an adequate basis for protecting digital privacy.  The boss can coerce
++   most workers into consenting to almost anything, even probable exposure
++   to contagious disease that can be fatal.  Software like this should
++   be illegal and bosses that demand it should be prosecuted for it.</p>
+
+Added: 2020-07-09
+Id: 202007010
+RT: www-discuss 2007-07-08 (BMW car back door)
+PubDate: 2020-07-01
+Target: proprietary-back-doors.html universal
+Target: malware-cars.html malware-cars
+Keywords:
+Blurb: <p>BMW will remotely <a
++   href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/";>
++   enable and disable functionality in cars</a> through a universal
++   back door.</p>
+
+Added: 2020-07-01
+Id: 201504210
+RT: www-discuss 2020-07-01 (Runescape...)
+PubDate: 2015-04-21
+Target: proprietary-addictions.html proprietary-addictions
+Target: malware-games.html malware-games
+Keywords:
+Blurb: <p>Runescape is a popular online game with some <a
++   
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/";>
++   addictive features</a> derived from <a
++   href="/proprietary/proprietary-addictions.html#addictiveness">
++   behavioral manipulation techniques</a>. Certain
++   repetitive aspects of the game, like <a
++   href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
++   grinding</a>, can be minimised by becoming a paying member, and can
++   thus encourage children and impressionable people to spend money on
++   the game.</p>
+
+Added: 2020-06-26
+Id: 202006260
+RT: www-discuss 2020-06-25 (proprietary-surveillance)
+PubDate: 2020-06-26
+Target: proprietary-surveillance.html SpywareInTelephones
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Most apps are malware, but
++   Trump's campaign app, like Modi's campaign app, is <a
++   
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/";>
++   especially nasty malware, helping companies snoop on users as well
++   as snooping on them itself</a>.</p>
++
++   <p>The article says that Biden's app has a less manipulative overall
++   approach, but that does not tell us whether it has functionalities we
++   consider malicious, such as sending data the user has not explicitly
++   asked to send.</p>
+
+Added: 2020-06-25
+Id: 202006250
+RT: www-discuss 2020-06-23 (https://www.zdnet.com/article/fbi-warns...)
+PubDate: 2020-06-25
+Target: proprietary-surveillance.html SpywareInTVSets
+Target: malware-appliances.html malware-appliances
+Keywords: tvsets
+Blurb: <p>TV manufacturers are able to <a
++   
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/";>snoop
++   every second of what the user is watching</a>. This is illegal due to
++   the Video Privacy Protection Act of 1988, but they're circumventing
++   it through EULAs.</p>
+
+Added: 2020-06-22
+Id: 202006160
+RT: www-discuss 2020-06-21 (Ripple20 bug)
+PubDate: 2020-06-16
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-appliances.html malware-appliances
+Keywords: Ripple20
+Blurb: <p><a
++   
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
++   A disasterous security bug</a> touches millions of products in the
++   Internet of Stings.</p>
++
++   <p>As a result, anyone can sting the user, not only the
++   manufacturer.</p>
+
+Added: 2020-06-13
+Id: 201909061
+RT: www-discuss 2020-06-12 (Best Buy made appliances...)
+PubDate: 2019-09-06
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>Best Buy made controllable appliances and <a
++   
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6";>
++   shut down the service to control them through</a>.</p>
++
++   <p>While it is laudable that Best Buy recognized it was mistreating
++   the customers by doing so, this doesn't alter the facts that
++   tethering the device to a particular server is a path to screwing the
++   users, and that it is a consequence of having nonfree software in the
++   device.</p>
+
+Added: 2020-06-07
+Id: 202005070
+RT: www-discuss 2020-06-06 (Wink Stink)
+PubDate: 2020-05-07
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>Wink sells a &ldquo;smart&rdquo; home hub that is tethered
++   to a server. In May 2020, it ordered the purchasers to start <a
++   
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
++   paying a monthly fee for the use of that server</a>.  Because of the
++   tethering, the hub is useless without that.</p>
+
+Added: 2020-05-25
+Id: 202005250
+RT: www-discuss 2020-05-23 (proprietary-sabotage by Tesla)
+<E1jcLWJ-0003c6-8F@fencepost.gnu.org>
+PubDate: 2020-02-06
+Target: proprietary-interference.html proprietary-interference
+Keywords: tesla cars
+Blurb: <p>Tesla's cars have a <a
++   href="/proprietary/proprietary-back-doors.html#M201709090.1">
++   universal remote back door</a>.  Tesla used it to <a
++   
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>
++   disable the autopilot features</a> on people's cars to make them pay
++   extra for re-enabling the features.</p>
++
++   <p>This kind of malfeature is only possible with proprietary
++   software&mdash;free software is controlled by its users who wouldn't
++   let do such things to them.</p>
+
+Added: 2020-05-03
+Id: 202004300
+RT: www-discuss 2020-05-02 (Xiaomi phones snoop on everything)
+PubDate: 2020-04-30
+Target: proprietary-surveillance.html SpywareInAndroid
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Xiaomi phones <a
++   
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>report
++   many actions the user takes</a>: starting an app, looking at a folder,
++   visiting a website, listening to a song.  They send device identifying
++   information too.</p>
++
++   <p>Other nonfree programs snoop too. For instance, Spotify and
++   other streaming dis-services make a dossier about each user, and <a
++   href="/malware/proprietary-surveillance.html#M201508210"> they make
++   users identify themselves to pay</a>.  Out, out, damned Spotify!</p>
++
++   <p>Forbes exonerates the same wrongs when the culprits are not Chinese,
++   but we condemn this no matter who does it.</p>
+
+Added: 2020-04-14
+Id: 202004130
+RT: www-discuss 2020-04-13 (Google Android apps have univ. back doors)
+PubDate: 2020
+Target: proprietary-back-doors.html universal
+Target: malware-google.html back-doors
+Keywords: terms of service
+Blurb: <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
++   Google Play Terms of Service</a> insist that the user of Android accept
++   the presence of universal back doors in apps released by Google.</p>
++
++   <p>This does not tell us whether any of Google's apps currently
++   contains a universal back door, but that is a secondary question.
++   In moral terms, demanding that people accept in advance certain bad
++   treatment is equivalent to actually doing it.  Whatever condemnation
++   the latter deserves, the former deserves the same.</p>
+
+Added: 2020-03-25
+Id: 201703070
+RT: www-discuss 2020-03-24 (Converting phones and "smart" TVs...)
+PubDate: 2017-03-07
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-mobiles.html insecurity
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>The CIA exploited existing vulnerabilities
++   in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
++   
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
++   spies through their microphones and cameras while making them appear
++   to be turned off</a>. Since the spyware sniffs signals, it bypasses
++   encryption.</p>
+
+Added: 2020-03-04
+Id: 202003010
+RT: www-discuss 2020-03-03 (Alipay Health Code snooping)
+PubDate: 2020-03-01
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords: coronavirus China
+Blurb: <p>The Alipay Health Code app
++   estimates whether the user has Covid-19 and <a
++   
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>
++   tells the cops directly</a>.</p>
+
+Added: 2020-02-24
+Id: 201911190
+RT: www-discuss 2020-02-22 (Amazon Ring neighborhood-surveillance
+cameras...)
+PubDate: 2019-11-19
+Target: proprietary-surveillance.html SpywareAtHome
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-appliances.html malware-appliances
+Keywords:
+Blurb: <p>Internet-tethered Amazon Ring had
++   a security vulnerability that enabled attackers to <a
++   
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
++   access the user's wifi password</a>, and snoop on the household
++   through connected surveillance devices.</p>
++
++   <p>Knowledge of the wifi password would not be sufficient to carry
++   out any significant surveillance if the devices implemented proper
++   security, including encryption. But many devices with proprietary
++   software lack this. Of course, they are also used by their
++   manufacturers for snooping.</p>
+
+Added: 2020-02-17
+Id: 201912190
+RT: www-discuss 2020-02-15 (malware)
+RT: www-discuss 2019-12-27 (More surveillance)
+PubDate: 2019-12-19
+Target: proprietary-surveillance.html SpywareInDesktopApps
+Keywords:
+Blurb: <p>Some Avast and AVG extensions
++   for Firefox and Chrome were found to <a
++   
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
++   snoop on users' detailed browsing habits</a>. Mozilla and Google
++   removed the problematic extensions from their stores, but this shows
++   once more how unsafe nonfree software can be. Tools that are supposed
