malware-apple.de.po

Mismatched links: 161.

Mismatched ids: 2.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| company&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By company&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
16 | <a [-href="#back-doors">Back doors</a>-] {+href="#drm">DRM</a>+} 
<a href="#drm">DRM</a> 
<a href="#back-doors">Hintertüren</a> 
20 | <a [-href="#deception">Deception</a>-] {+href="#jails">Jails</a>+} 
<a href="#jails">Jails</a> 
<a href="#deception">Täuschung</a> 
21 | <a [-href="#deception">Deception</a>-]
| {+href="#manipulation">Manipulation</a>+} 
<a href="#manipulation">Manipulation</a> 
<a href="#deception">Täuschung</a> 
26 | <a [-href="#sabotage">Sabotage</a>-] {+href="#tyrants">Tyrants</a>+} 
<a href="#tyrants">Tyrants</a> 
<a href="#sabotage">Sabotage</a> 
28  
Apple appears to say that <a href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"> there is a back door in MacOS</a> for automatically updating some (all?) apps. 
 
30 | The Dropbox app for Macintosh <a
| [-href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">-]
| {+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">+}
| takes control of user interface items after luring the user into entering
| an admin password</a>. 
The Dropbox app for Macintosh <a href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"> takes control of user interface items after luring the user into entering an admin password</a>. 
Dropbox-App für Macintosh <a href="//applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/" title="Revealing Dropbox’s Dirty Little Security Hack, unter: applehelpwriter.com 2016.">übernimmt Kontrolle über Elemente der Benutzeroberfläche nachdem Nutzer zur Eingabe eines Administratorpassworts geködert wurden</a>. 
32  
The iPhone has a back door for <a href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"> remote wipe</a>. It's not always enabled, but users are led into enabling it without understanding. 
Das iPhone enthält eine Hintertür zur <a href="//www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone" title="Martin Kaste, Wipeout: When Your Company Kills Your iPhone, unter: npr.org 2010.">Fern-Löschung</a>. Sie ist nicht immer aktiviert, aber Nutzer werden dazu angehalten sie ohne es wirklich zu verstehen zu aktivieren. 
33 || No change detected. The change might only be in amounts of spaces. 
The iPhone has a back door <a href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"> that allows Apple to remotely delete apps</a> which Apple considers &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power because of course we can trust Apple. 
Das iPhone hat eine Hintertür, die <a href="//www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html" title="Apple's Jobs confirms iPhone 'kill switch', unter: telegraph.co.uk 2008.">Apple per Fernzugriff das Löschen von Apps erlaubt</a>, die als „unangemessen“ betrachtet werden. Steve Jobs<ins>, damaliger Apple-CEO,</ins> sagte, es sei <em>für Apple in Ordnung diese Macht zu haben</em>, weil wir Apple selbstverfreilich vertrauen können.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a> 
37 | [-<a href="#drm">Digital-]{+Digital+} restrictions [-management</a>-]
| {+management,+} or [-&ldquo;DRM&rdquo; means-] {+&ldquo;DRM,&rdquo; refers
| to+} functionalities designed to restrict what users can do with the data
| in their computers. 
Digital restrictions management, or &ldquo;DRM,&rdquo; refers to functionalities designed to restrict what users can do with the data in their computers. 
<a href="#drm">Digitale Rechte-Minderung (DRM)</a><br />oder <em>Digitale Beschränkungsverwaltung</em><br />&#8209;&#160;Funktionen, entwickelt um zu beschränken, was Nutzer mit den Daten auf ihren Rechnern tun können. 
38  
Apple's new tactic to restrict users from repairing their own device and impose DRM on people is to <a href="https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever">completely disable its Face ID functionality</a> when you replace its screen. 
 
