advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 0 - 1 of about 0 (0.002 sec.)
malware-apple.it.po
@digest: b339615c7f43de34d1f70cba3fc8738d
@id: 400372
@mdate: 2024-03-26T14:22:04Z
@size: 85770
@type: text/html
content-type: text/html; charset=utf-8
#keywords: apple (41436), igadget (32508), theguardian (29788), iphone (24440), marijuana (21320), iphones (19813), icloud (17379), arstechnica (15515), theregister (15348), https (12367), href (12019), ithing (11388), deception (11179), applicazioni (10919), ldquo (10337), jails (10253), rdquo (9527), ithings (9075), spotlight (8295), ios (7971), tyrants (7733), technology (7419), censorship (6907), com (5938), chinese (5619), signing (5550), macos (5192), repair (4797), utenti (4494), music (4133), upgrade (4132), blog (3992)
malware-apple.it.po Mismatched links: 163. Mismatched ids: 0. # text 16 | <a [-href="#back-doors">Back doors</a>-] {+href="#drm">DRM</a>+} <a href=" #drm ">DRM</a> <a href=" #back-doors ">Backdoor</a> 17 | <a [-href="#insecurity">Insecurity</a>-] | {+href="#incompatibility">Incompatibility</a>+} <a href=" #incompatibility ">Incompatibility</a> <a href=" #insecurity ">Mancata sicurezza</a> 20 | <a [-href="#deception">Deception</a>-] {+href="#jails">Jails</a>+} <a href=" #jails ">Jails</a> <a href=" #deception ">Inganni</a> 21 | <a [-href="#deception">Deception</a>-] | {+href="#manipulation">Manipulation</a>+} <a href=" #manipulation ">Manipulation</a> <a href=" #deception ">Inganni</a> 24 | <a [-href="#deception">Deception</a>-] | {+href="#subscriptions">Subscriptions</a>+} <a href=" #subscriptions ">Subscriptions</a> <a href=" #deception ">Inganni</a> 26 | <a [-href="#sabotage">Sabotage</a>-] {+href="#tyrants">Tyrants</a>+} <a href=" #tyrants ">Tyrants</a> <a href=" #sabotage ">Sabotaggio</a> 28 Apple appears to say that <a href=" https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/ "> there is a back door in MacOS</a> for automatically updating some (all?) apps. 30 | The Dropbox app for Macintosh <a | [-href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes | total-] | {+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"> | takes+} control of [-the machine by repeatedly nagging-] {+user interface | items after luring+} the user [-for-] {+into entering+} an admin[-i-] | password</a>. The Dropbox app for Macintosh <a href=" https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ "> takes control of user interface items after luring the user into entering an admin password</a>. L'applicazione Dropbox per Macintosh <a href=" http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ ">prende controllo totale della macchina chiedendo ripetutamente all'utente la password di amministratore</a>. 32 | The iPhone has a back door for <a | href="http{+s+}://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"> | remote wipe</a>. It's not always enabled, but users are led into enabling | it without understanding. The iPhone has a back door for <a href=" https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone "> remote wipe</a>. It's not always enabled, but users are led into enabling it without understanding. L'iPhone ha una backdoor per <a href=" http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone ">la formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono spinti ad abilitarla a loro insaputa. 33 | The iPhone has a back door <a | href="http{+s+}://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"> | that allows Apple to remotely delete apps</a> which Apple considers | &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this | power because of course we can trust Apple. The iPhone has a back door <a href=" https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html "> that allows Apple to remotely delete apps</a> which Apple considers &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power because of course we can trust Apple. L'iPhone ha una backdoor <a href=" http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html ">che permette ad Apple di disinstallare a distanza applicazioni</a> che reputa &ldquo;inappropriate&rdquo;. Jobs disse che è giusto che Apple abbia questo potere perché di Apple ci si può fidare, eccome. 35 Apple mainly uses iOS, which is a typical jail, to impose censorship through the Apple Store. Please refer to the <a href=" #jails ">Apple Jails</a> section for more information. 37 | [-<a href="#drm">Digital-]{+Digital+} restrictions [-management</a>-] | {+management,+} or [-&ldquo;DRM&rdquo; means-] {+&ldquo;DRM,&rdquo; refers | to+} functionalities designed to restrict what users can do with the data | in their computers. Digital restrictions management, or &ldquo;DRM,&rdquo; refers to functionalities designed to restrict what users can do with the data in their computers. <a href=" #drm ">DRM</a> (che chiamiamo “Digital restrictions management”, in italiano, “gestione digitale delle restrizioni”) significa funzionalità volte a limitare il controllo che gli utenti hanno sui dati contenuti nei propri computer. 38 Apple prevents people from upgrading their Mac hardware <a href=" https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement ">by imposing DRM on its removable SSD storage</a>. 39 Apple's new tactic to restrict users from repairing their own device and impose DRM on people is to <a href=" https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever ">completely disable its Face ID functionality</a> when you replace its screen. 40 Apple is putting DRM on iPhone batteries, and the system proprietary software <a href=" #M201908150 ">turns off certain features when batteries are replaced other than by Apple.</a> 41 DRM makes the iPhone 7 nearly <a href=" #iphone7-sabotage ">unrepairable</a> by anyone else but Apple. 42 | <a | [-href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">-] | {+href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">+} | Apple uses DRM software to prevent people from charging an iThing with a | generic USB cable</a>. <a href=" https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017 "> Apple uses DRM software to prevent people from charging an iThing with a generic USB cable</a>. <a href=" http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017 "> Apple usa DRM per fare in modo che non si possa caricare un iGadget con un cavo USB generico</a>. 