www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.pt-br.html propri...


From: GNUN
Subject: www/proprietary malware-apple.pt-br.html propri...
Date: Fri, 19 Nov 2021 06:34:20 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/11/19 06:34:20

Modified files:
        proprietary    : malware-apple.pt-br.html 
                         proprietary-jails.pt-br.html 
Added files:
        proprietary/po : malware-apple.pt-br-diff.html 
                         proprietary-jails.pt-br-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.pt-br.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pt-br-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-apple.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.pt-br.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-apple.pt-br.html    6 Sep 2021 01:03:48 -0000       1.4
+++ malware-apple.pt-br.html    19 Nov 2021 11:34:18 -0000      1.5
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.pt-br.po">
+ https://www.gnu.org/proprietary/po/malware-apple.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-apple.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-09-20" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -35,6 +40,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -1479,7 +1485,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/09/06 01:03:48 $
+$Date: 2021/11/19 11:34:18 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-jails.pt-br.html        6 Sep 2021 01:03:48 -0000       1.2
+++ proprietary-jails.pt-br.html        19 Nov 2021 11:34:18 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-jails.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-jails.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-jails.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-jails.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-09-20" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -498,7 +504,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/09/06 01:03:48 $
+$Date: 2021/11/19 11:34:18 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.pt-br-diff.html
===================================================================
RCS file: po/malware-apple.pt-br-diff.html
diff -N po/malware-apple.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-apple.pt-br-diff.html    19 Nov 2021 11:34:19 -0000      1.1
@@ -0,0 +1,1254 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-apple.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Apple's Operating Systems are Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By company&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Apple's Operating Systems Are Malware&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div id="TOC" class="toc-inline"&gt;
+&lt;h3 style="display: none"&gt;Types of Apple malware&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;!-- &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt; 
--&gt;
+  &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href="#incompatibility"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#subscriptions"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple appears to say that &lt;a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
+    (all?) apps.&lt;/p&gt;
+
+    &lt;p&gt;The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201607284"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Dropbox app for Macintosh &lt;a
+    
href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
+    takes control of user interface items after luring the user into
+    entering an admin password&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Mac OS X had an &lt;a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+    intentional local back door for 4 years&lt;/a&gt;, which could be exploited
+    by attackers to gain root privileges.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201011220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iPhone has a back door for &lt;a
+    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without understanding.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200808110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iPhone has a back door &lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="censorship"&gt;Censorship&lt;/h3&gt;
+
+&lt;p&gt;Apple mainly uses iOS, which is a typical jail, to impose censorship
+through the Apple Store. Please refer to the &lt;a href="#jails"&gt;Apple 
Jails&lt;/a&gt;
+section for more information.&lt;/p&gt;
+
+
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
+
+&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
+functionalities designed to restrict what users can do with the data
+in their computers.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202111040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple's new tactic to restrict users from
+    repairing their own device and impose DRM on people is to &lt;a
+    
href="https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever"&gt;completely
+    disable its Face ID functionality&lt;/a&gt; when you replace its 
screen.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201908150.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is putting DRM on iPhone batteries, and the system 
proprietary
+    software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
+    are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
+    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+    Apple uses DRM software to prevent people from charging an iThing
+    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200811210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+    focuses on the fact that a new model of Macbook introduced a
+    requirement for monitors to have malicious hardware, but DRM software
+    in MacOS is involved in activating the hardware. The software for
+    accessing iTunes is also responsible.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200708130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2007-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200703310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2007-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="incompatibility"&gt;Incompatibility&lt;/h3&gt;
+
+&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can liberate the device
+the software runs on.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201803300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
+    
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+    converting images from the Photos format&lt;/a&gt; to a free format is so
+    tedious and time-consuming that users just give up if they have a
+    lot of them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201802120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+    with all other options, ethical or unethical.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605044"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iWork (office software that runs on MacOS,
+    iOS and iCloud) uses secret formats and &lt;a
+    href="https://en.wikipedia.org/wiki/IWork"&gt;provides no means of
+    converting them to or from Open Document Formats&lt;/a&gt;. iWork
+    formats have changed several times since they were first
+    introduced. This may have had the effect of thwarting &lt;a
+    href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+    efforts&lt;/a&gt;, thus preventing free software from fully supporting