39  
Apple is putting DRM on iPhone batteries, and the system proprietary software <a href="#M201908150">turns off certain features when batteries are replaced other than by Apple.</a> 
 
40  
DRM makes the iPhone 7 nearly <a href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple. 
 
41 | <a
| [-href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">-]
| {+href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">+}
| Apple uses DRM software to prevent people from charging an iThing with a
| generic USB cable</a>. 
<a href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"> Apple uses DRM software to prevent people from charging an iThing with a generic USB cable</a>. 
<a href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017" title="John Wenz, Switzerland Wants a Single, Universal Phone Charger by 2017, Vice Media 2016.">Apple nutzt DRM, um das Aufladen eines iDings mit einem universellen USB-Kabel zu verhindern</a>. 
43  
<a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"> DRM that caters to Bluray disks</a>. (The article focused on Windows and said that MacOS would do the same thing subsequently.) 
<a href="//arstechnica.com/apple/2007/08/aacs-tentacles/" title="AACS DRM tentacles reach far into operating systems, unter: arstechnica.com 2007.">DRM, das sich nach Blu-ray-Speichermedien richtet</a> (der Artikel konzentriert sich auf Windows und besagt, dass Mac OS anschließend dasselbe tun würde). 
44  
iTunes videos have DRM, which allows Apple to <a href="https://en.wikipedia.org/wiki/FairPlay">dictate where its customers can watch the videos they purchased</a>. 
iTunes-<ins>Mediendateien</ins> kommen mit DRM, wodurch Apple <a href="https://de.wikipedia.org/wiki/FairPlay">diktieriert wo(mit) man seine gekauften Mediendateien abspielt</a>. 
49 (https://en.wikipedia.org/wiki/IWork#cite_ref-22)
-> ??? „provides no means of converting them to or from Open Document Formats“ 
iWork (office software that runs on MacOS, iOS and iCloud) uses secret formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no means of converting them to or from Open Document Formats</a>. iWork formats have changed several times since they were first introduced. This may have had the effect of thwarting <a href="https://github.com/obriensp/iWorkFileFormat">reverse engineering efforts</a>, thus preventing free software from fully supporting them. 
iWork (Office-Software, die unter MacOS, iOS und iCloud läuft) verwendet geheime Formate und <a href="https://en.wikipedia.org/wiki/IWork#cite_ref-22">bietet keine Möglichkeit, sie in oder aus dem Open-Document-Format zu konvertieren</a>. iWork-Formate haben sich seit ihrer ersten Einführung mehrfach geändert. Dies hat möglicherweise <a href="https://github.com/obriensp/iWorkFileFormat">Reverse-Engineering-Bemühungen</a> vereiteln können, was verhinderte, dass Freie Software diese vollständig unterstützt. 
53  
<a href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"> The pegasus spyware used vulnerabilities on proprietary smartphone operating systems</a> to impose surveillance on people. It can record people's calls, copy their messages, and secretly film them, using a security vulnerability. There's also <a href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"> a technical analysis of this spyware</a> available in PDF format. 
 
55 | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
| term <a
| href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+wrongly refers to crackers as &ldquo;<a
| href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small>
| +} 
<small>Please note that the article wrongly refers to crackers as &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
56  
Commercial crackware can <a href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say"> get passwords out of an iMonster</a>, use the microphone and camera, and other things. 
 
57  
Apple has <a href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 
 
59  
A series of vulnerabilities <a href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found in iOS allowed attackers to gain access to sensitive information including private messages, passwords, photos and contacts stored on the user's iMonster</a>. 
 
63 | <a
| [-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">-]
| {+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">+}
| The NSA can tap data in smart phones, including iPhones, Android, and
| BlackBerry</a>. While there is not much detail here, it seems that this
| does not operate via the universal back door that we know nearly all
| portable phones have. It may involve exploiting various bugs. There are
| <a
| href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
| lots of bugs in the phones' radio software</a>. 
<a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"> lots of bugs in the phones' radio software</a>. 
<a href="//www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">Der US-Geheimdienst NSA kann sich Zugang zu iPhone- und BlackBerry-Geräten sowie zu Geräten mit Android-Betriebssystem verschaffen</a>. Es gibt zwar kaum Details, es scheint aber, dass dies nicht über die universelle Hintertür funktioniert, von der wir wissen, dass sie nahezu alle tragbaren Telefone haben. Dies kann verschiedene ausnutzbare Programmfehler einschließen. Es gibt viele <a href="//www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">Programmfehler in der Mobilfunksoftware von Mobiltelefonen</a>. 
66  
<a href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple">Apple is systematically undermining interoperability</a>. At the hardware level, it does this via nonstandard plugs, buses and networks. At the software level, it does this by not letting the user have any data except within one app. 
 