44 | <a [-href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">-] | {+href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/">+} DRM | that caters to Blu{+-+}ray disks</a>. (The article focused on Windows and | said that MacOS would do the same thing subsequently.) <a href=" https://arstechnica.com/gadgets/2007/08/aacs-tentacles/ "> DRM that caters to Blu-ray disks</a>. (The article focused on Windows and said that MacOS would do the same thing subsequently.) <a href=" http://arstechnica.com/apple/2007/08/aacs-tentacles/ ">DRM introdotto per soddisfare i requisiti dei dischi Bluray</a>. (L'articolo si concentra su Windows ma afferma che MacOS farà lo stesso in seguito.) 45 iTunes videos have DRM, which allows Apple to <a href=" https://en.wikipedia.org/wiki/FairPlay ">dictate where its customers can watch the videos they purchased</a>. 48 In MacOS and iOS, the procedure for <a href=" https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac "> converting images from the Photos format</a> to a free format is so tedious and time-consuming that users just give up if they have a lot of them. 49 iWork (office software that runs on MacOS, iOS and iCloud) uses secret formats and <a href=" https://en.wikipedia.org/wiki/IWork ">provides no means of converting them to or from Open Document Formats</a>. iWork formats have changed several times since they were first introduced. This may have had the effect of thwarting <a href=" https://gothub.frontendfriendly.xyz/obriensp/iWorkFileFormat/blob/master/README.md ">reverse engineering efforts</a>, thus preventing free software from fully supporting them. 50 iWork formats are considered <a href=" https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2 "> unfit for document preservation</a>. 53 A critical bug in Apple's iOS makes it possible for attackers to alter a shutdown event, <a href=" https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/ ">tricking the user into thinking that the phone has been powered off</a>. But in fact, it's still running, and the user can't feel any difference between a real shutdown and the fake shutdown. 54 Some researchers at Google <a href=" https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users ">found a zero-day vulnerability on MacOS, which crackers used to target people visiting the websites</a> of a media outlet and a pro-democracy labor and political group in Hong Kong. 55 <small>Please note that the article wrongly refers to crackers as &ldquo;<a href=" /philosophy/words-to-avoid.html#Hacker ">hackers</a>&rdquo;.</small> 56 <a href=" https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones "> The pegasus spyware used vulnerabilities on proprietary smartphone operating systems</a> to impose surveillance on people. It can record people's calls, copy their messages, and secretly film them, using a security vulnerability. There's also <a href=" https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf "> a technical analysis of this spyware</a> available in PDF format. 58 Commercial crackware can <a href=" https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say "> get passwords out of an iMonster</a>, use the microphone and camera, and other things. 59 Apple has <a href=" https://sneak.berlin/20201112/your-computer-isnt-yours/ ">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 61 A series of vulnerabilities <a href=" https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/ ">found in iOS allowed attackers to gain access to sensitive information including private messages, passwords, photos and contacts stored on the user's iMonster</a>. 65 | <a | [-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">-] | {+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">+} | The NSA can tap data in smart phones, including iPhones, Android, and | BlackBerry</a>. While there is not much detail here, it seems that this | does not operate via the universal back door that we know nearly all | portable phones have. It may involve exploiting various bugs. There are | <a | [-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">-] | {+href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/">+} | lots of bugs in the phones' radio software</a>. <a href=" https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html "> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href=" https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/ "> lots of bugs in the phones' radio software</a>. <a href=" http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html ">La NSA può intercettare dati in vari smartphone, tra cui iPhone, Android e BlackBerry</a>. Sebbene l'articolo non sia dettagliato a sufficienza, pare che questo non sia compiuto tramite la ben nota backdoor universale presente in tutti i telefoni cellulari. Potrebbe comportare lo sfruttamento di vari bug. Ci sono <a href=" http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone ">molti bug nei programmi di radiocomunicazione dei telefoni</a>. 68 <a href=" https://www.techarp.com/mobile/apple-china-limit-airdrop/ "> Obeying a demand by the Chinese government, Apple restricted the use of AirDrop in China</a>. It imposed a ten-minute time limit during which users can receive files from non contacts. This makes it nearly impossible to use AirDrop for its intended purpose, which is to exchange files with strangers between iMonsters in physical proximity. This happened after it became known that dissenters were using the app to distribute digital anti-government fliers anonymously. 