++   to protect a proprietary system are, instead, infecting it with
++   additional malware (the system itself being the original malware).</p>
+
+Added: 2020-02-17
+Id: 201912220
+RT: www-discuss 2020-02-16 (malware)
+RT: www-discuss 2019-12-24 (...totok-popular-chat-app...)
+PubDate: 2019-12-22
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords: malware-mobiles.html surveillance
+Blurb: <p>The ToToc messaging app seems to be a <a
++   href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
++   spying tool for the government of the United Arab Emirates</a>.
++   Any nonfree program could be doing this, and that is a good
++   reason to use free software instead.</p>
++
++   <p><small>Note: this article uses the word &ldquo;free&rdquo; in
++   the sense of &ldquo;gratis.&rdquo;</small></p>
+
+Added: 2020-02-15
+Id: 201912090
+RT: www-discuss 2020-02-15 (malware)
+RT: www-discuss 2019-12-17 (iMonsters and Android phones)
+PubDate: 2019-12-09
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>iMonsters and Android phones,
++   when used for work, give employers powerful <a
++   
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
++   snooping and sabotage capabilities</a> if they install their own
++   software on the device.  Many employers demand to do this.  For the
++   employee, this is simply nonfree software, as fundamentally unjust
++   and as dangerous as any other nonfree software.</p>
+
+Added: 2020-02-15
+Id: 202002020
+RT: www-discuss 2020-02-15 (malware)
+RT: www-discuss 2019-12-30 (...android-apps-sidestepping...)
+PubDate: 2019-07-10
+Target: proprietary-deception.html proprietary-deception
+Target: malware-mobiles.html deception
+Keywords:
+Blurb: <p>Many Android apps fool their users by asking
++   them to decide what permissions to give the program, and then <a
++   
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
++   bypassing these permissions</a>.</p>
++
++   <p>The Android system is supposed to prevent data leaks by running apps
++   in isolated sandboxes, but developers have found ways to access the
++   data by other means, and there is nothing the user can do to stop
++   them from doing so, since both the system and the apps are nonfree.</p>
+
+Added: 2020-02-15
+Id: 201912171
+RT: www-discuss 2019-12-21 (...cars-now-run-on-the-new-oil...)
+RT: www-discuss 2020-02-02 (malware)
+PubDate: 2019-12-17
+Target: proprietary-surveillance.html SpywareInVehicles
+Target: malware-cars.html malware-cars
+Keywords:
+Blurb: <p>Most modern cars now <a
++   href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
++   record and send various kinds of data to the manufacturer</a>. For
++   the user, access to the data is nearly impossible, as it involves
++   cracking the car's computer, which is always hidden and running with
++   proprietary software.</p>
+
+Added: 2020-02-01
+Id: 202001290
+RT:
+PubDate: 2020-01-29
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-amazon.html surveillance
+Keywords: Ring
+Blurb: <p>The Amazon Ring app does <a
++   
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
++   surveillance for other companies as well as for Amazon</a>.</p>
+
+Added: 2020-01-20
+Id: 202001090
+RT: www-discuss 2020-01-12 (adware that is impossible to delete...)
+PubDate: 2020-01-09
+Target: proprietary-back-doors.html universal
+Target: malware-mobiles.html back-doors
+Keywords:
+Blurb: <p>Android phones subsidized by the US government come with <a
++   
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/";>
++   preinstalled adware and a back door for forcing installation of
++   apps</a>.</p>
++
++   <p>The adware is in a modified version of an
++   essential system configuration app. The back door is a
++   surreptitious addition to a program whose stated purpose is to be a <a
++   
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/";>
++   universal back door for firmware</a>.</p>
++
++   <p>In other words, a program whose raison d'être is malicious has
++   a secret secondary malicious purpose. All this is in addition to the
++   malware of Android itself.</p>
+
+Added: 2019-12-17
+Id: 201912170
+RT: www-discuss 2019-12-15 (Perhaps worth mentioning about Ring cameras)
+PubDate: 2019-12-17
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: proprietary-interference.html proprietary-interference
+Target: malware-appliances.html malware-appliances
+Target: malware-amazon.html misc
+Keywords: Ring
+Blurb: <p>Some security breakers (wrongly referred in this article as <a
++   
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
++   managed to interfere the Amazon Ring proprietary system, and <a
++   
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
++   its camera, speakers and microphones</a>.</p>
+
+Added: 2019-10-31
+Id: 201910131
+RT: www-discuss 2019-10-31 (Safari spies on users for Tencent)
+PubDate: 2019-10-13
+Target: proprietary-surveillance.html SpywareIniThings
+Target: malware-apple.html surveillance
+Keywords: macos ios
+Blurb: <p>Safari occasionally <a
++   
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
++   sends browsing data from Apple devices in China to the Tencent Safe
++   Browsing service</a>, to check URLs that possibly correspond to
++   &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
++   with the Chinese government, its Safe Browsing black list most certainly
++   contains the websites of political opponents. By linking the requests
++   originating from single IP addresses, the government can identify
++   dissenters in China and Hong Kong, thus endangering their lives.</p>
+
+Id: 200803070
+PubDate: 2008-03-07
+Target: malware-apple.html jails
+Target: proprietary-jails.html apple
+Keywords: jailbreak code signing
+Blurb: <p><a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046";>
++   iOS, the operating system of the Apple iThings, is the prototype
++   of a jail</a>.  It was Apple that introduced the practice of
++   designing general purpose computers with censorship of application
++   programs.</p>
++
++   <p>Here is an article about the <a
++   href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
++   code signing</a> that the iThings use to lock up the user.</p>
++
++   <p>Curiously, Apple is beginning to allow limited passage through the
++   walls of the iThing jail: users can now install apps built from
++   source code, provided the source code is written in Swift.  Users
++   cannot do this freely because they are required to identify
++   themselves. <a href="https://developer.apple.com/xcode/";>Here
++   are details</a>. While this is a crack in the prison walls, it is not
++   big enough to mean that the iThings are no longer jails.</p>
+
+Added: 2019-10-20
+Id: 201904080
+RT: www-discuss 2019-10-20 (Apple will make MacOS a jail)
+PubDate: 2019-04-08
+Target: malware-apple.html jails
+Target: proprietary-jails.html apple
+Keywords: MacOS notarization
+Blurb: <p>Apple plans to require that <a
++   
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/";>
++   all application software for MacOS be approved by Apple first</a>.</p>
++
++   <p>Offering a checking service as an option could be
++   useful and would not be wrong.  Requiring users to get
++   Apple's approval is tyranny. Apple says the check will
++   only look for malware (not counting the malware that is <a
++   href="/proprietary/malware-apple.html#TOC">part of
++   the operating system</a>), but Apple could change that policy step
++   by step.  Or perhaps Apple will define malware to include any app
++   that China does not like.</p>
++
++   <p>For free software, this means users will need to get Apple's
++   approval after compilation.  This amounts to a system of surveilling
++   the use of free programs.</p>
+
+Added: 2019-10-19
+Id: 201910130.1
+RT: 1440570
+PubDate: 2019-10-13
+Target: proprietary-back-doors.html universal
+Keywords:
+Blurb: <p>The Chinese Communist Party's <a
++   href="/proprietary/proprietary-surveillance.html#M201910130">
++   &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
++   
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
++   a back-door allowing developers to run any code they wish</a> in the
++   users' phone, as &ldquo;superusers.&rdquo;</p>
++
++   <p>Note: The <a
++   
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
++   Washington Post version of the article</a> (partly obfuscated, but
++   readable after copy-pasting in a text editor) includes a clarification
++   saying that the tests were only performed on the Android version
++   of the app, and that, according to Apple, &ldquo;this kind of
++   &lsquo;superuser&rsquo; surveillance could not be conducted on
++   Apple's operating system.&rdquo;</p>
+
+Added: 2019-10-19
+Id: 201910130
+RT: 1440570
+PubDate: 2019-10-13
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-apple.html surveillance
+Keywords:
+Blurb: <p>The Chinese Communist Party's &ldquo;Study
++   the Great Nation&rdquo; app requires users to grant it <a
++   
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
++   access to the phone's microphone, photos, text messages, contacts, and
++   internet history</a>, and the Android version was found to contain a