67  
Apple is putting DRM on iPhone batteries, and the system proprietary software <a href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns off certain features when batteries are replaced other than by Apple.</a> 
 
69 | [-<a href="#jails">Jails</a>&mdash;systems-]{+Jails are systems+} that
| impose censorship on application programs. 
Jails are systems that impose censorship on application programs. 
<a href="#jails">Gefängnisse</a><br />&#8209;&#160;Systeme, die Anwendungsprogrammen Zensur auferlegen. 
70  
Apple has made it <a href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"> impossible to load Navalny's tactical voting app into an iPhone</a> in Russia. 
 
72  
Apple plans to require that <a href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"> all application software for MacOS be approved by Apple first</a>. 
 
73  
Offering a checking service as an option could be useful and would not be wrong. Requiring users to get Apple's approval is tyranny. Apple says the check will only look for malware (not counting the malware that is <a href="/proprietary/malware-apple.html#TOC">part of the operating system</a>), but Apple could change that policy step by step. Or perhaps Apple will define malware to include any app that China does not like. 
 
75  
<a href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"> iOS, the operating system of the Apple iThings, is the prototype of a jail</a>. It was Apple that introduced the practice of designing general purpose computers with censorship of application programs. 
<a href="https://de.wikipedia.org/wiki/Jailbreak_(iOS)">iOS, das Betriebssystem der Apple iDinger, ist der Prototyp eines Gefängnisses</a>. Es war Apple, das die Praxis einführte, Allzweckcomputer mit der Zensur von Anwendungsprogrammen zu entwerfen. 
77  
Curiously, Apple is beginning to allow limited passage through the walls of the iThing jail: users can now install apps built from source code, provided the source code is written in Swift. Users cannot do this freely because they are required to identify themselves. <a href="https://developer.apple.com/xcode/">Here are details</a>. While this is a crack in the prison walls, it is not big enough to mean that the iThings are no longer jails. 
Kurioserweise beginnt Apple damit begrenzten Durchlass durch die Wände des iDing-Gefängnisses zuzulassen: Nutzer können Apps nun aus Quellcode installieren, vorausgesetzt der Quellcode ist mit <b>Swift</b><ins>, einer unfreien Programmiersprache speziell für die iDinger</ins> geschrieben. Selbstverständlich können Nutzer dies nicht frei tun, da eine Identifizierung erforderlich ist.<a href="https://de.wikipedia.org/wiki/Xcode">Mehr zu Xcode</a>. Dies stellt zwar ein Riss in den Gefängnismauern dar, jedoch nicht groß genug um anzudeuten, die iDinger seien keine Gefängnisse mehr. 
79  
The Russian communications watchdog <a href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"> tells Google and Apple to remove Navalny's app</a> from their stores. 
 
81  
Apple is <a href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers"> putting the squeeze on all business</a> conducted through apps for iMonsters. 
 
83  
Apple has <a href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism"> banned the app that Hong Kong protesters use to communicate</a>. 
 
85  
Apple <a href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"> censors the Taiwan flag in iOS</a> on behalf of the Chinese government. When the region is set to Hong Kong, this flag is not visible in the emoji selection widget but is still accessible. When the region is set to mainland China, all attempts to display it will result in the &ldquo;empty emoji&rdquo; icon as if the flag never existed. 
 
87  
Users caught in the jail of an iMonster are <a href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting ducks for other attackers</a>, and the app censorship prevents security companies from figuring out how those attacks work. 
 