+    them.&lt;/p&gt;
+
+    &lt;p&gt;iWork formats are considered &lt;a
+    
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+    unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability. There's also &lt;a
+    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;
+       a technical analysis of this spyware&lt;/a&gt; available in PDF 
format.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people will be compelled to wait for 
corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202012200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Commercial crackware can &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say"&gt;
+    get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
+    and other things.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202011120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented
+    a malware in its computers that imposes surveillance&lt;/a&gt; on users
+    and reports users' computing to Apple.&lt;/p&gt;
+
+    &lt;p&gt;The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201607220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
+    
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malicious code from any application which uses this API to render a
+    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A bug in the iThings Messages app &lt;a
+    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+    a malicious web site to extract all the user's messaging
+    history&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They
+  are like sabotage, but they are not grave enough to qualify for the
+  word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
+  wrong. This section describes examples of Apple committing
+  interference.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202105300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple"&gt;Apple
+    is systematically undermining interoperability&lt;/a&gt;. At the hardware
+    level, it does this via nonstandard plugs, buses and networks. At
+    the software level, it does this by not letting the user have any
+    data except within one app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is putting DRM on iPhone
+    batteries, and the system proprietary software &lt;a
+    
href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
+    off certain features when batteries are replaced other than by
+    Apple.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
+
+&lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201904080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple plans to require that &lt;a
+    
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
+    all application software for MacOS be approved by Apple 
first&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Offering a checking service as an option could be
+    useful and would not be wrong.  Requiring users to get
+    Apple's approval is tyranny. Apple says the check will
+    only look for malware (not counting the malware that is &lt;a
+    href="/proprietary/malware-apple.html#TOC"&gt;part of
+    the operating system&lt;/a&gt;), but Apple could change that policy step
+    by step.  Or perhaps Apple will define malware to include any app
+    that China does not like.&lt;/p&gt;
+
+    &lt;p&gt;For free software, this means users will need to get Apple's
+    approval after compilation.  This amounts to a system of surveilling
+    the use of free programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200803070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+    iOS, the operating system of the Apple iThings, is the prototype
+    of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+    designing general purpose computers with censorship of application
+    programs.&lt;/p&gt;
+
+    &lt;p&gt;Here is an article about the &lt;a
+    href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+
+    &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+    walls of the iThing jail: users can now install apps built from
+    source code, provided the source code is written in Swift.  Users
+    cannot do this freely because they are required to identify
+    themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+    are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h4 id="jail-censorship"&gt;Examples of censorship by Apple jails&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202108200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Russian communications watchdog &lt;a
+    
href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"&gt;
+    tells Google and Apple to remove Navalny's app&lt;/a&gt; from their
+    stores.&lt;/p&gt;
+
+    &lt;p&gt;Because Apple controls what a user can install, this is absolute
+    censorship. By contrast, because Android does not do that, users can
+    install apps even if Google does not offer them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is &lt;a
+    
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers"&gt;
+    putting the squeeze on all business&lt;/a&gt; conducted through apps
+    for iMonsters.&lt;/p&gt;
+
+    &lt;p&gt;This is a symptom of a very big injustice: that Apple has the
+    power to decide what software can be installed on an iMonster.
+    That it is a jail.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism"&gt;
+    banned the app that Hong Kong protesters use to 
communicate&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
+    software is no excuse for censoring what software people can use.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
+    censors the Taiwan flag in iOS&lt;/a&gt; on behalf of the Chinese
+    government. When the region is set to Hong Kong, this flag is not
+    visible in the emoji selection widget but is still accessible. When the
+    region is set to mainland China, all attempts to display it will result
+    in the &ldquo;empty emoji&rdquo; icon as if the flag never 
existed.&lt;/p&gt;
+
+    &lt;p&gt;Thus, not only does Apple use the App Store as an instrument
+    of censorship, it also uses the iThing operating system for that
+    purpose.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
+    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    companies from figuring out how those attacks work.&lt;/p&gt;
+
+    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
+    deleting apps developed by Iranians.&lt;/p&gt;
+
+    &lt;p&gt;The root of these wrongs is in Apple. If Apple had not designed
+    the iMonsters to let Apple censor applications, Apple would not have
+    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
+    own censorship power to strengthen that of the Chinese 
government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701064"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
+    While subjecting its users to its own surveillance, it tries to
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.&lt;/p&gt;
+
+    &lt;p&gt;However, the point here is the wrong of Apple's censorship of
+    apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    banned a program from the App Store&lt;/a&gt; because its developers
+    committed the enormity of disassembling some iThings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
+    women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This particular political slant &lt;a