69 <a href=" https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple ">Apple is systematically undermining interoperability</a>. At the hardware level, it does this via nonstandard plugs, buses and networks. At the software level, it does this by not letting the user have any data except within one app. 70 Apple is putting DRM on iPhone batteries, and the system proprietary software <a href=" https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair ">turns off certain features when batteries are replaced other than by Apple.</a> 72 | [-<a href="#jails">Jails</a>&mdash;systems-]{+Jails are systems+} that | impose censorship on {+which+} application [-programs.-] {+programs a user | can install.+} Jails are systems that impose censorship on which application programs a user can install. <a href=" #jails ">Prigioni</a>&mdash;sistemi che impongono restrizioni alle applicazioni. 73 Shortcuts, a built-in scripting app on Apple devices, <a href=" https://support.apple.com/guide/shortcuts/apdf01f8c054/5.0/ios/15.0 "> doesn't give you complete freedom to share scripts</a> (a.k.a. &ldquo;shortcuts&rdquo;). Exporting a script as a file <a href=" https://web.archive.org/web/20230329031338/https://www.reddit.com/r/StallmanWasRight/comments/vogb0c/all_methods_of_sharing_ios_shortcuts_require_an/ "> requires an Apple ID</a>, and may be subjected to censorship by Apple. 75 Apple has made it <a href=" https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238 "> impossible to load Navalny's tactical voting app into an iPhone</a> in Russia. 77 Apple plans to require that <a href=" https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/ "> all application software for MacOS be approved by Apple first</a>. 78 Offering a checking service as an option could be useful and would not be wrong. Requiring users to get Apple's approval is tyranny. Apple says the check will only look for malware (not counting the malware that is <a href=" /proprietary/malware-apple.html#TOC ">part of the operating system</a>), but Apple could change that policy step by step. Or perhaps Apple will define malware to include any app that the Chinese government does not like. 80 | <a | [-href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">-] | {+href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046">+} | iOS, the operating system of the Apple iThings, is the prototype of a | [-jail.</a>-] {+jail</a>.+} It was Apple that introduced the practice of | designing general purpose[-s-] computers with censorship of application | programs. <a href=" https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046 "> iOS, the operating system of the Apple iThings, is the prototype of a jail</a>. It was Apple that introduced the practice of designing general purpose computers with censorship of application programs. <a href=" http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html ">iOS, il sistema operativo dei vari iGadget di Apple, è il prototipo di una prigione</a>. &Egrave; stata Apple a introdurre la pratica del progettare i computer per uso generale inserendovi la censura verso certe applicazioni. 81 | Here is an article about the <a | href="http{+s+}://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"> | code signing</a> that the iThings use to [-jail-] {+lock up+} the user. Here is an article about the <a href=" https://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/ "> code signing</a> that the iThings use to lock up the user. Ecco un articolo sulla <a href=" http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/ ">firma digitale del codice</a> usata dagli iGadget per imprigionare l'utente. 84 The Russian communications watchdog <a href=" https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/ "> tells Google and Apple to remove Navalny's app</a> from their stores. 86 Apple is <a href=" https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers "> putting the squeeze on all business</a> conducted through apps for iMonsters. 88 Apple has <a href=" https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism "> banned the app that Hong Kong protesters use to communicate</a>. 90 Apple <a href=" https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html "> censors the Taiwan flag in iOS</a> on behalf of the Chinese government. When the region is set to Hong Kong, this flag is not visible in the emoji selection widget but is still accessible. When the region is set to mainland China, all attempts to display it will result in the &ldquo;empty emoji&rdquo; icon as if the flag never existed. 92 Users caught in the jail of an iMonster are <a href=" https://boingboing.net/2019/05/15/brittle-security.html "> sitting ducks for other attackers</a>, and the app censorship prevents security companies from figuring out how those attacks work. 95 | {+The root of these wrongs is in Apple.+} If Apple had not designed the | iMonsters to let Apple censor applications, [-<a | href="/proprietary/proprietary-jails.html">-] Apple would not have had | the power to stop users from installing [-VPNs</a>.-] {+whatever kind of | apps.+} The root of these wrongs is in Apple. If Apple had not designed the iMonsters to let Apple censor applications, Apple would not have had the power to stop users from installing whatever kind of apps. Se Apple non avesse progettato quelli che noi chiamiamo iMostri in modo da poter censurare le applicazioni, <a href=" /proprietary/proprietary-jails.html "> Apple non avrebbe avuto il potere di impedire l'installazione di VPN</a> agli utenti. 97 | Apple used its censorship system to enforce Russian surveillance <a | [-href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0">-] | {+href="https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html">+} | by blocking distribution of the LinkedIn app in Russia</a>. Apple used its censorship system to enforce Russian surveillance <a href=" https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html "> by blocking distribution of the LinkedIn app in Russia</a>. Apple ha usato i propri sistemi di censura per attuare la sorveglianza russa e <a href=" http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0 "> bloccare la distribuzione dell'App di LinkedIn in Russia</a>. 