92 (NYT: Censorship, access denied!) Set link to Internet Archive.
(http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html)
// Oh well, it [Russian Law] protects Russian citizens against USA spying!
// This aspect is much more important! Whoop-de-do!!! 
Apple used its censorship system to enforce Russian surveillance <a href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"> by blocking distribution of the LinkedIn app in Russia</a>. 
Apple-Zensur-System: <a href="https://web.archive.org/web/20170107012517/http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html" title="Russia Requires Apple and Google to Remove LinkedIn From Local App Stores, unter: NYTimes.com 2017 (Internet Archive).">LinkedIn-App in Russland blockiert</a>&#160;&#8209;&#160;um russische Überwachung durchzusetzen („Sperrung wegen ‚Datenschutz‘“). 
96  
Apple censors games, <a href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"> banning some games from the cr&hellip;app store</a> because of which political points they suggest. Some political points are apparently considered acceptable. 
Apple zensiert Spiele. Einige werden <a href="https://web.archive.org/web/20160602092236///arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/" title="Apple says game about Palestinian child isn’t a game, Ars Technica 2016 (Internet Archive).">aufgrund politischer Ansichten im App Store verboten</a>, einige werden offenbar als akzeptabel betrachtet. 
97  
Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"> banned a program from the App Store</a> because its developers committed the enormity of disassembling some iThings. 
<a href="//ifixit.org/blog/7401/ifixit-app-pulled/" title="iFixit App Pulled from Apple’s Store, unter: ifixit.org 2015.">Ein Programm wurde aus dem App Store verbannt</a>, weil Entwickler die Ungeheuerlichkeit begingen, einige iDinger zu disassemblieren. 
98  
As of 2015, Apple <a href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"> systematically bans apps that endorse abortion rights or would help women find abortions</a>. 
(2015) Apple <a href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights" title="Jess Zimmerman, Apple, your anti-choice tendencies are showing in your app store, TheGuardian.com 2015.">blockiert systematisch Apps, die das Recht auf Schwangerschaftsabbrüche befürworten oder jegliche Suche danach unterstützen würden</a>. 
99  
This particular political slant <a href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"> affects other Apple services</a>. 
Diese besondere politische Schräge <a href="//www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions" title=" Siri's abortion bias embarrasses Apple as it rues 'unintentional omissions', unter: //www.theguardian.com 2011.">beeinflusst auch andere Apple-Dienste</a>. 
100  
Apple has banned iThing applications that show the confederate flag. <a href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"> Not only those that use it as a symbol of racism</a>, but even strategic games that use it to represent confederate army units fighting in the Civil War. 
Apple hat iDings-Anwendungen verboten, die die Konföderiertenflagge zeigen. <a href="https://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">Nicht nur diejenigen, die es als Symbol für Rassismus benutzen</a>, sondern sogar strategische Spiele, die es benutzen, um die im Bürgerkrieg kämpfenden Truppeneinheiten der Konföderation zu repräsentieren. 
102 (" ") unnecessary inconvenience!!! 
<a href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"> More examples of Apple's arbitrary and inconsistent censorship</a>. 
<a href="//www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans" title="Papers, Please app approved for iPad, but without nude body-scans, unter: theguardian.com 2014.">Weitere Beispiele für Apples willkürliche und wechselhafte Zensur</a>. 
103  
Apple used this censorship power in 2014 to <a href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"> ban all bitcoin apps</a> for the iThings for a time. It also <a href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"> banned a game about growing marijuana</a>, while permitting games about other crimes such as killing people. Perhaps Apple considers killing more acceptable than marijuana. 
Apple benutzte 2014 diese Zensurmacht, um <a href="https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html" title="Apple yanks last remaining bitcoin wallet, Boing Boing 2014.">alle Bitcoin-Apps für die iThings zeitweilig zu sperren</a>. <a href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/" title="Apple removes game about growing marijuana from App Store, CBS Interactive 2018.">Ebenso ein Spiel über den Anbau von Marihuana</a>, Spiele über andere Verbrechen wie dem Töten von Menschen jedoch nicht. Vielleicht hält Apple Töten für akzeptabler als Marihuana? 
104  
Apple rejected an app that displayed the locations of US drone assassinations, giving various excuses. Each time the developers fixed one &ldquo;problem&rdquo;, Apple complained about another. After the fifth rejection, Apple <a href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"> admitted it was censoring the app based on the subject matter</a>. 
Mit fadenscheinigen Ausflüchten wurde eine Applikation abgewiesen, die die Positionen von US-Drohnen-Attentaten angab. Haben die Entwickler ein „Problem“ behoben, wurde sich jedes Mal über etwas anderes beklagt. Nach der 5. Abweisung gab Apple dann zu, dass die App <a href="https://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/" title="After 5 Rejections, Apple Accepts App That Tracks U.S. Drone Strikes, Mashable 2014.">aufgrund der App selbst zensiert</a> wurde. 
106  
&ldquo;Dark patterns&rdquo; are <a href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user interfaces designed to mislead users, or make option settings hard to find</a>. 
„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a href="//www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you" title=" Harry Brignull, Dark Patterns: inside the interfaces designed to trick you, unter: The Verge, theverge.com 2013.">in die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu machen. 
110  
Apple Siri <a href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses to give you information</a> about music charts if you're not an Apple Music subscriber. 
Die Spracherkennungssoftware Siri <a href="//www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions" title="Not an Apple Music subscriber? Expect some attitude from Siri , unter: theguardian.com 2015.">verweigert Informationen zu Musik-Charts</a>, sofern man nicht Abonnent des Musikstreaming-Dienstes Apple Music ist. 
113  
When Apple suspects a user of fraud, it judges the case secretly and presents the verdict as a fait accompli. The punishment to a user found guilty <a href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is being cut off for life, which more-or-less cripples the user's Apple devices forever</a>. There is no appeal. 
 