+    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has banned iThing
+    applications that show the confederate flag.  &lt;a
+    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+    Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it to represent confederate army units
+    fighting in the Civil War.&lt;/p&gt;
+
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are not
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions, or any other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201412110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    about other crimes such as killing people.  Perhaps Apple considers
+    killing more acceptable than marijuana.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201402070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201308290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201510270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple Siri &lt;a
+    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
+    to give you information&lt;/a&gt; about music charts if you're not an Apple
+    Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
+
+&lt;p&gt;These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When Apple suspects a user of fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment to a user found guilty &lt;a
+    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
+    being cut off for life, which more-or-less cripples the user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710044"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple will stop &lt;a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="iphone7-sabotage"&gt;The
+    iPhone 7 contains DRM specifically designed to &lt;a
+    
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+    &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
+    was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple forced millions of iThings to &lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201412040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted from iPods the music that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200709270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2007-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202008180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple can remotely &lt;a
+    
href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games"&gt;
+    cut off any developer's access to the tools for developing 
software&lt;/a&gt;
+    for iOS or MacOS.&lt;/p&gt;
+
+    &lt;p&gt;Epic (Apple's target in this example)
+    makes nonfree games which have their own &lt;a
+    
href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/"&gt;
+    malicious features&lt;/a&gt;, but that doesn't make it acceptable for Apple
+    to have this sort of power.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202105240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
+    is moving its Chinese customers' iCloud data to a datacenter controlled
+    by the Chinese government&lt;/a&gt;. Apple is already storing the 
encryption
+    keys on these servers, obeying Chinese authority, making all Chinese
+    user data available to the government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google, Apple, and Microsoft (and probably some other companies)
+    &lt;a 
href="https://www.lifewire.com/wifi-positioning-system-1683343"&gt;are
+    collecting people's access points and GPS coordinates (which can
+    identify people's precise location) even if their GPS is turned
+    off&lt;/a&gt;, without the person's consent, using proprietary software
+    implemented in person's smartphone. Though merely asking for permission
+    would not necessarily legitimize this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
+    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    the user's browsing history&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made various &lt;a
+    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+    MacOS programs send files to Apple servers without asking
+    permission&lt;/a&gt;.  This exposes the files to Big Brother and perhaps
+    to other snoops.&lt;/p&gt;
+
+    &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+    because even if today's version doesn't have a malicious functionality,
+    tomorrow's version might add it. The developer won't remove the
+    malfeature unless many users push back hard, and the users can't
+    remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt; MacOS automatically &lt;a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
+    things you have not decided to save are &lt;a
+    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+    even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple admits the &lt;a
+    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+    spying in a search facility&lt;/a&gt;, but there's a lot &lt;a
+    href="https://github.com/fix-macosx/yosemite-phone-home"&gt; more snooping
+    that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various operations in &lt;a
+    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+    the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201409220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may have improved with &lt;a
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but &lt;a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401100.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though that can be
+    turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201204280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="tyrants"&gt;Tyrants&lt;/h3&gt;
+
+&lt;p&gt;Tyrants are systems that reject any operating system not
+&ldquo;authorized&rdquo; by the manufacturer.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201412010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple arbitrarily &lt;a
+    
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;blocks
+    users from installing old versions of iOS&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201205280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iThings are tyrant devices.  There is a
+    port of Android to the iThings, but installing it requires &lt;a
+    
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"&gt;
+    finding a bug or &ldquo;exploit&rdquo;&lt;/a&gt; to make it possible to
+    install a different system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015-2021 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/11/19 11:34:19 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-jails.pt-br-diff.html
===================================================================
RCS file: po/proprietary-jails.pt-br-diff.html
diff -N po/proprietary-jails.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-jails.pt-br-diff.html        19 Nov 2021 11:34:19 -0000      
1.1
@@ -0,0 +1,453 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-jails.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Jails - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-jails.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Jails&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;The &ldquo;jails&rdquo; are malicious operating systems that are
+designed to impose censorship of which applications the user can install.
