English [en]   español [es]   français [fr]   русский [ru]  

Help the FSF fight for user freedom!

28 days. 200 new members. Join us before July 15.

Associate members help the Free Software Foundation remain proudly independent. Small contributions create a big impact!

READ MORE | JOIN

Proprietary Incompatibility

Other examples of proprietary malware

The “incompatibility” category includes the use of secret formats or protocols in proprietary software. This directly blocks or hinders users from switching to any alternative program—and, in particular, from switching to free software which can liberate the device the software runs on.

Apart from being deliberately anticompetitive, secret formats put users' digital data at risk. For instance, retrieval of old data will become very difficult if support for the proprietary software that can read it is discontinued.

Another sort of incompatibility occurs when a system makes some important operation which would be necessary for migrating data to any other system so cumbersome or so slow that it isn't doable for more than a small amount of data.

If you know of an example that ought to be in this page but isn't here, please write to <webmasters@gnu.org> to inform us. Please include the URL of a trustworthy reference or two to serve as specific substantiation.

TOP

 [FSF logo] “The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom. We defend the rights of all software users.”

JOIN SHOP