114  
Apple and Samsung deliberately <a href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade the performance of older phones to force users to buy their newer phones</a>. 
 
117  
The Telegram client is free software on other platforms, but not on iThings. Since <a href="/proprietary/proprietary-jails.html#apple">they are jails</a>, they don't permit any app to be free software. 
Auf anderen Plattformen ist Telegram Freie Software, nicht aber auf den iDingern. Da <a href="/proprietary/proprietary-jails#apple">sie Gefängnisse sind</a>, ist keiner App erlaubt, Freie Software zu sein. 
118 | MacOS High Sierra forcibly reformats SSD boot drives, and <a
| [-href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">-]
| {+href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">+}
| changes the file system from HFS+ to APFS</a>, which cannot be accessed
| from GNU/Linux, Windows or even older versions of MacOS. 
MacOS High Sierra forcibly reformats SSD boot drives, and <a href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"> changes the file system from HFS+ to APFS</a>, which cannot be accessed from GNU/Linux, Windows or even older versions of MacOS. 
MacOS High Sierra formatiert SSD-Boot-Laufwerke zwangsweise neu und <a href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">ändert das Dateisystem von HFS+ auf APFS</a>, auf das von GNU/Linux, Windows oder älteren MacOS-Versionen nicht zugegriffen werden kann. 
121 | The iPhone 7 contains DRM specifically designed to <a
| [-href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">-]
| {+href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">+}
| brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
| &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple. 
The iPhone 7 contains DRM specifically designed to <a href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>. &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple. 
Das iPhone 7 enthält DRM, speziell für den Fall entwickelt es <a href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock" hreflang="en">zu schrotten, wenn eine „unautorisierte“ Reparaturwerkstatt es repariert</a>. „Unautorisiert“ bedeutet im Grunde genommen jeder außer Apple. 
122 | [-The-]{+<small>(The+} article uses the term &ldquo;lock&rdquo; to
| describe the DRM, but we prefer to use the term <a
| [-href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">-]
| {+href="/philosophy/words-to-avoid.html#DigitalLocks">+} digital
| [-handcuffs</a>.-] {+handcuffs</a>.)</small>+} 
<small>(The article uses the term &ldquo;lock&rdquo; to describe the DRM, but we prefer to use the term <a href="/philosophy/words-to-avoid.html#DigitalLocks"> digital handcuffs</a>.)</small> 
Der Artikel verwendet zum Beschreiben von DRM den Begriff <em><span xml:lang="en" lang="en">Lock</span></em> (‚Sperre‘), allerdings wird empfohlen <em><a href="/philosophy/words-to-avoid#DigitalLocks">Digitale Handschellen</a></em> zu bevorzugen. 
123 | Apple <a
| [-href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">stops-]
| {+href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
| stops+} users from fixing the security bugs in Quicktime for Windows</a>,
| while refusing to fix them itself. 
Apple <a href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"> stops users from fixing the security bugs in Quicktime for Windows</a>, while refusing to fix them itself. 
Apple <a href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/" title="Uninstall QuickTime for Windows: Apple will not patch its security bugs, unter: The Register, theregister.co.uk 2016.">verhindert Beseitigung von Sicherheitslücken in Quicktime für Windows durch Benutzer</a>, weigert sich aber auch selbst die Lücke zu beheben. 
124 | The Apple Music client program <a
| [-href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans-]
| {+href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans+}
| the user's file system for music files, copies them to an Apple server,
| and deletes them</a>. 
The Apple Music client program <a href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans the user's file system for music files, copies them to an Apple server, and deletes them</a>. 
Das Clientprogramm <b>Apple Music</b> <a href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/" title="jamespinkstone, Apple Stole My Music. No, Seriously, unter: blog.vellumatlanta.com 2016.">durchsucht das Dateisystem des Benutzers nach Musikdateien, kopiert sie auf einen Apple-Server und löscht sie</a>. 
125 http://heise.de/-3096123 
iOS version 9 for iThings <a href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages them irreparably if they were repaired by someone other than Apple</a>. Apple eventually backed off from this policy under criticism from the users. However, it has not acknowledged that this was wrong. 
<a href="//www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair" title="Miles Brignall, ‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6, The Guardian 2016.">iOS 9 sabotiert iDinger irreparabel</a>, sofern sie durch „nicht autorisierte“ Dritt-Anbieter repariert wurden. Apple wich schließlich von dieser Politik nach Kritik von Nutzern ab, bestätigte jedoch nicht, dass dies falsch war. 
127 (" ") unnecessary inconvenience!!! 
Apple <a href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"> deleted from iPods the music that users had got from internet music stores that competed with iTunes</a>. 
Apple <a href="//www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs" title="Apple deleted music from users’ iPods purchased from rivals, court told, unter: theguardian.com 2014.">löschte auf iPods die Musik, die sich Nutzer über mit iTunes im Wettbewerb stehende Internetmusikhändler besorgt hatten</a>. 
128 | <a
| [-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">-]
| {+href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">+}
| An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
| [-unlocked.</a>-] {+unlocked</a>.+} The &ldquo;upgrade&rdquo; also
| deactivated applications not approved by <a
| href="/proprietary/proprietary-jails.html">Apple censorship</a>. All
| this was apparently intentional. 
<a href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"> An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been unlocked</a>. The &ldquo;upgrade&rdquo; also deactivated applications not approved by <a href="/proprietary/proprietary-jails.html">Apple censorship</a>. All this was apparently intentional. 
<a href="//www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html" title="Update: Apple plays hardball: Upgrade 'bricks' unlocked iPhones, unter: computerworld.com 2007.">Apple-Firmware-„Verbesserung“ schrottet entsperrte iPhones</a>. Die „Verbesserung“ deaktivierte ebenfalls nicht durch die <a href="/proprietary/proprietary-jails">Apple-Zensur</a> gebilligte Applikationen. Scheinbar war das alles beabsichtigt. 
130  
Apple can remotely <a href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games"> cut off any developer's access to the tools for developing software</a> for iOS or MacOS. 
 