+The &lt;a href="http://i.imgur.com/ZRViDum.jpg"&gt;image of the 
iPrison&lt;/a&gt;
+illustrates this issue.&lt;/p&gt;
+&lt;!-- embed http://i.imgur.com/ZRViDum.jpg here --&gt;
+&lt;!-- Linking to it. Not possible to embed due to licensing. See RT #887471 
--&gt;
+
+&lt;p&gt;These systems are platforms for censorship imposed by the company
+that owns the system.  Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.&lt;/p&gt;
+
+&lt;p&gt;This page lists a few jails, along with some of the methods they use
+to censor apps, and includes specific examples of apps that were blocked
+using this censorship power.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div id="TOC" class="toc-inline"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&nbsp;&lt;a href="#apple"&gt;Apple&lt;/a&gt;&nbsp;&lt;/li&gt;
+  &lt;li&gt;&nbsp;&lt;a 
href="#microsoft"&gt;Microsoft&lt;/a&gt;&nbsp;&lt;/li&gt;
+  &lt;li&gt;&nbsp;&lt;a 
href="#consoles"&gt;Game&nbsp;consoles&lt;/a&gt;&nbsp;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="apple"&gt;Apple&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201904080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple plans to require that &lt;a
+    
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
+    all application software for MacOS be approved by Apple 
first&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Offering a checking service as an option could be
+    useful and would not be wrong.  Requiring users to get
+    Apple's approval is tyranny. Apple says the check will
+    only look for malware (not counting the malware that is &lt;a
+    href="/proprietary/malware-apple.html#TOC"&gt;part of
+    the operating system&lt;/a&gt;), but Apple could change that policy step
+    by step.  Or perhaps Apple will define malware to include any app
+    that China does not like.&lt;/p&gt;
+
+    &lt;p&gt;For free software, this means users will need to get Apple's
+    approval after compilation.  This amounts to a system of surveilling
+    the use of free programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200803070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+    iOS, the operating system of the Apple iThings, is the prototype
+    of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+    designing general purpose computers with censorship of application
+    programs.&lt;/p&gt;
+
+    &lt;p&gt;Here is an article about the &lt;a
+    href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+
+    &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+    walls of the iThing jail: users can now install apps built from
+    source code, provided the source code is written in Swift.  Users
+    cannot do this freely because they are required to identify
+    themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+    are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h4 id="apple-censorship"&gt;Examples of censorship by Apple 
jails&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202108200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Russian communications watchdog &lt;a
+    
href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"&gt;
+    tells Google and Apple to remove Navalny's app&lt;/a&gt; from their
+    stores.&lt;/p&gt;
+
+    &lt;p&gt;Because Apple controls what a user can install, this is absolute
+    censorship. By contrast, because Android does not do that, users can
+    install apps even if Google does not offer them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is &lt;a
+    
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers"&gt;
+    putting the squeeze on all business&lt;/a&gt; conducted through apps
+    for iMonsters.&lt;/p&gt;
+
+    &lt;p&gt;This is a symptom of a very big injustice: that Apple has the
+    power to decide what software can be installed on an iMonster.
+    That it is a jail.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism"&gt;
+    banned the app that Hong Kong protesters use to 
communicate&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Obeying the &ldquo;local laws&rdquo; about what people can do with
+    software is no excuse for censoring what software people can use.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"&gt;
+    censors the Taiwan flag in iOS&lt;/a&gt; on behalf of the Chinese
+    government. When the region is set to Hong Kong, this flag is not
+    visible in the emoji selection widget but is still accessible. When the
+    region is set to mainland China, all attempts to display it will result
+    in the &ldquo;empty emoji&rdquo; icon as if the flag never 
existed.&lt;/p&gt;
+
+    &lt;p&gt;Thus, not only does Apple use the App Store as an instrument
+    of censorship, it also uses the iThing operating system for that
+    purpose.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
+    href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
+    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
+    companies from figuring out how those attacks work.&lt;/p&gt;
+
+    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
+    deleting apps developed by Iranians.&lt;/p&gt;
+
+    &lt;p&gt;The root of these wrongs is in Apple. If Apple had not designed
+    the iMonsters to let Apple censor applications, Apple would not have
+    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
+    own censorship power to strengthen that of the Chinese 
government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701064"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
+    While subjecting its users to its own surveillance, it tries to
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.&lt;/p&gt;
+
+    &lt;p&gt;However, the point here is the wrong of Apple's censorship of
+    apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    banned a program from the App Store&lt;/a&gt; because its developers
+    committed the enormity of disassembling some iThings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
+    women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This particular political slant &lt;a
+    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has banned iThing
+    applications that show the confederate flag.  &lt;a
+    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+    Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it to represent confederate army units
+    fighting in the Civil War.&lt;/p&gt;
+
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are not
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions, or any other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201412110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    about other crimes such as killing people.  Perhaps Apple considers
+    killing more acceptable than marijuana.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201402070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="microsoft"&gt;Microsoft&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201706130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Windows 10 S was a jail: &lt;a
+    
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
+    only programs from the Windows Store could be
+    installed and executed&lt;/a&gt;. It was however possible to &lt;a
+    
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide"&gt;
+    upgrade to Windows 10 Pro&lt;/a&gt;. The successor of Windows
+    10 S is a special configuration of Windows 10 called &lt;a
+    <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/windows/windows-10-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/windows/windows-10-and-windows-11-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85"&gt;</em></ins></span>
+    S mode&lt;/a&gt;. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;
+    Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
+    jail&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="consoles"&gt;Game consoles&lt;/h3&gt;
+
+&lt;p&gt;No game can run on the console unless the console's manufacturer
+has authorized it.  Alas, we can't find a article to cite as a reference
+for this fact.  Please inform us if you know of one.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014-2021 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/11/19 11:34:19 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]