++   back-door allowing developers to run any code they wish in the users'
++   phone, as &ldquo;superusers.&rdquo; Downloading and using this
++   app is mandatory at some workplaces.</p>
++
++   <p>Note: The <a
++   
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
++   Washington Post version of the article</a> (partly obfuscated, but
++   readable after copy-pasting in a text editor) includes a clarification
++   saying that the tests were only performed on the Android version
++   of the app, and that, according to Apple, &ldquo;this kind of
++   &lsquo;superuser&rsquo; surveillance could not be conducted on
++   Apple's operating system.&rdquo;</p>
+
+Added: 2019-10-16
+Id: 201910070
+RT: www-discuss 2019-10-15 (censorship)
+PubDate: 2019-10-07
+Target: proprietary-jails.html apple-censorship
+Target: malware-apple.html jail-censorship
+Keywords:
+Blurb: <p>Apple <a
++   
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
++   censors the Taiwan flag in iOS</a> on behalf of the Chinese
++   government. When the region is set to Hong Kong, this flag is not
++   visible in the emoji selection widget but is still accessible. When the
++   region is set to mainland China, all attempts to display it will result
++   in the &ldquo;empty emoji&rdquo; icon as if the flag never existed.</p>
++
++   <p>Thus, not only does Apple use the App Store as an instrument
++   of censorship, it also uses the iThing operating system for that
++   purpose.</p>
+
+Added: 2019-10-15
+Id: 201910100
+RT: www-discuss 2019-10-10 (Apple censorship of Hong Kong protest software)
+PubDate: 2019-10-10
+Target: proprietary-jails.html apple-censorship
+Target: malware-apple.html jail-censorship
+Keywords:
+Blurb: <p>Apple has <a
++   
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism";>
++   banned the app that Hong Kong protesters use to communicate</a>.</p>
++
++   <p>Obeying the &ldquo;local laws&rdquo; about what people can do with
++   software is no excuse for censoring what software people can use.</p>
+
+Added: 2019-10-15
+Id: 201910071
+RT: www-discuss 2019-10-10 & 10-28 (subscription converts into sabotage)
+PubDate: 2019-10-07
+Target: malware-adobe.html malware-adobe
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: proprietary-subscriptions.html proprietary-subscriptions
+Keywords: Executive Order 13884
+Blurb: <p>Adobe has <a
++   
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
++   cancelled the software subscriptions of all users in
++   Venezuela</a>. This demonstrates how a requirement for subscription can be
++   turned into a tool for sabotage.</p>
+
+Added: 2019-10-04
+Id: 201908270
+RT: www-discuss 2019-10-03 (Google Play app ... executed secret payloads)
+PubDate: 2019-08-27
+Target: proprietary-back-doors.html install-delete
+Target: malware-mobiles.html back-doors
+Keywords: trojan dropper
+Blurb: <p>A very popular app found in the
++   Google Play store contained a module that was designed to <a
++   
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
++   install malware on the user's computer</a>. The app developers
++   regularly used it to make the computer download and execute any code
++   they wanted.</p>
++
++   <p>This is a concrete example of what users are exposed to when they
++   run nonfree apps. They can never be completely sure that a nonfree
++   app is safe.</p>
+
+Added: 2019-10-03
+Id: 201708310
+RT: www-discuss 2019-10-02 (operating system tethers)
+PubDate: 2017-08-31
+Target: proprietary-tethers.html proprietary-tethers
+Target: malware-microsoft.html tethers
+Keywords:
+Blurb: <p>The recent versions of Microsoft Office require the user to <a
++   
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
++   connect to Microsoft servers at least every thirty-one
++   days</a>. Otherwise, the software will refuse to edit any documents
++   or create new ones. It will be restricted to viewing and printing.</p>
+
+Added: 2019-10-03
+Id: 201909091
+RT: www-discuss 2019-10-02 (Facebook app location tracking)
+PubDate: 2019-09-09
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>The Facebook app <a
++   
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
++   tracks users even when it is turned off</a>, after tricking them
++   into giving the app broad permissions in order to use one of its
++   functionalities.</p>
+
+Added: 2019-09-18
+Id: 201909090
+RT: www-discuss 2019-09-18 (Malicious menstruation apps)
+PubDate: 2019-09-09
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords: facebook SDK femtech
+Blurb: <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
++   
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
++   send intimate details of users' lives to Facebook</a>.</p>
+
+Added: 2019-09-16
+Id: 201909160
+RT: www-discuss ("What should we call this?" 2019-09-16)
+PubDate: 2019-09-16
+Target: malware-cars.html malware-cars
+Target: proprietary-sabotage.html proprietary-sabotage
+Keywords: Tesla
+Blurb: <p>Tesla users claim Tesla <a
++   
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>force-installed
++   software to cut down on battery range</a>, rather than replace the
++   defective batteries. Tesla did this to avoid having to run their
++   warranty.</p>
++
++   <p>This means that proprietary software can potentially be a way to
++   commit perjury with impunity.</p>
+
+Added: 2019-09-11
+Id: 201908220
+RT: 2019-09-11 (Universal back door in ChromeOS)
+PubDate: 2019-08-22
+Target: proprietary-obsolescence.html proprietary-obsolescence
+Target: proprietary-back-doors.html universal
+Target: malware-google.html back-doors
+Keywords:
+Blurb: <p>ChromeBooks are programmed for obsolescence:
++   ChromeOS has a universal back door that is used for updates and <a
++   
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
++   ceases to operate at a predefined date</a>. From then on, there
++   appears to be no support whatsoever for the computer.</p>
++
++   <p>In other words, when you stop getting screwed by the back door,
++   you start getting screwed by the obsolescence.</p>
+
+Added: 2019-09-11
+Id: 201908210
+RT: www-discuss 2019-09-11 (Xbox as listening devices)
+PubDate: 2019-08-21
+Target: proprietary-surveillance.html SpywareInGames
+Target: malware-games.html malware-games
+Target: malware-microsoft.html surveillance
+Keywords: cortana
+Blurb: <p>Microsoft recorded users of Xboxes and had <a
++   
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
++   human workers listen to the recordings</a>.</p>
++
++   <p>Morally, we see no difference between having human workers listen and
++   having speech-recognition systems listen.  Both intrude on privacy.</p>
+
+Added: 2019-09-10
+Id: 201908310
+RT: www-discuss 2019-09-08 (Apple insecurity)
+PubDate: 2019-08-31
+Target: malware-apple.html insecurity
+Target: proprietary-insecurity.html proprietary-insecurity
+Keywords: apple ios insecurity
+Blurb: <p>A series of vulnerabilities <a
++   
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
++   in iOS allowed attackers to gain access to sensitive information
++   including private messages, passwords, photos and contacts stored on
++   the user's iMonster</a>.</p>
++
++   <p>The deep insecurity of iMonsters is even more pertinent given that
++   Apple's proprietary software makes users totally dependent on Apple
++   for even a modicum of security.  It also means that the devices do
++   not even try to offer security against Apple itself.</p>
+
+Added: 2019-09-10
+Id: 201909060
+RT: ww-discuss 2019-09-08 (proprietary surveillance)
+PubDate: 2019-09-10
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Keeping track of who downloads a proprietary
++   program is a form of surveillance.  There is a
++   proprietary program for adjusting a certain telescopic rifle sight. <a
++   
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>
++   A US prosecutor has demanded the list of all the 10,000 or more people
++   who have installed it</a>.</p>
++
++   <p>With a free program there would not be a list of who has installed
++   it.</p>
+
+Added: 2019-08-31
 Id: 201908160
 RT: www-discuss 2019-08-07
-PubDate: 2019-08-16
+PubDate: 2019-08-31
 Target: proprietary-fraud.html proprietary-fraud
 Keywords: Facebook encourages spending
 Blurb: <p>A game published on Facebook <a
 +   
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
-+   at leading children to spend</a> large amounts of their parents' money 
without
-+   explaining it to them.</p>
++   at leading children to spend</a> large amounts of their parents'
++   money without explaining it to them.</p>
+
+Added: 2019-08-23
+Id: 201908130
+RT: www-discuss 2019-08-17 (sabotage?)
+PubDate: 2019-08-13
+Target: malware-apple.html sabotage
+Target: proprietary-sabotage.html proprietary-sabotage
+Keywords: apple
+Blurb: <p>When Apple suspects a user of fraud, it
++   judges the case secretly and presents the verdict
++   as a fait accompli.  The punishment to a user found guilty <a
++   
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/";>is
++   being cut off for life, which more-or-less cripples the user's Apple
++   devices forever</a>.  There is no appeal.</p>
 