101 | Apple censors games, <a | [-href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning-] | {+href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/"> | banning+} some games from the cr&hellip;app store</a> because of which | political points they suggest. Some political points are apparently | considered acceptable. Apple censors games, <a href=" https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/ "> banning some games from the cr&hellip;app store</a> because of which political points they suggest. Some political points are apparently considered acceptable. Apple censura i giochi, <a href=" http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game ">eliminando giochi dal suo App Store</a> a causa della visione politica che suggeriscono; altre visioni sono evidentemente considerate accettabili. 102 | Apple <a [-href="http://ifixit.org/blog/7401/ifixit-app-pulled/">-] | {+href="https://www.ifixit.com/News/7401/ifixit-app-pulled">+} banned a | program from the App Store</a> because its developers committed the | enormity of disassembling some iThings. Apple <a href=" https://www.ifixit.com/News/7401/ifixit-app-pulled "> banned a program from the App Store</a> because its developers committed the enormity of disassembling some iThings. Apple <a href=" http://ifixit.org/blog/7401/ifixit-app-pulled/ "> ha eliminato un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato disassemblare alcuni degli iGadget. 103 | As of 2015, Apple <a | [-href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically-] | {+href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"> | systematically+} bans apps that endorse abortion rights or would help | women find abortions</a>. As of 2015, Apple <a href=" https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights "> systematically bans apps that endorse abortion rights or would help women find abortions</a>. Nel 2015, Apple <a href=" http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights ">proibisce le applicazioni</a> che sostengono il diritto all'aborto o che aiuterebbero le donne a trovare possibilità di abortire. 104 | This particular political slant <a | href="http{+s+}://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"> | affects other Apple services</a>. This particular political slant <a href=" https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions "> affects other Apple services</a>. Questa scelta politica è presente <a href=" http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions "> anche in altri dispositivi Apple</a>. 105 | Apple has banned iThing applications that show the confederate flag. <a | [-href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">-] | {+href="https://www.huffpost.com/entry/apple-confederate-flag_n_7663754">+} | Not only those that use it as a symbol of racism</a>, but even strategic | games that use it to represent confederate army units fighting in the | Civil War. Apple has banned iThing applications that show the confederate flag. <a href=" https://www.huffpost.com/entry/apple-confederate-flag_n_7663754 "> Not only those that use it as a symbol of racism</a>, but even strategic games that use it to represent confederate army units fighting in the Civil War. Apple, sui suoi vari iGadget, ha proibito le applicazioni che mostrano la bandiera confederata degli Stati Uniti. <a href=" http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html "> Non solo quelle che la usano a fini razzisti</a> ma anche i giochi che la usano per ragioni storiche, per rappresentare gli eserciti della guerra civile statunitense. 107 | <a | href="http{+s+}://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"> | More examples of Apple's arbitrary and inconsistent censorship</a>. <a href=" https://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans "> More examples of Apple's arbitrary and inconsistent censorship</a>. <a href=" http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans ">Altri esempi della censura arbitraria ed incoerente perpetrata da Apple</a>. 108 | Apple used this censorship power in 2014 to <a | href="http{+s+}://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"> | ban all bitcoin apps</a> for the iThings for a time. It also <a | [-href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">banned-] | {+href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"> | banned+} a game about growing marijuana</a>, while permitting games about | other crimes such as killing people. Perhaps Apple considers killing more | acceptable than marijuana. Apple used this censorship power in 2014 to <a href=" https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html "> ban all bitcoin apps</a> for the iThings for a time. It also <a href=" https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/ "> banned a game about growing marijuana</a>, while permitting games about other crimes such as killing people. Perhaps Apple considers killing more acceptable than marijuana. Apple ha usato questo potere di censura nel 2014 per <a href=" http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html ">proibire tutte le applicazioni di bitcoin</a> per gli iGadget, per un periodo. Ha anche <a href=" http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/ ">proibito un gioco sulla coltivazione di marijuana</a>, nonostante la presenza di giochi basati su altri crimini come l'omicidio. Forse Apple considera uccidere più accettabile della marijuana. 109 | Apple rejected an app that displayed the locations of US drone | assassinations, giving various excuses. Each time the developers fixed one | &ldquo;problem&rdquo;, Apple complained about another. After the fifth | rejection, Apple <a | [-href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted-] | {+href="https://mashable.com/archive/apple-app-tracks-drone-strikes"> | admitted+} it was censoring the app based on the subject matter</a>. Apple rejected an app that displayed the locations of US drone assassinations, giving various excuses. Each time the developers fixed one &ldquo;problem&rdquo;, Apple complained about another. After the fifth rejection, Apple <a href=" https://mashable.com/archive/apple-app-tracks-drone-strikes "> admitted it was censoring the app based on the subject matter</a>. Apple ha rifiutato un'app che mostrava dove sono avvenuti gli attacchi omicidi di droni statunitensi, adducendo varie scuse. Ogni volta che gli sviluppatori sistemavano un &ldquo;problema&rdquo;, Apple ne trovava un altro. Dopo il quinto rifiuto, Apple ha ammesso che stava censurando l'applicazione <a href=" http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/ ">solo per il tema di cui trattava</a>. 