Proprietary Back Doors
Other examples of proprietary malware
Here are examples of demonstrated back doors in proprietary software.
Microsoft Windows has a universal back door through which
any change whatsoever can be imposed on the users.
More information on when
this was used.
Windows 8's back doors are so gaping that
the German government
has decided it can't be trusted.
The iPhone has a back
that allows Apple to remotely delete apps which Apple considers
“inappropriate”. Jobs said it's ok for Apple to have this power
because of course we can trust Apple.
The iPhone has a back door
wipe. It's not always enabled, but users are led into enabling it
8 also has a back door for remotely deleting apps.
You might well decide to let a security service that you trust
remotely deactivate programs that it considers malicious.
But there is no excuse for deleting the programs, and you
should have the right to decide who (if anyone) to trust in this way.
As these pages show, if you do want to clean your computer of malware,
the first software to delete is Windows or iOS.
has a back door to remotely delete apps. (It is in a program
and remotely install apps through GTalkService (which seems, since
that article, to have been merged into Google Play). This adds up to
a universal back door.
Although Google's exercise of this power has not been
malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to let a
security service remotely deactivate programs that it
considers malicious. But there is no excuse for allowing it
to delete the programs, and you should have the right to
decide who (if anyone) to trust in this way.
Galaxy devices running proprietary Android versions come with a back
door that provides remote access to the files stored on the device.
Most mobile phones have a universal back door, which has
been used to
turn them malicious.
The Amazon Kindle has a back door that has been used
remotely erase books.
The Kindle also has
HP “storage appliances” that use the proprietary
“Left Hand” operating system have back doors that give
login access to them. HP claims that this does not give HP access
to the customer's data, but if the back door allows installation of
software changes, a change could be installed that would give access
to the customer's data.
Some Dlink routers
have a back door for changing settings in a dlink of an eye.
Many models of router
have back doors.
Some applications come with MyFreeProxy,
which is a universal back door that can download programs and run them.
Here is a big problem whose details are still secret.
Here is a suspicion that we can't prove, but is worth thinking