 Added: 2019-08-15
 Id: 201908151
@@ -69,7 +1093,7 @@
 Keywords: iPhone batteries
 Blurb: <p>Apple is putting DRM on iPhone
 +   batteries, and the system proprietary software <a
-+   
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>turns
++   
href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>turns
 +   off certain features when batteries are replaced other than by
 +   Apple.</a></p>
 
@@ -87,9 +1111,9 @@
 +   permissions or contained advertising trackers, with seven being more
 +   risky than the average of the 100 most popular Android apps.</p>
 +
-+   <p>Note that the article refers to these proprietary apps as
++   <p><small>(Note that the article refers to these proprietary apps as
 +   &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-+   instead.</p>
++   instead.)</small></p>
 
 Added: 2019-08-03
 Id: 201907081
@@ -194,61 +1218,16 @@
 Target: proprietary-addictions.html proprietary-addictions
 Target: malware-games.html malware-games
 Keywords:
-Blurb: <p>Cash of Clans is a good example of a gratis mobile game that its
+Blurb: <p>Clash of Clans is a good example of a gratis mobile game that its
 +   developers <a href="https://gamerant.com/clash-of-clans-addiction/";>
 +   made very addictive</a> for a large proportion of its users&mdash;and
 +   turned into a cash machine for themselves&mdash;by using <a
 +   href="/proprietary/proprietary-addictions.html#addictiveness">
 +   psychological manipulation techniques</a>.</p>
 +
-+   <p>The article uses &ldquo;free&rdquo; to mean &ldquo;zero
++   <p><small>(The article uses &ldquo;free&rdquo; to mean &ldquo;zero
 +   price,&rdquo; which is a usage we should avoid. We recommend saying
-+   &ldquo;gratis&rdquo; instead.</p>
-
-Added: 2019-06-30
-Id: 209800000.1
-RT: www-discuss 2019-06-28 (Article)
-PubDate: 2015-01-00
-Target: proprietary-addictions.html proprietary-addictions
-Keywords: addictiveness infographic
-Blurb: <p>The developers of gratis mobile games apply the <a
-+   href="#addictiveness">techniques described above</a> to <a
-+   href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
-+   turn their products into slot machines</a>. This is clearly described
-+   in an infographic.</p>
-+
-+   <p>The revenue generated by these games is directly related to the
-+   number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-+   to the amount of money they are willing to spend. Thus developers
-+   carefully study the behavior of millions of users to increase the
-+   addictiveness of their games.</p>
-+
-+   <p>Unfortunately, the article uses &ldquo;free&rdquo; to mean
-+   &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-+   instead.</p>
-
-Added: 2019-06-30
-Id: 209800000
-RT: www-discuss 2019-06-28 (Article)
-PubDate: 2015-01-00
-Target: malware-games.html malware-games
-Keywords: addictiveness infographic
-Blurb: <p>The developers of gratis mobile games apply <a
-+   href="/proprietary/proprietary-addictions.html#addictiveness">
-+   behavioral manipulation techniques</a> to <a
-+   href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
-+   turn their products into slot machines</a>. This is clearly described
-+   in an infographic.</p>
-+
-+   <p>The revenue generated by these games is directly related to the
-+   number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
-+   to the amount of money they are willing to spend. Thus developers
-+   carefully study the behavior of millions of users to increase the
-+   addictiveness of their games.</p>
-+
-+   <p>Unfortunately, the article uses &ldquo;free&rdquo; to mean
-+   &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
-+   instead.</p>
++   &ldquo;gratis&rdquo; instead.)</small></p>
 
 Added: 2019-06-27
 Id: 201906220
@@ -270,6 +1249,14 @@
 +   href="/software/icecat/">IceCat</a>, a modified version of Firefox
 +   with several changes to protect users' privacy.</p>
 
+Id: 209900001.1
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>See above for the general universal back door in essentially
++   all mobile phones, which permits converting them into <a
++   class="not-a-duplicate" href="#universal-back-door-phone-modem">
++   full-time listening devices</a>.</p>
+
 Id: 209900001
 Target: malware-mobiles.html back-doors
 Keywords:
@@ -287,7 +1274,7 @@
 Keywords: trackers
 Blurb: <p>In spite of Apple's supposed commitment to
 +   privacy, iPhone apps contain trackers that are busy at night <a
-+   
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/";>
++   
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html";>
 +   sending users' personal information to third parties</a>.</p>
 +
 +   <p>The article mentions specific examples: Microsoft OneDrive,
@@ -307,7 +1294,7 @@
 Target: proprietary-surveillance.html SpywareInMobileApps
 Target: proprietary-manipulation.html proprietary-manipulation
 Target: malware-mobiles.html manipulation
-Keywords:
+Keywords: femtech
 Blurb: <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
 +   
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
 +   tool for propaganda</a> by natalist Christians.  It spreads distrust
@@ -347,9 +1334,9 @@
 Id: 201905150
 RT: www-discuss 2019-05-17 (proprietary-insecurity)
 PubDate: 2019-05-15
-Target: proprietary-jails.html apple
+Target: proprietary-jails.html apple-censorship
 Target: proprietary-insecurity.html proprietary-insecurity
-Target: malware-apple.html jails
+Target: malware-apple.html jail-censorship
 Keywords:
 Blurb: <p>Users caught in the jail of an iMonster are <a
 +   href="https://boingboing.net/2019/05/15/brittle-security.html";> sitting
@@ -475,7 +1462,7 @@
 +   free-software app that does more or less the same thing without
 +   spying on you is available from <a
 +   href="https://search.f-droid.org/?q=menstr";>F-Droid</a>, and <a
-+   
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast";>
++   
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f";>
 +   a new one is being developed</a>.</p>
 