111 | &ldquo;Dark patterns&rdquo; are <a | href="http{+s+}://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user | interfaces designed to mislead users, or make option settings hard to | find</a>. &ldquo;Dark patterns&rdquo; are <a href=" https://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you ">user interfaces designed to mislead users, or make option settings hard to find</a>. &ldquo;Dark patterns&rdquo; sono <a href=" http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you ">interfacce che ingannano gli utenti</a> o rendono più difficile trovare le impostazioni. 115 | Apple Siri <a | href="http{+s+}://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses | to give you information</a> about music charts if you're not an Apple | Music subscriber. Apple Siri <a href=" https://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions ">refuses to give you information</a> about music charts if you're not an Apple Music subscriber. Apple Siri <a href=" http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions ">non vi darà informazioni</a> sulle classifiche musicali se non siete iscritti ad Apple Music. 118 <a href=" https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html ">To block non-Apple repairs, Apple encodes the iMonster serial number in the original parts</a>. This is called &ldquo;parts pairing&rdquo;. Swapping parts between working iMonsters of the same model causes malfunction or disabling of some functionalities. Part replacement may also trigger persistent alerts, unless it is done by an Apple store. 119 When Apple suspects a user of fraud, it judges the case secretly and presents the verdict as a fait accompli. The punishment to a user found guilty <a href=" https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud ">is being cut off for life, which more-or-less cripples the user's Apple devices forever</a>. There is no appeal. 120 Apple and Samsung deliberately <a href=" https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones ">degrade the performance of older phones to force users to buy their newer phones</a>. 121 Apple has <a href=" https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia ">blocked Telegram from upgrading its app for a month</a>. 123 The Telegram client is free software on other platforms, but not on iThings. Since <a href=" /proprietary/proprietary-jails.html#apple ">they are jails</a>, they don't permit any app to be free software. 124 MacOS High Sierra forcibly reformats SSD boot drives, and <a href=" https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html "> changes the file system from HFS+ to APFS</a>, which cannot be accessed from GNU/Linux, Windows or even older versions of MacOS. 127 | The iPhone 7 contains DRM specifically designed to <a | [-href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">-] | {+href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">+} | brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>. | &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple. The iPhone 7 contains DRM specifically designed to <a href=" https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock "> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>. &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple. L'iPhone 7 contiene DRM progettati per <a href=" https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock "> renderlo inutilizzabile se riparato da un negozio "non autorizzato"</a>, dove "non autorizzato" significa in pratica chiunque al di fuori di Apple. 128 | [-The-]{+<small>(The+} article uses the term &ldquo;lock&rdquo; to | describe the DRM, but we prefer to use the term <a | [-href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">-] | {+href="/philosophy/words-to-avoid.html#DigitalLocks">+} digital | [-handcuffs</a>.-] {+handcuffs</a>.)</small>+} <small>(The article uses the term &ldquo;lock&rdquo; to describe the DRM, but we prefer to use the term <a href=" /philosophy/words-to-avoid.html#DigitalLocks "> digital handcuffs</a>.)</small> L'articolo usa la parola "lucchetto" come descrizione di DRM, ma noi preferiamo <a href=" https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks "> manette digitali</a>. 129 | Apple <a | [-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">-] | {+href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/">+} | stops users from fixing the security bugs in Quicktime for Windows</a>, | while refusing to fix them itself. Apple <a href=" https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/ "> stops users from fixing the security bugs in Quicktime for Windows</a>, while refusing to fix them itself. Apple si rifiuta di sistemare problemi di sicurezza in Quicktime per Windows e <a href=" https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/ ">impedisce agli utenti di farlo</a>. 130 | The Apple Music client program <a | [-href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans-] | {+href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans+} | the user's file system for music files, copies them to an Apple server, | and deletes them</a>. The Apple Music client program <a href=" https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/ ">scans the user's file system for music files, copies them to an Apple server, and deletes them</a>. Il programma Apple Music <a href=" https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/ ">cerca file musicali sul disco dell'utente, li copia sui server di Apple e li cancella</a>. 