<!--#include virtual="/server/header.html" virtual="/server/html5-header.html" -->
<!-- Parent-Version: 1.77 1.86 -->
                  Please do not edit <ul class="blurbs">!
    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
           See explanations in /proprietary/workshop/README.md.
<title>Proprietary Software
- GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary.translist" -->
<style type="text/css" media="print,screen">
#skiplinks .button { float: right; margin-bottom: left; margin: .5em; }
#skiplinks .button a { display: inline-block; }
table#TOC {
   display: block;
   max-width: 27em; 100%;
   overflow: auto;
   margin: 2.5em auto;
   background: #f5f5f5;
#content div.toc
#TOC th { font-size: 1.1em; }
#TOC th, #TOC td { padding: .7em; text-align: center; }
#TOC ul { padding-bottom: .5em; }
#TOC ul li { margin: .5em 0; list-style: none; margin-bottom: 1em; }
#content div.toc
#TOC ol { margin-top: 1em; text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>

<div id="skiplinks">
<p class="button"><a href="#TOC">Table of contents</a></p>
<p class="button"><a href="#latest">Latest additions</a></p>
<div style="clear: both"></div>

<p>Proprietary software, also called nonfree software,
means software that doesn't
<a href="/philosophy/free-sw.html">respect users' freedom and
community</a>.  This means that
<a href="/philosophy/free-software-even-more-important.html">  A proprietary program puts its developer or owner has
<a href="/philosophy/free-software-even-more-important.html">
in a position of power over its users.</a>
This power is in itself an injustice.</p>

<p>The point of this page is that the initial injustice of proprietary
software often leads to further injustices: malicious

<p>Power corrupts, so corrupts; the proprietary program's developer is tempted to
design the program to mistreat its users—that is, to make
it <em>malware</em>.  (Malware means software users.  (Software whose functioning
mistreats the user.) user is called <em>malware</em>.)  Of course, the
developer usually does not do this out of malice, but rather to put the users profit
more at a disadvantage. the users' expense.  That does not make it any less nasty or
more legitimate.</p>

<p>Yielding to that temptation has become ever more frequent; nowadays
it is standard practice.  Modern proprietary software is software for

<div class="toc">
<div class="companies">
  <li><strong>Company or type typically
a way to be had.</p>

<p>As of product</strong></li> April, 2019, the pages in this directory list around 400
instances of malicious functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know about.</p>

<table id="TOC">
  <th>Injustices or techniques</th>
  <th>Products or companies</th>
    <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li> href="/proprietary/proprietary-addictions.html">Addictions</a></li>
    <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li> href="/proprietary/proprietary-back-doors.html">Back doors</a> (<a href="#f1">1</a>)</li>
    <li><a href="/philosophy/malware-mobiles.html">Malware in mobile devices</a></li> href="/proprietary/proprietary-censorship.html">Censorship</a></li>
    <li><a href="/philosophy/malware-kindle-swindle.html">Malware in href="/proprietary/proprietary-coverups.html">Coverups</a></li>
    <li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
    <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a href="#f2">2</a>)</li>
    <li><a href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
    <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
    <li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
    <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a href="#f3">3</a>)</li>
    <li><a href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
    <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
    <li><a href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
    <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
    <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a href="#f4">4</a>)</li>
    <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a href="#f5">5</a>)</li>
    <li><a href="/proprietary/potential-malware.html">In the Amazon
  Swindle</a></li> pipe</a></li>

<div class="malfunctions">
<li><strong>Type of malware</strong></li>
    <li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li> href="/proprietary/malware-appliances.html">Appliances</a></li>
    <li><a href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li> href="/proprietary/malware-cars.html">Cars</a></li>
    <li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li> href="/proprietary/malware-games.html">Games</a></li>
    <li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li> href="/proprietary/malware-mobiles.html">Mobiles</a></li>
    <li><a href="/philosophy/proprietary-interference.html">Interference</a></li> href="/proprietary/malware-webpages.html">Webpages</a></li>
    <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
    <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
    <li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li> href="/proprietary/malware-apple.html">Apple</a></li>
    <li><a href="/philosophy/proprietary-drm.html">Digital href="/proprietary/malware-google.html">Google</a></li>
    <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
  <td colspan="2">
    <li id="f1"><em>Back door:</em>  any feature of a program
     that enables someone who is not supposed to be in control of the
     computer where it is installed to send it commands.</li>

    <li id="f2"><em>Digital restrictions
    management</a> management, or “DRM” means
     “DRM”:</em>  functionalities designed to restrict
     what users can do with the data in their computers.</li>
<li><a href="/philosophy/proprietary-jails.html">Jails</a>—systems

    <li id="f3"><em>Jail:</em>  system that impose imposes censorship on
     application programs.</li>
<li><a href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems

    <li id="f4"><em>Tether:</em>  functionality that requires
     permanent (or very frequent) connection to a server.</li>

    <li id="f5"><em>Tyrant:</em>  system that reject rejects any operating
     system not “authorized” by the manufacturer.</li>

<p>Users of proprietary software are defenseless against these forms
of mistreatment.  The way to avoid them is by insisting on
<a href="/philosophy/free-software-even-more-important.html">free
(freedom-respecting) software.</a> software</a>.  Since free software is controlled
by its users, they have a pretty good defense against malicious
software functionality.</p>

<h3 id="latest">Latest additions</h3>

<ul class="blurbs">
  <li id="M201905280">
    <p>In spite of Apple's supposed commitment to
    privacy, iPhone apps contain trackers that are busy at night <a
    sending users' personal information to third parties</a>.</p>

    <p>The article mentions specific examples: Microsoft OneDrive,
    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
    Channel (owned by IBM), the crime-alert service Citizen, Yelp
    and DoorDash. But it is likely that most nonfree apps contain
    trackers. Some of these send personally identifying data such as phone
    fingerprint, exact location, email address, phone number or even
    delivery address (in the case of DoorDash). Once this information
    is collected by the company, there is no telling what it will be
    used for.</p>

  <li id="M201906030">
    <p>Apple can <a
    track iMonsters even when they are suspended</a>.</p>

    <p>This distributed bluetooth network is said to be
    “secure,” but it is obviously <em>not</em> secure from
    Apple or from governments that can command Apple's obedience (such
    as the US and China).</p>

  <li id="M201905300">
    <p>The Femm “fertility” app is secretly a <a
    tool for propaganda</a> by natalist Christians.  It spreads distrust
    for contraception.</p>

    <p>It snoops on users, too, as you must expect from nonfree

  <li id="M201905061">
    <p>Amazon Alexa collects a lot more information from users
    than is necessary for correct functioning (time, location,
    recordings made without a legitimate prompt), and sends
    it to Amazon's servers, which store it indefinitely. Even
    worse, Amazon forwards it to third-party companies. Thus,
    even if users request deletion of their data from Amazon's servers, <a
    the data remain on other servers</a>, where they can be accessed by
    advertising companies and government agencies. In other words,
    deleting the collected information doesn't cancel the wrong of
    collecting it.</p>

    <p>Data collected by devices such as the Nest thermostat, the Philips
    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
    speakers are likewise stored longer than necessary on the servers
    the devices are tethered to. Moreover, they are made available to
    Alexa. As a result, Amazon has a very precise picture of users' life
    at home, not only in the present, but in the past (and, who knows,
    in the future too?)</p>

  <li id="M201905150">
    <p>Users caught in the jail of an iMonster are <a
    href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
    ducks for other attackers</a>, and the app censorship prevents security
    companies from figuring out how those attacks work.</p>

    <p>Apple's censorship of apps is fundamentally unjust, and would be
    inexcusable even if it didn't lead to security threats as well.</p>

</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
<div class="unprintable">

<p>Please send general FSF & GNU inquiries to
<a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>.
There are also <a href="/contact/">other ways to contact</a>
the FSF.  Broken links and other corrections or suggestions can be sent
to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p>

<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
        replace it with the translation of these two:

        We work hard and do our best to provide accurate, good quality
        translations.  However, we are not exempt from imperfection.
        Please send your comments and general suggestions in this regard
        to <a href="mailto:web-translators@gnu.org">

        <p>For information on coordinating and submitting translations of
        our web pages, see <a
        README</a>. -->
Please see the <a
README</a> for information on coordinating and submitting translations
of this article.</p>

<!-- Regarding copyright, in general, standalone pages (as opposed to
     files generated as part of manuals) on the GNU web server should
     be under CC BY-ND 4.0.  Please do NOT change or remove this
     without talking with the webmasters or licensing team first.
     Please make sure the copyright date is consistent with the
     document.  For web pages, it is ok to list just the latest year the
     document was modified, or published.

     If you wish to list earlier years, that is ok too.
     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
     years, as long as each year in the range is in fact a copyrightable
     year, i.e., a year in which the document was published (including
     being publicly visible on the web or in a revision control system).

     There is more detail about copyright years in the GNU Maintainers
     Information document, www.gnu.org/prep/maintain. -->

<p>Copyright © 2013, 2014, 2015 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>

<p>This page is licensed under a <a rel="license"
Commons Attribution-NoDerivatives 4.0 International License</a>.</p>

<!--#include virtual="/server/bottom-notes.html" -->

<p class="unprintable">Updated:
<!-- timestamp start -->
$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</div><!-- for class="inner", starts in the banner include -->