 Added: 2019-04-21
@@ -492,7 +1479,7 @@
 +   force-installing a &ldquo;remediation&rdquo;
 +   program</a> on computers running certain
 +   versions of Windows 10. Remediation, in Microsoft's view, means <a
-+   
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>
++   
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909";>
 +   tampering with users' settings and files</a>, notably to
 +   &ldquo;repair&rdquo; any components of the updating system that users
 +   may have intentionally disabled, and thus regain full power over
@@ -554,7 +1541,7 @@
 Target: malware-google.html surveillance
 Keywords: sensorvault
 Blurb: <p>Google tracks the movements of Android phones and iPhones
-+   running Goggle apps, and sometimes <a
++   running Google apps, and sometimes <a
 +   
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
 +   saves the data for years</a>.</p>
 +
@@ -678,7 +1665,7 @@
 Target: malware-mobiles.html surveillance
 Keywords: health medical
 Blurb: <p>A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a
-+   
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
++   
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
 +   send sensitive personal data to third parties</a>, which can use it
 +   for invasive advertising or discriminating against people in poor
 +   medical condition.</p>
@@ -741,9 +1728,9 @@
 +   turn the Oculus Rift sensors into spy cameras</a> after breaking into
 +   the computer they are connected to.</p>
 +
-+   <p>Unfortunately, the article <a
-+   href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
-+   as &ldquo;hackers&rdquo;</a>.</p>
++   <p><small>(Unfortunately, the article <a
++   href="/philosophy/words-to-avoid.html#Hacker">improperly refers
++   to crackers as &ldquo;hackers&rdquo;</a>.)</small></p>
 
 Added: 2019-03-13
 Id: 201811300
@@ -795,61 +1782,6 @@
 +   is also deceptive, as it uses confusing menus and complex stats to
 +   obfuscate true monetary costs.</p>
 
-Added: 2019-03-07
-Id: 209900000
-RT: 1340721
-PubDate: 2010-03-08
-Target: malware-games.html malware-games
-Target: proprietary-addictions.html proprietary-addictions
-Keywords:
-Blurb: <p id="addictiveness">Many games are designed to
-+   keep gamers compulsively playing&mdash;and renewing
-+   their subscription. To achieve this result, developers use <a
-+   
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html";>
-+   techniques that derive from behavioral and brain research</a>:</p>
-+
-+   <dl class="compact"><dt>The Skinner Box</dt>
-+     <dd>An environment in which the user is trained
-+     to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-+     over again in order to get a reward.</dd>
-+
-+     <dt>Virtual food pellets</dt>
-+     <dd>Items that have nothing to do with the game itself, but are
-+     valuable to gamers because of the work required to obtain them
-+     (e.g., EverQuest); some people will end up collecting them for the
-+     sake of collecting.</dd>
-+
-+     <dt>Random rewards</dt>
-+     <dd>They turn the game into the equivalent of a slot machine (e.g.,
-+     World of Warcraft, ZT Online).</dd>
-+
-+     <dt>Elaborate cycles</dt>
-+     <dd>Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-+     (progress from one level to the next) slower and slower, designing
-+     complex tasks that are difficult to get out of (e.g. World of
-+     Warcraft), or conversely dividing them up in small chunks to avoid
-+     frustration (e.g., New Super Mario Bros.Wii).</dd>
-+
-+     <dt>Decay of game assets</dt>
-+     <dd>This makes it necessary for a gamer to keep playing, without
-+     vacations, simply to avoid losing what they have earned so far
-+     (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
-+   </dl>
-+
-+   <p>Games such as World of Warcraft, which are considered very addictive,
-+   use several of these techniques.</p>
-+
-+   <p>However, the addictiveness of a game is only one of the determinants
-+   of addiction. Equally important are the psychological make-up and life
-+   circumstances of the gamer. Gaming addiction, like other addictions,
-+   is a form of mental escape from an unrewarding life. The sad truth
-+   is that, in the long run, it leads to an even worse life.</p>
-+
-+   <p><em>Note:</em>&nbsp; We are not gamers. If you think we
-+   have misunderstood some point, or have suggestions for making
-+   this text clearer or more correct, please send them to &lt;<a
-+   href="mailto:webmasters@gnu.org";>webmasters@gnu.org</a>&gt;.</p>
-
 Added: 2019-03-04
 Id: 201902270
 RT: 1365737
@@ -860,11 +1792,12 @@
 Keywords: ring
 Blurb: <p>The Ring (now Amazon) doorbell camera is designed so that the
 +   manufacturer (now Amazon) can watch all the time. Now it turns out
-+   that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
++   that <a
++   
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
 +   anyone else can also watch, and fake videos too</a>.</p>
 +
 +   <p>The third party vulnerability is presumably
-+   unintentional and I suppose Amazon will fix it. I
++   unintentional and Amazon will probably fix it. However, we
 +   do not expect Amazon to change the design that <a
 +   href="/proprietary/proprietary-surveillance.html#M201901100">allows
 +   Amazon to watch</a>.</p>
@@ -931,28 +1864,6 @@
 +   restrictions in the use of ink cartridges that would otherwise be in
 +   working order.</p>
 
-Added: 2019-02-23
-Id: 201902220
-RT: 1362789
-PubDate: 2019-02-22
-Target: proprietary-addictions.html proprietary-addictions
-Keywords:
-Blurb: <p>On-line gambling services (and their nonfree
-+   client programs) are <a
-+   
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds";>
-+   designed to be addictive</a>, much like on-line games. They achieve 
-+   this with various different malfunctionalities, often in combination.</p>
-+
-+   <p>Many of these malfunctionalities are implemented by the server and
-+   the client program together. In some cases, there is no honest way that
-+   the client program could counteract the nastiness&mdash;for instance,
-+   when the server manipulates amounts won in order to get the user
-+   addicted, the only way the client program could block that is to pretend
-+   the win did not happen, and users would not want that modification.</p>
-+
-+   <p>However, modification of the client program could cover up some
-+   addictive behaviors without losing the user anything.</p>
-
 Added: 2019-02-22
 Id: 201901070
 RT: www-discuss 2019-02-21 ("smart" TVs that spy)
@@ -1002,7 +1913,7 @@
 Keywords:  beauty camera app
 Blurb: <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
 +   be on Google Play had one or more malicious functionalities, such as <a
-+   
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923";>
++   
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
 +   stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>,
 +   pushing unwanted and often malicious ads on users, and redirecting
 +   them to phishing sites that stole their credentials. Furthermore,
@@ -1022,7 +1933,7 @@
 Keywords: beauty camera app
 Blurb: <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
 +   be on Google Play had one or more malicious functionalities, such as <a
-+   
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923";>
++   
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
 +   stealing users' photos</a> instead of &ldquo;beautifying&rdquo; them,
 +   pushing unwanted and often malicious ads on users, and redirecting
 +   them to phishing sites that stole their credentials. Furthermore,
@@ -1087,9 +1998,9 @@
 +   href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
 +   the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 +
-+   <p>It is unfortunate that these articles talk about &ldquo;free
++   <p><small>(It is unfortunate that these articles talk about &ldquo;free
 +   apps.&rdquo; These apps are gratis, but they are <em>not</em> <a
-+   href="/philosophy/free-sw.html">free software</a>.</p>
++   href="/philosophy/free-sw.html">free software</a>.)</small></p>
 
 Added: 2019-02-07
 Id: 201902040
@@ -1261,12 +2172,12 @@
 +   being sued, demanding that it notify the users of what it will do
 +   with the data.</p>
 +
-+   <p>I think that lawsuit is about a side issue. What the company does
++   <p>We think that lawsuit is about a side issue. What the company does
 +   with the data is a secondary issue. The principal wrong here is that
 +   the company gets that data at all.</p>
 +
 +   <p><a
-+   
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps";>
++   
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps";>
 +   Other weather apps</a>, including Accuweather and WeatherBug, are
 +   tracking people's locations.</p> 
 
@@ -1417,7 +2328,7 @@
 Blurb: <p>Printer manufacturers are very innovative&mdash;at blocking the
 +   use of independent replacement ink cartridges. Their &ldquo;security
 +   upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a
-+   
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
++   
href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
 +   HP and Epson have done this</a>.</p>
 
 Id: 201502100
@@ -1481,10 +2392,12 @@
 +   
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
 +   inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
 +   type of malware hijacks the computer's processor to mine a
-+   cryptocurrency. (Note that the article refers to the infected software
++   cryptocurrency.</p>
++
++   <p><small>(Note that the article refers to the infected software
 +   as &ldquo;content management system&rdquo;. A better term would be
 +   &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
-+   revision system</a>&rdquo;.)</p>
++   revision system</a>&rdquo;.)</small></p>
 +
 +   <p>Since the miner was a nonfree JavaScript program,
 +   visitors wouldn't have been affected if they had used <a
@@ -1563,7 +2476,7 @@
 PubDate: 2018-09-07
 Keywords:
 Blurb: <p>Adware Doctor, an ad blocker for MacOS, <a
-+   
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
++   
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
 +   the user's browsing history</a>.</p>
 