132 | Apple forced millions of iThings to [-download-] {+<a | href="https://discussions.apple.com/thread/7256669?tstart=0">download+} | a system upgrade [-<a | href="https://discussions.apple.com/thread/7256669?tstart0=">without-] | {+without+} asking the users</a>. Apple did not forcibly install the | upgrade but the downloading alone caused lots of trouble. Apple forced millions of iThings to <a href=" https://discussions.apple.com/thread/7256669?tstart=0 ">download a system upgrade without asking the users</a>. Apple did not forcibly install the upgrade but the downloading alone caused lots of trouble. Apple ha costretto milioni dei suoi vari iGadget a scaricare un aggiornamento di sistema <a href=" https://discussions.apple.com/thread/7256669?tstart0= ">senza avvisare gli utenti</a>. L'aggiornamento non è stato installato automaticamente, ma già il suo scaricamento senza avviso ha causato parecchi problemi. 133 | Apple <a | href="http{+s+}://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"> | deleted from iPods the music that users had got from internet music stores | that competed with iTunes</a>. Apple <a href=" https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs "> deleted from iPods the music that users had got from internet music stores that competed with iTunes</a>. Apple <a href=" http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs ">ha cancellato dagli iPod la musica scaricata da negozi di musica digitale concorrenti di iTunes</a>. 134 | <a | [-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">-] | {+href="https://web.archive.org/web/20230315024447/https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">+} | An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been | [-unlocked.</a>-] {+unlocked</a>.+} The &ldquo;upgrade&rdquo; also | deactivated applications not approved by <a | href="/proprietary/proprietary-jails.html">Apple censorship</a>. All | this was apparently intentional. <a href=" https://web.archive.org/web/20230315024447/https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html "> An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been unlocked</a>. The &ldquo;upgrade&rdquo; also deactivated applications not approved by <a href="/proprietary/proprietary-jails.html">Apple censorship</a>. All this was apparently intentional. <a href=" http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html ">Un &ldquo;aggiornamento&rdquo; di Apple al firmware degli iPhone ha reso inutilizzabili i dispositivi che erano stati sbloccati</a>. L'&ldquo;aggiornamento&rdquo; ha anche disattivato le applicazioni non approvate dalla <a href="/proprietary/proprietary-jails.html">censura di Apple</a>. Tutto questo era apparentemente intenzionale. 136 Apple can remotely <a href=" https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games "> cut off any developer's access to the tools for developing software</a> for iOS or MacOS. 137 Epic (Apple's target in this example) makes nonfree games which have their own <a href=" https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/ "> malicious features</a>, but that doesn't make it acceptable for Apple to have this sort of power. 139 <a href=" https://web.archive.org/web/20230101185726/https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 "> The iMonster app store client programs collect many kinds of data</a> about the user's actions and private communications. &ldquo;Do not track&rdquo; options are available, but tracking doesn't stop if the user activates them: Apple keeps on collecting data for itself, although it claims not to send it to third parties. 140 <a href=" https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/ "> Apple is being sued</a> for that. 141 <a href=" https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/ ">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 142 Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href=" https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf "> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 145 Google, Apple, and Microsoft (and probably some other companies) <a href=" https://www.lifewire.com/wifi-positioning-system-1683343 ">are collecting people's access points and GPS coordinates (which can identify people's precise location) even if their GPS is turned off</a>, without the person's consent, using proprietary software implemented in person's smartphone. Though merely asking for permission would not necessarily legitimize this. 146 Safari occasionally <a href=" https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/ "> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 147 The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href=" https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962 "> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 148 Note: The <a href=" http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html "> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 149 In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href=" https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html "> sending users' personal information to third parties</a>. 151 Adware Doctor, an ad blocker for MacOS, <a href=" https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history ">reports the user's browsing history</a>. 153 In the latest iThings system, &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a href=" https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off "> doesn't really turn them off</a>. A more advanced way really does turn them off&mdash;only until 5am. That's Apple for you&mdash;&ldquo;We know you want to be spied on&rdquo;. 155 | iPhones <a | href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says{+/+}">send | lots of personal data to Apple's servers</a>. Big Brother can get them | from there. iPhones <a href=" https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/ ">send lots of personal data to Apple's servers</a>. Big Brother can get them from there. Gli iPhone <a href=" https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says ">inviano ai server di Apple molti dati personali</a>. Là sono a disposizione del Grande Fratello. 