<!--#include virtual="/server/header.html" virtual="/server/html5-header.html" -->
<!-- Parent-Version: 1.84 1.86 -->
<!-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                  Please do not edit <ul class="blurbs">!
    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
           See explanations in /proprietary/workshop/README.md.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-->
<title>Proprietary Software
- GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary.translist" -->
<style type="text/css" media="print,screen">
div.companies
<!--
#skiplinks .button { float: right; margin-bottom: left; margin: .5em; }
div.malfunctions
#skiplinks .button a { display: inline-block; }
table#TOC {
   display: block;
   max-width: 27em; 100%;
   overflow: auto;
   margin: 2.5em auto;
   background: #f5f5f5;
}
<!--
div.toc h3
#TOC th {
   text-align: left; font-size: 1.2em; 1.1em; }
#TOC th, #TOC td { padding: 0 .83em;
   margin: .5em 1.5% 1em; .7em; text-align: center; }
div.toc
#TOC ul { padding-bottom: .5em; }
#TOC ul li { margin: .5em 0; list-style: none; margin-bottom: 1em; }
div.toc
#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
#TOC { margin-top: 1em; width: 55em; }
--></style>
</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>

<div id="skiplinks">
<p class="button"><a href="#TOC">Table of contents</a></p>
<p class="button"><a href="#latest">Latest additions</a></p>
</div>
<div style="clear: both"></div>

<p>Proprietary software, also called nonfree software,
means software that doesn't
<a href="/philosophy/free-sw.html">respect users' freedom and
community</a>.  A proprietary program puts its developer or owner
<a href="/philosophy/free-software-even-more-important.html">
in a position of power over its users.</a>
This power is in itself an injustice.</p>

<p>The point of this page is that the initial injustice of proprietary
software often leads to further injustices: malicious
functionalities.</p>

<p>Power corrupts; the proprietary program's developer is tempted to
design the program to mistreat its users.  (Software whose functioning
mistreats the user is called <em>malware</em>.)  Of course, the
developer usually does not do this out of malice, but rather to profit
more at the users' expense.  That does not make it any less nasty or
more legitimate.</p>

<p>Yielding to that temptation has become ever more frequent; nowadays
it is standard practice.  Modern proprietary software is typically
a way to be had.</p>

<p>As of April, 2017, 2019, the files pages in this directory list around 300 400
instances of malicious functionalities, functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know about.</p>

<div class="toc">
<div class="companies">
<h3>Company

<table id="TOC">
 <tr>
  <th>Injustices or type of product</h3> techniques</th>
  <th>Products or companies</th>
 </tr>
 <tr>
  <td>
   <ul>
    <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li> href="/proprietary/proprietary-addictions.html">Addictions</a></li>
    <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li> href="/proprietary/proprietary-back-doors.html">Back doors</a> (<a href="#f1">1</a>)</li>
    <li><a href="/proprietary/malware-google.html">Google Malware</a></li> href="/proprietary/proprietary-censorship.html">Censorship</a></li>
    <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li> href="/proprietary/proprietary-coverups.html">Coverups</a></li>
    <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li> href="/proprietary/proprietary-deception.html">Deception</a></li>
    <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li> href="/proprietary/proprietary-drm.html">DRM</a> (<a href="#f2">2</a>)</li>
    <li><a href="/proprietary/malware-mobiles.html">Malware in mobile devices</a></li> href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
    <li><a href="/proprietary/malware-games.html">Malware in games</a></li> href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
    <li><a href="/proprietary/malware-appliances.html">Malware in appliances</a></li> href="/proprietary/proprietary-interference.html">Interference</a></li>
    <li><a href="/proprietary/malware-cars.html">Malware in cars</a></li> href="/proprietary/proprietary-jails.html">Jails</a> (<a href="#f3">3</a>)</li>
    <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
    <li><a href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
    <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
    <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a href="#f4">4</a>)</li>
    <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a href="#f5">5</a>)</li>
    <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
   </ul>
</div>

<div class="malfunctions">
<h3>Type of malware</h3>
  </td>
  <td>
   <ul>
    <li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li> href="/proprietary/malware-appliances.html">Appliances</a></li>
    <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li> href="/proprietary/malware-cars.html">Cars</a></li>
    <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li> href="/proprietary/malware-games.html">Games</a></li>
    <li><a href="/proprietary/proprietary-deception.html">Deception</a></li> href="/proprietary/malware-mobiles.html">Mobiles</a></li>
    <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li> href="/proprietary/malware-webpages.html">Webpages</a></li>
   </ul>
   <ul>
    <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li> href="/proprietary/malware-adobe.html">Adobe</a></li>
    <li><a href="/proprietary/proprietary-interference.html">Interference</a></li> href="/proprietary/malware-amazon.html">Amazon</a></li>
    <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li> href="/proprietary/malware-apple.html">Apple</a></li>
    <li><a href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li> href="/proprietary/malware-google.html">Google</a></li>
    <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> href="/proprietary/malware-microsoft.html">Microsoft</a></li>
   </ul>
  </td>
 </tr>
 <tr>
  <td colspan="2">
   <ol>
    <li id="f1"><em>Back door:</em>  any feature of a program
     that enables someone who is not supposed to
servers</li>
<li><a href="/proprietary/proprietary-drm.html">Digital be in control of the
     computer where it is installed to send it commands.</li>