 Id: 201808120
@@ -1581,9 +2494,9 @@
 +   told Amazon to do this, or cease to sell the product in that country,
 +   do you think Amazon would have the moral fiber to say no?</p>
 + 
-+   <p>These crackers are probably hackers too, but please <a
++   <p><small>(These crackers are probably hackers too, but please <a
 +   href="https://stallman.org/articles/on-hacking.html";> don't use
-+   &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
++   &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
 
 Id: 201808030
 Target: malware-google.html surveillance
@@ -1641,7 +2554,7 @@
 +   the existing trackers stopped working forever</a>.</p>
 + 
 +   <p>The article focuses on a further nasty fillip, that sales of the
-+   broken devices continued. But I think that is a secondary issue;
++   broken devices continued. But we think that is a secondary issue;
 +   it made the nasty consequences extend to some additional people.
 +   The fundamental wrong was to design the devices to depend on something
 +   else that didn't respect users' freedom.</p>
@@ -1692,8 +2605,8 @@
 + 
 +   <p>This makes them act as spies for licensing enforcement.</p>
 + 
-+   <p>I expect it implements DRM, too&mdash;that there is no way to save
-+   a recording. But I can't be sure from the article.</p>
++   <p>We expect it implements DRM, too&mdash;that there is no way to save
++   a recording. But we can't be sure from the article.</p>
 + 
 +   <p>If you learn to care much less about sports, you will benefit in
 +   many ways. This is one more.</p>
@@ -1978,7 +2891,7 @@
 PubDate: 2017-11-23
 Keywords: ai
 Blurb: <p>AI-powered driving apps can <a
-+   
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
++   
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
 +   track your every move</a>.</p>
 
 Id: 201711210
@@ -2065,7 +2978,7 @@
 PubDate: 2017-11-01
 Keywords: sony aibo
 Blurb: <p>Sony has brought back its robotic pet Aibo, this time <a
-+   
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
++   
href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
 +   with a universal back door, and tethered to a server that requires
 +   a subscription</a>.</p>
 
@@ -2087,13 +3000,13 @@
 +   
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
 +   &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
 +   engineers to access, among other things, registry keys <a
-+   href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
-+   can contain sensitive information like administrator's login
++   
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
++   which can contain sensitive information like administrator's login
 +   password</a>.</p>
 
 Id: 201710130
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2017-10-13
 Keywords: censorship
 Blurb: <p>Apple is <a
@@ -2101,7 +3014,7 @@
 +   censoring apps for the US government too</a>. Specifically, it is
 +   deleting apps developed by Iranians.</p>
 + 
-+   <p>The root of these wrongs are in Apple. If Apple had not designed
++   <p>The root of these wrongs is in Apple. If Apple had not designed
 +   the iMonsters to let Apple censor applications, Apple would not have
 +   had the power to stop users from installing whatever kind of apps.</p>
 
@@ -2182,9 +3095,9 @@
 +   
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
 +   its security has been cracked</a>.</p>
 + 
-+   <p>Note that this article misuses the term <a
++   <p><small>(Note that this article misuses the term <a
 +   href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
-+   referring to crackers.</p>
++   referring to crackers.)</small></p>
 
 Id: 201709090.1
 Target: proprietary-back-doors.html universal
@@ -2223,8 +3136,8 @@
 + 
 +   <p>Don't be a sucker&mdash;reject all the stings.</p>
 + 
-+   <p>It is unfortunate that the article uses the term <a
-+   
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
++   <p><small>(It is unfortunate that the article uses the term <a
++   
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
 
 Id: 201708270
 Target: proprietary-surveillance.html SpywareInMobileApps
@@ -2234,9 +3147,11 @@
 Blurb: <p>The Sarahah app <a
 +   
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
 +   uploads all phone numbers and email addresses</a> in user's address
-+   book to developer's server.  Note that this article misuses the words
++   book to developer's server.</p>
++
++   <p><small>(Note that this article misuses the words
 +   &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
-+   referring to zero price.</p>
++   referring to zero price.)</small></p>
 
 Id: 201708230
 Target: proprietary-sabotage.html proprietary-sabotage
@@ -2273,8 +3188,8 @@
 +   on you</a>.</p>
 
 Id: 201707290
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2017-07-29
 Keywords: censorship
 Blurb: <p>Apple <a
@@ -2380,7 +3295,7 @@
 +   
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
 +   upgrade to Windows 10 Pro</a>. The successor of Windows
 +   10 S is a special configuration of Windows 10 called <a
-+   
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
++   
href="https://support.microsoft.com/en-us/windows/windows-10-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85";>
 +   S mode</a>. The major difference with Windows 10 S is that there is
 +   an easy way to switch out of S mode.</p>
 
@@ -2546,7 +3461,7 @@
 Target: malware-amazon.html drm
 PubDate: 2017-04-13
 Keywords:
-Blurb: <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
+Blurb: <p><a href="https://itstillworks.com/kindle-drm-17841.html";>
 +   The Amazon Kindle has DRM</a>.  That article is flawed in that it
 +   fails to treat DRM as an ethical question; it takes for granted that
 +   whatever Amazon might do to its users is legitimate.  It refers to
@@ -2558,7 +3473,7 @@
 Target: proprietary-drm.html proprietary-drm
 PubDate: 2017-04-13
 Keywords:
-Blurb: <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
+Blurb: <p><a href="https://itstillworks.com/kindle-drm-17841.html";>
 +   The Amazon Kindle has DRM</a>.  That article is flawed in that it
 +   fails to treat DRM as an ethical question; it takes for granted that
 +   whatever Amazon might do to its users is legitimate.  It refers to
@@ -2622,14 +3537,14 @@
 Keywords: drm
 Blurb: <p id="iphone7-sabotage">The
 +   iPhone 7 contains DRM specifically designed to <a
-+   
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
++   
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
 +   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
 +   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 + 
-+   <p>The article uses the term &ldquo;lock&rdquo;
++   <p><small>(The article uses the term &ldquo;lock&rdquo;
 +   to describe the DRM, but we prefer to use the term <a
 +   href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
-+   handcuffs</a>.</p>
++   handcuffs</a>.)</small></p>
 
 Id: 201704050
 Target: malware-mobiles.html insecurity
@@ -2667,7 +3582,7 @@
 Keywords: miele
 Blurb: <p>When Miele's Internet of
 +   Stings hospital disinfectant dishwasher is <a
-+   
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
++   
href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
 +   connected to the Internet, its security is crap</a>.</p>
 + 
 +   <p>For example, a cracker can gain access to the dishwasher's
@@ -2744,7 +3659,7 @@
 Blurb: <p>&ldquo;CloudPets&rdquo; toys with microphones <a
 +   
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
 +   leak childrens' conversations to the manufacturer</a>. Guess what? <a
-+   
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
++   
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
 +   Crackers found a way to access the data</a> collected by the
 +   manufacturer's snooping.</p>
 + 
@@ -2830,7 +3745,7 @@
 +   part of it.</p>
 + 
 +   <p><a
-+   href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430";>More
++   
href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430";>More
 +   information</a>.</p>
 
 Id: 201701270
@@ -2894,8 +3809,8 @@
 +   alters Chrome</a>.</p>
 
 Id: 201701064
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2017-01-06
 Keywords: apps censorship
 Blurb: <p>Apple used its censorship system to enforce Russian surveillance <a
@@ -2922,8 +3837,8 @@
 +   to the page, and makes the page's URL available to Facebook</a>.</p>
 