159 | (From <a [-href="https://www.apple.com/icloud/photos/">Apple's-] | {+href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/">Apple's+} | iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is | <a href="https://support.apple.com/en-us/HT202033">activated by the | startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't | ask where.&rdquo; (From <a href=" https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/ ">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; (Dalla pagina con <a href=" https://www.apple.com/icloud/photos/ ">informazioni su iCloud</a> come presente sul sito di Apple il 24 settembre 2015). La funzione iCloud è <a href="https://support.apple.com/en-us/HT202033">attivata all'avvio del sistema</a>. Il termine &ldquo;cloud&rdquo; significa per noi &ldquo;non chiedeteci dove&rdquo;. 162 | Apple has made various <a | href="http{+s+}://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"> | MacOS programs send files to Apple servers without asking permission</a>. | This exposes the files to Big Brother and perhaps to other snoops. Apple has made various <a href=" https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud "> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. Apple ha fatto sì che diversi <a href=" http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud ">programmi di MacOS inviino file ai server di Apple senza chiedere alcun permesso</a>. Questo espone i file al Grande Fratello e forse ad altri ficcanaso. 164 | [-<a | href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">-]MacOS | automatically {+<a | href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">+} | sends to Apple servers unsaved documents being edited</a>. The [-<a | href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter">-] | things you have not decided to save are {+<a | href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">+} | even more [-sensitive-] {+sensitive</a>+} than the things you have stored | in [-files</a>.-] {+files.+} MacOS automatically <a href=" https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/ "> sends to Apple servers unsaved documents being edited</a>. The things you have not decided to save are <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"> even more sensitive</a> than the things you have stored in files. <a href=" http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/ ">MacOS invia in automatico ai server di Apple i documenti non salvati che si stanno editando</a>. Le <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">cose che non vengono salvate sono ancora più sensibili di quelle che si salvano</a>. 165 | Apple admits the <a | href="http{+s+}://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"> | spying in a search facility</a>, but there's a lot <a | [-href="https://github.com/fix-macosx/yosemite-phone-home">-] | {+href="https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md">+} | more snooping that Apple has not talked about</a>. Apple admits the <a href=" https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ "> spying in a search facility</a>, but there's a lot <a href=" https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md "> more snooping that Apple has not talked about</a>. Apple ammette di <a href=" http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ ">spiare in un servizio di ricerca</a>, ma c'è molto altro <a href=" https://github.com/fix-macosx/yosemite-phone-home ">spionaggio di cui Apple non ha mai parlato</a>. 166 | Various operations in <a | href="http{+s+}://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"> | the latest MacOS send reports to Apple</a> servers. Various operations in <a href=" https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 "> the latest MacOS send reports to Apple</a> servers. Varie operazioni nell'<a href=" http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 ">ultima versione di MacOS inviano dei resoconti ai server di Apple</a>. 167 | Apple can, and regularly does, <a | [-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">-] | {+href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">+} | remotely extract some data from iPhones for the state</a>. Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. Apple può (e spesso lo fa) <a href=" http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ ">estrarre dati dagli iPhone a distanza per il governo</a>. 168 | This may have improved with <a | [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-] | {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+} | iOS 8 security improvements</a>; but <a | [-href="https://firstlook.org/theintercept/2014/09/22/apple-data/">-] | {+href="https://theintercept.com/2014/09/22/apple-data/">+} not as much | as Apple claims</a>. This may have improved with <a href=" https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/ "> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. Questo potrebbe essere cambiato con <a href=" http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html ">i miglioramenti di sicurezza di iOS8</a>; ma <a href=" https://firstlook.org/theintercept/2014/09/22/apple-data ">meno di quanto affermato da Apple</a>. 169 | <a | href="http{+s+}://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"> | Several &ldquo;features&rdquo; of iOS seem to exist for no possible | purpose other than surveillance</a>. Here is the <a | href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> | Technical presentation</a>. <a href=" https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services "> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. <a href=" http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services ">Molte &ldquo;funzionalità&rdquo; di iOS sembrano esistere al solo possibile scopo di permettere la sorveglianza</a>. Ecco la <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">presentazione tecnica</a>. 