    <li id="f2"><em>Digital restrictions
    management</a> management, or “DRM” means
     “DRM”:</em>  functionalities designed to restrict
     what users can do with the data in their computers.</li>
<li><a href="/proprietary/proprietary-jails.html">Jails</a>—systems

    <li id="f3"><em>Jail:</em>  system that impose imposes censorship on
     application programs.</li>
<li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems

    <li id="f4"><em>Tether:</em>  functionality that requires
     permanent (or very frequent) connection to a server.</li>

    <li id="f5"><em>Tyrant:</em>  system that reject rejects any operating
     system not “authorized” by the manufacturer.</li>
<li><a href="/proprietary/potential-malware.html">Potential Malware</a></li>
</ul>
</div>
</div>
   </ol>
  </td>
 </tr>
</table>

<p>Users of proprietary software are defenseless against these forms
of mistreatment.  The way to avoid them is by insisting on
<a href="/philosophy/free-software-even-more-important.html">free
(freedom-respecting) software.</a> software</a>.  Since free software is controlled
by its users, they have a pretty good defense against malicious
software functionality.</p>


<h3 id="latest">Latest additions</h3>

<ul class="blurbs">
  <li id="M201904210">
    <p>As of April 2019, it is <a
    href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
    longer possible to disable an
    unscrupulous tracking anti-feature</a> that <a
    href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
    users when they follow ping links</a> in Apple Safari, Google Chrome,
    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
    going to be based on Chromium.</p>
  </li>

  <li id="M201904131">
    <p>Data collected by menstrual and pregnancy monitoring apps is often <a
    href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
    available to employers and insurance companies</a>. Even though the
    data is “anonymized and aggregated,” it can easily be
    traced back to the woman who uses the app.</p>

    <p>This has harmful implications for women's rights to equal employment
    and freedom to make their own pregnancy choices. Don't use
    these apps, even if someone offers you a reward to do so.</p>
  </li>

  <li id="M201904041">
    <p>Microsoft has been  <a
    href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
    force-installing a “remediation”
    program</a> on computers running certain
    versions of Windows 10. Remediation, in Microsoft's view, means <a
    href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up2019-04-04">
    tampering with users' settings and files</a>, notably to
    “repair” any components of the updating system that users
    may have intentionally disabled, and thus regain full power over
    them. Microsoft repeatedly pushed faulty versions of this program to
    users' machines, causing numerous problems, some of which <a
    href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
    critical</a>.</p>

    <p>This exemplifies the arrogant and manipulative attitude
    that proprietary software developers have learned to adopt
    toward the people they are supposedly serving. Migrate to a <a
    href="/distros/free-distros.html">free operating system</a> if you
    can!</p>

    <p>If your employer makes you run Windows, tell the financial
    department how this wastes your time dealing with endless connections
    and premature hardware failures.</p>
  </li>

  <li id="M201904150">
    <p id="M201509210">Volkswagen programmed its car engine computers to <a
    href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
    detect the Environmental Protection Agency's emission tests</a>, and
    run dirty the rest of the time. In real driving, the cars exceeded
    emissions standards by a factor of up to 35.</p>

    <p>Using free software would not have stopped Volkswagen from
    programming it this way, but would have made it harder to conceal,
    and given the users the possibility of correcting the deception.</p>

    <p>Former executives of Volkswagen are being <a
    href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
    sued over this fraud</a>.</p>
  </li>

  <li id="M201904130">
    <p>Google tracks the movements of Android phones, and sometimes <a
    href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
    saves the data for years</a>.</p>

    <p>Nonfree software in the phone has to be responsible for sending
    the location data to Google.</p>
  </li>
</ul>


</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
<div class="unprintable">

<p>Please send general FSF & GNU inquiries to
<a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>.
There are also <a href="/contact/">other ways to contact</a>
the FSF.  Broken links and other corrections or suggestions can be sent
to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p>

<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
        replace it with the translation of these two:

        We work hard and do our best to provide accurate, good quality
        translations.  However, we are not exempt from imperfection.
        Please send your comments and general suggestions in this regard
        to <a href="mailto:web-translators@gnu.org">
        <web-translators@gnu.org></a>.</p>

        <p>For information on coordinating and submitting translations of
        our web pages, see <a
        href="/server/standards/README.translations.html">Translations
        README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
README</a> for information on coordinating and submitting translations
of this article.</p>
</div>

<!-- Regarding copyright, in general, standalone pages (as opposed to
     files generated as part of manuals) on the GNU web server should
     be under CC BY-ND 4.0.  Please do NOT change or remove this
     without talking with the webmasters or licensing team first.
     Please make sure the copyright date is consistent with the
     document.  For web pages, it is ok to list just the latest year the
     document was modified, or published.

     If you wish to list earlier years, that is ok too.
     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
     years, as long as each year in the range is in fact a copyrightable
     year, i.e., a year in which the document was published (including
     being publicly visible on the web or in a revision control system).

     There is more detail about copyright years in the GNU Maintainers
     Information document, www.gnu.org/prep/maintain. -->

<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 2018, 2019 Free Software Foundation, Inc.</p>

<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
Commons Attribution-NoDerivatives 4.0 International License</a>.</p>

<!--#include virtual="/server/bottom-notes.html" -->

<p class="unprintable">Updated:
<!-- timestamp start -->
$Date: 2019/04/22 15:31:41 $
<!-- timestamp end -->
</p>
</div>
</div>
</div><!-- for class="inner", starts in the banner include -->
</body>
</html>