 Id: 201701050
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2017-01-05
 Keywords: apps censorship
 Blurb: <p>Apple used its censorship system to enforce China's censorship <a
@@ -3255,7 +4170,7 @@
 +   any change whatsoever can be imposed on the users</a>.</p>
 + 
 +   <p>This was <a
-+   href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
++   
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
 +   reported in 2007</a> for XP and Vista, and it seems
 +   that Microsoft used the same method to push the <a
 +   href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -3344,7 +4259,7 @@
 PubDate: 2016-07-28
 Keywords: macos
 Blurb: <p>The Dropbox app for Macintosh <a
-+   
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
++   
href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
 +   takes control of user interface items after luring the user into
 +   entering an admin password</a>.</p>
 
@@ -3521,7 +4436,7 @@
 PubDate: 2016-05-31
 Keywords: facebook
 Blurb: <p>Facebook's app listens all the time, <a
-+   
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html";>to
++   
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html";>to
 +   snoop on what people are listening to or watching</a>. In addition,
 +   it may be analyzing people's conversations to serve them with targeted
 +   advertisements.</p>
@@ -3532,12 +4447,12 @@
 PubDate: 2016-05-20
 Keywords: oculus virtual-reality
 Blurb: <p>Oculus Rift games now have <a
-+   
href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform";>
++   
href="https://www.vice.com/en/article/vv77ea/new-oculus-drm-cross-platform";>
 +   DRM meant to prevent running them on other systems</a>.</p>
 
 Id: 201605190
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2016-05-19
 Keywords: games censorship
 Blurb: <p>Apple censors games, <a
@@ -3546,26 +4461,6 @@
 +   political points they suggest. Some political points are apparently
 +   considered acceptable.</p>
 
-Id: 201605150.1
-Target: malware-google.html sabotage
-Target: proprietary-sabotage.html proprietary-sabotage
-Target: proprietary-obsolescence.html proprietary-obsolescence
-PubDate: 2019-08-31
-Keywords: revolv
-Blurb: <p>Revolv is an IoT device which managed &ldquo;smart
-+   home&rdquo; operations: switching the lights, operate motion sensors,
-+   regulating temperature, etc. On May 15th, 2016, Google/Alphabet <a
-+   
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
-+   broke it</a> by shutting down the server.</p>
-+   
-+   <p>Although you may own the device, its functioning depended on the
-+   server that never belonged to you. So you never really had control of
-+   it. This unjust design is called <a
-+   href="/philosophy/network-services-arent-free-or-nonfree.html">Service
-+   as a Software Substitute (SaaSS)</a>. That is what gave the company
-+   the power to convert it into a $300 out-of-warranty brick, for your
-+   &ldquo;dumb home&rdquo;.</p>
-
 Id: 201605044
 Target: malware-apple.html incompatibility
 Target: proprietary-incompatibility.html proprietary-incompatibility
@@ -3647,6 +4542,28 @@
 +   by watching people through the camera, nor through malware in the
 +   camera.</p>
 
+Id: 201604050
+Target: malware-google.html sabotage
+Target: malware-appliances.html malware-appliances
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: proprietary-obsolescence.html proprietary-obsolescence
+Target: proprietary-tethers.html proprietary-tethers
+PubDate: 2016-04-05
+Keywords: revolv
+Blurb: <p>Revolv is a device that managed &ldquo;smart home&rdquo;
++   operations: switching lights, operate motion sensors, regulating
++   temperature, etc.  Its proprietary software depends on a remote server
++   to do these tasks.  On May 15th, 2016, Google/Alphabet <a
++   
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
++   broke it by shutting down the server</a>.</p>
++
++   <p>If it were free software, users would have the ability to make it
++   work again, differently, and then have a freedom-respecting home
++   instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
++   control your devices and turn them into $300 out-of-warranty
++   bricks. Insist on self-contained computers that run free software!</p>
+
+
 Id: 201603220
 Target: proprietary-surveillance.html SpywareInCameras
 Target: malware-appliances.html malware-appliances
@@ -3889,7 +4806,7 @@
 PubDate: 2015-12-26
 Keywords: ithings
 Blurb: <p><a
-+   
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
++   
href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
 +   Apple uses DRM software to prevent people from charging an iThing
 +   with a generic USB cable</a>.</p>
 
@@ -4088,7 +5005,7 @@
 Target: malware-mobiles.html surveillance
 PubDate: 2015-10-30
 Keywords:
-Blurb: <p>More than 73% and 47% of mobile applications, from Android and iOS
+Blurb: <p>More than 73% and 47% of mobile applications, for Android and iOS
 +   respectively <a href="https://techscience.org/a/2015103001/";>share
 +   personal, behavioral and location information</a> of their users with
 +   third parties.</p>
@@ -4132,7 +5049,7 @@
 Blurb: <p>&ldquo;Self-encrypting&rdquo; disk drives
 +   do the encryption with proprietary firmware so you
 +   can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives <a
-+   
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
++   
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
 +   have a back door</a>.</p>
 
 Id: 201510050
@@ -4161,8 +5078,8 @@
 +   of trouble.</p>
 
 Id: 201509290
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2015-09-29
 Keywords: ithings censorship
 Blurb: <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
@@ -4200,8 +5117,8 @@
 +   
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
 
 Id: 201509230
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2015-09-23
 Keywords: censorship
 Blurb: <p>As of 2015, Apple <a
@@ -4348,10 +5265,10 @@
 +   could track the car, start or stop the engine, and activate or
 +   deactivate the brakes, and more.</p>
 + 
-+   <p>I expect that Chrysler and the NSA can do this too.</p>
++   <p>We expect that Chrysler and the NSA can do this too.</p>
 + 
-+   <p>If I ever own a car, and it contains a portable phone, I will
-+   deactivate that.</p>
++   <p>If you own a car that contains a phone modem, it would be a good
++   idea to deactivate this.</p>
 
 Id: 201507150
 Target: proprietary-subscriptions.html proprietary-subscriptions
@@ -4380,8 +5297,8 @@
 PubDate: 2015-06-26
 Keywords: android
 Blurb: <p><a
-+   
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";>A
-+   study in 2015</a> found that 90% of the top-ranked gratis proprietary
++   
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf";>
++   A study in 2015</a> found that 90% of the top-ranked gratis proprietary
 +   Android apps contained recognizable tracking libraries. For the paid
 +   proprietary apps, it was only 60%.</p>
 + 
@@ -4401,8 +5318,8 @@
 +   Yahoo</a> unless the user intervenes to stop it.</p>
 
 Id: 201506250
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2015-06-25
 Keywords: apps censorship
 Blurb: <p>Apple has banned iThing
@@ -4436,7 +5353,7 @@
 Blurb: <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
 +   to overtly impose a &ldquo;right&rdquo; to look at
 +   users' files at any time. Windows 10 full disk encryption <a
-+   
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
++   
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/";>
 +   gives Microsoft a key</a>.</p>
 + 
 +   <p>Thus, Windows is overt malware in regard to surveillance, as in
@@ -4555,12 +5472,12 @@
 PubDate: 2015-03-26
 Keywords: windows
 Blurb: <p><a
-+   
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
++   
href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html";>Microsoft
 +   cut off security fixes for Windows XP, except to some big users that
 +   pay exorbitantly</a>.</p>
 + 
 +   <p>Microsoft is going to <a
-+   
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
++   
href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
 +   cut off support for some Internet Explorer versions</a> in the same
 +   way.</p>
 + 
@@ -4632,8 +5549,8 @@
 +   to introduce another? Because this one is controlled by Coolpad.</p>
 
 Id: 201412110
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2014-12-11
 Keywords: censorship
 Blurb: <p><a
@@ -4749,7 +5666,7 @@
 Keywords: surveillance adobe e-readers
 Blurb: <p>Adobe made &ldquo;Digital Editions,&rdquo;
 +   the e-reader used by most US libraries, spy on the user <a
-+   
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>for
++   
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>for
 +   the sake of DRM.</a></p>
 