170 | [-Spyware in MacOS:-]<a | href="http{+s+}://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> | Spotlight search</a> sends users' search terms to Apple. <a href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> Spotlight search</a> sends users' search terms to Apple. Spyware in MacOS: <a href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html ">Spotlight</a> invia i termini di ricerca degli utenti ad Apple. 171 | The <a class="not-a-duplicate" | href="http{+s+}://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> | iBeacon</a> lets stores determine exactly where the iThing is, and get | other info too. The <a class="not-a-duplicate" href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. Gli <a class="not-a-duplicate" href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> permettono ai negozi di determinare esattamente dove i vari iGadget si trovano e di avere altre informazioni. 172 | <a | [-href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">-] | {+href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">+} | Either Apple helps the NSA snoop on all the data in an iThing, or it is | totally [-incompetent.</a>-] {+incompetent</a>.+} <a href=" https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep "> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. <a href=" http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep ">O Apple aiuta l'NSA a curiosare tra tutti i dati in un iGadget, o è davvero del tutto incompetente</a>. 173 | The iThing also <a | [-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">-] | {+href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">+} | tells Apple its geolocation</a> by default, though that can be turned off. The iThing also <a href=" https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ "> tells Apple its geolocation</a> by default, though that can be turned off. Ciascuno dei vari iGadget, come impostazione predefinita, <a href=" https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ ">comunica ad Apple anche la sua posizione geografica</a>, anche se questo può essere disabilitato. 174 | There is also a feature for web sites to track users, which is <a | href="http{+s+}://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"> | enabled by default</a>. (That article talks about iOS 6, but it is still | true in iOS 7.) There is also a feature for web sites to track users, which is <a href=" https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ "> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) Esiste anche una funzionalità che permette ai siti web di tracciare gli utenti, che è <a href=" http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ ">abilitata di default</a>. (Quell'articolo parla di iOS 6 ma vale anche per iOS 7.) 175 | Users cannot make an Apple ID (<a | [-href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary-] | {+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary+} | to install even gratis apps</a>) without giving a valid email address and | receiving the verification code Apple sends to it. Users cannot make an Apple ID (<a href=" https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id ">necessary to install even gratis apps</a>) without giving a valid email address and receiving the verification code Apple sends to it. Gli utenti non possono creare una ID di Apple (che serve <a href=" http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool ">anche se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail valido e convalidarlo tramite un codice che Apple invia a tale indirizzo. 177 | [-<a href="#tyrants">Tyrants</a>&mdash;systems-]{+Tyrants are systems+} | that reject any operating system not &ldquo;authorized&rdquo; by the | manufacturer. Tyrants are systems that reject any operating system not &ldquo;authorized&rdquo; by the manufacturer. <a href=" #tyrants ">Tiranni</a>&mdash;sistemi che vietano l'installazione di sistemi operativi non “autorizzati” dal produttore. 178 Apple devices lock users in <a href=" https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347 "> solely to Apple services</a> by being designed to be incompatible with all other options, ethical or unethical. 179 | Apple arbitrarily <a | [-href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"> | blocks-] | {+href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks+} | users from installing old versions of iOS</a>. Apple arbitrarily <a href=" https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/ ">blocks users from installing old versions of iOS</a>. Apple <a href=" http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/ ">non permette agli utenti di installare versioni precedenti di iOS</a>. 183 || No change detected. The change might only be in amounts of spaces. Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. Le traduzioni italiane sono effettuate ponendo la massima attenzione ai dettagli e alla qualità, ma a volte potrebbero contenere imperfezioni. Se ne riscontrate, inviate i vostri commenti e suggerimenti riguardo le traduzioni a <a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a> oppure contattate direttamente il <a href=" http://savannah.gnu.org/projects/www-it/ ">gruppo dei traduttori italiani</a>.<br/>Per informazioni su come gestire e inviare traduzioni delle nostre pagine web consultate la <a href="/server/standards/README.translations.html">Guida alle traduzioni</a>. 185 | This page is licensed under a <a rel="license" | [-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative-] | {+href="http://creativecommons.org/licenses/by/4.0/">Creative+} Commons | [-Attribution-NoDerivatives-] {+Attribution+} 4.0 International | License</a>. This page is licensed under a <a rel="license" href=" http://creativecommons.org/licenses/by/4.0/ ">Creative Commons Attribution 4.0 International License</a>. Questa pagina è distribuita secondo i termini della licenza <a rel="license" href=" http://creativecommons.org/licenses/by-nd/4.0/ ">Creative Commons Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0). ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/it/proprietary/malware-apple.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213369 documents and 1081681 words.