 Id: 201410080
@@ -4759,7 +5676,7 @@
 Keywords: drm
 Blurb: <p>Adobe made &ldquo;Digital Editions,&rdquo;
 +   the e-reader used by most US libraries, <a
-+   
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
++   
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
 +   send lots of data to Adobe</a>.  Adobe's &ldquo;excuse&rdquo;: it's
 +   needed to check DRM!</p>
 
@@ -4855,8 +5772,8 @@
 +   too</a>.</p>
 
 Id: 201405250
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2014-02-07
 PubDate: 2014-05-25
 Keywords: apps censorship
@@ -4987,14 +5904,14 @@
 +   When a program proprietary, and even malware, don't get distracted
 +   by the secondary issues like price.</p>
 + 
-+   <p>Please don't repeat the marketing term &ldquo;Creative
++   <p><small>(Please don't repeat the marketing term &ldquo;Creative
 +   Cloud&rdquo; except to express revulsion for it.  The <a
 +   href="/philosophy/words-to-avoid.html#CloudComputing"> term
-+   &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.</p>
++   &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.)</small></p>
 
 Id: 201402070
-Target: malware-apple.html jails
-Target: proprietary-jails.html apple
+Target: malware-apple.html jail-censorship
+Target: proprietary-jails.html apple-censorship
 PubDate: 2014-02-07
 Keywords: censorship
 Blurb: <p>Apple rejected an app that displayed the locations
@@ -5206,7 +6123,7 @@
 Id: 201310070
 Target: proprietary-drm.html proprietary-drm
 Target: malware-appliances.html malware-appliances
-PubDate: 2013-10-07
+PubDate: 2013-09
 Keywords: dvd bluray
 Blurb: <p id="bluray"><a
 +   
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
@@ -5320,7 +6237,7 @@
 +   Journal (in an article blocked from us by a paywall) reports that <a
 +   
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
 +   the FBI can remotely activate the GPS and microphone in Android phones
-+   and laptops</a>.  (I suspect this means Windows laptops.)  Here is <a
++   and laptops</a> (presumably Windows laptops).  Here is <a
 +   href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
 
 Id: 201307300
@@ -5398,6 +6315,7 @@
 Id: 201307110
 Target: proprietary-surveillance.html SpywareInSkype
 Target: malware-microsoft.html surveillance
+PubDate: 2013-06-20
 PubDate: 2013-07-11
 Keywords:
 Blurb: <p>Skype contains <a
@@ -5435,7 +6353,7 @@
 Id: 201306220
 Target: proprietary-sabotage.html proprietary-sabotage
 Target: malware-microsoft.html sabotage
-PubDate: 2013-06-22
+PubDate: 2013-06-17
 Keywords: windows
 Blurb: <p><a
 +   
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
@@ -5475,19 +6393,19 @@
 + 
 +   <p>Once there was a problem with the servers
 +   that these programs use to check who has paid, and <a
-+   
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
++   
href="https://web.archive.org/web/20150120010845/http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
 +   the applications refused to work for anyone</a>.</p>
 
 Id: 201304080
 Target: malware-google.html tyrants
 Target: proprietary-tyrants.html proprietary-tyrants
 PubDate: 2013-04-08
+PubDate: 2019-
 Keywords: android
 Blurb: <p>Motorola, then owned by Google, made <a
 +   
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
 +   Android phones that are tyrants</a> (though someone found a way to
-+   crack the restriction).  Fortunately, most Android devices are not
-+   tyrants.</p>
++   crack the restriction).</p>
 
 Id: 201303250
 Target: proprietary-surveillance.html SpywareInVehicles
@@ -5673,7 +6591,7 @@
 PubDate: 2012-10-08
 Keywords: windows
 Blurb: <p><a
-+   
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
++   
href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
 +   Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
 +   jail</a>.</p>
 
@@ -5683,8 +6601,8 @@
 PubDate: 2012-10-02
 Keywords: lg tvsets
 Blurb: <p>Some LG TVs <a
-+   href="http://openlgtv.org.ru/wiki/index.php/Achievements";>are
-+   tyrants</a>.</p>
++   
href="https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements";>
++   are tyrants</a>.</p>
 
 Id: 201208210
 Target: malware-google.html surveillance
@@ -5867,6 +6785,8 @@
 Target: proprietary-sabotage.html proprietary-sabotage
 Target: malware-games.html malware-games
 PubDate: 2010-03-30
+PubDate: 2011-05-02
+PubDate: 2016-06-21
 Keywords: sony playstation
 Blurb: <p>Sony <a
 +   
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
@@ -5929,7 +6849,7 @@
 PubDate: 2008-09-06
 Keywords: keylogger
 Blurb: <p>Google Chrome contains a key logger that <a
-+   href="http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
++   
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
 +   sends Google every URL typed in</a>, one key at a time.</p>
 
 Id: 200808110
@@ -6047,4 +6967,3 @@
 +   spies on every process running on a gamer's computer and sniffs a
 +   good deal of personal data</a>, including lots of activities which
 +   have nothing to do with cheating.</p>
-

Index: proprietary-deception.html
===================================================================
RCS file: proprietary-deception.html
diff -N proprietary-deception.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-deception.html  24 Nov 2020 15:37:43 -0000      1.1
@@ -0,0 +1,229 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.92 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Deception
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-deception.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#if expr="$OUTDATED_SINCE" --><!--#else -->
+<!--#if expr="$LANGUAGE_SUFFIX" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="no" -->
+<!--#include virtual="/server/top-addendum.html" -->
+<!--#endif -->
+<!--#endif -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Deception</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Deception is a malicious functionality that makes the program
+dishonest or conceals trickery. Here are examples of such
+malicious functionalities. Cases of deception that involve taking
+people's money are listed in <a
+href="/proprietary/proprietary-fraud.html#main-heading">
+Proprietary Fraud</a>.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-deception"></div>
+
+<ul class="blurbs">
+  <li id="M202011050">
+    <p>HP tricked users into installing a <a
+    
href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer";>mischievous
 update</a> in
+    their printers that made the devices reject all third-party ink
+    cartridges.</p>
+  </li>
+
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
+  <li id="M201904150">
+    <p id="M201509210">Volkswagen programmed its car engine computers to <a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+    detect the Environmental Protection Agency's emission tests</a>, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.</p>
+
+    <p>Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.</p>
+
+    <p>Former executives of Volkswagen are being <a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison";>
+    sued over this fraud</a>.</p>
+  </li>
+
+  <li id="M201903281">
+    <p>OfficeMax cheated customers by <a
+    
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/";>
+    using proprietary &ldquo;PC Health Check&rdquo; software</a> rigged
+    to give false results, deceiving the customer into thinking per
+    computer was infected and buy unneeded support services from the
+    company.</p>
+  </li>
+
+  <li id="M201902041.2">
+    <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as <a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+    stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.</p>
+
+    <p>Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. <em>All</em> nonfree apps carry a potential risk because
+    there is no easy way of knowing what they really do.</p>
+  </li>
+
+  <li id="M201611060">
+    <p><a
+    
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
+    Audi's proprietary software used a simple method to cheat on emissions
+    tests</a>: to activate a special low-emission gearshifting mode until
+    the first time the car made a turn.</p>
+  </li>
+
+  <li id="M201609010">
+    <p>Many proprietary programs secretly <a
+    
href="https://www.theregister.co.uk/2016/08/05/payperinstall_study/";>install
+    other proprietary programs that the users don't want</a>.</p>
+  </li>
+
+  <li id="M201607140">
+    <p>The proprietor of the Pokémon Go game <a
+    
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business";>
+    invites restaurants and other businesses to pay to have the game lure
+    people there</a>.</p>
+  </li>
+
+  <li id="M201511110">
+    <p>A top-ranking proprietary Instagram client promising
+    to tell users who's been watching their pictures was in reality <a
+    
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords";>stealing
+    their credentials</a>, advertising itself on their feed, and posting
+    images without their consent.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2015-2020 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2020/11/24 15:37:43 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]