131  
Epic (Apple's target in this example) makes nonfree games which have their own <a href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/"> malicious features</a>, but that doesn't make it acceptable for Apple to have this sort of power. 
 
133  
<a href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 
 
134  
Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 
 
137  
Google, Apple, and Microsoft (and probably some other companies) <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are collecting people's access points and GPS coordinates (which can identify people's precise location) even if their GPS is turned off</a>, without the person's consent, using proprietary software implemented in person's smartphone. Though merely asking for permission would not necessarily legitimize this. 
 
138  
Safari occasionally <a href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 
 
139  
The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 
 
140  
Note: The <a href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 
 
141  
In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"> sending users' personal information to third parties</a>. 
 
143  
Adware Doctor, an ad blocker for MacOS, <a href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports the user's browsing history</a>. 
 
151  
(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; 
Quelle: <a href="https://www.apple.com/de/icloud/photos/">Apple – iCloud – Fotos:</a>, unter: https://www.apple.com/de/icloud/photos. (abgrufen: 2015-09-24)<br />Das iCloud-Feature wird <a href="https://support.apple.com/en-us/HT202033">beim Startvorgang von iOS aktiviert</a>. Der Begriff <em>„Cloud“</em> bzw. <em>„Datenwolke“</em> bedeutet soviel wie: <em>‚Bitte stell’ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet werden)</ins>.‘</em> 
152 Bad: Handshake tries in the old style (vulnerable to attack) …
… and there’re tips only. but "deactivate iCloud". 
There is a way to <a href="https://support.apple.com/en-us/HT201104"> deactivate iCloud</a>, but it's active by default so it still counts as a surveillance functionality. 
Es gibt eine Möglichkeit, <a href="https://support.apple.com/de-de/HT201104" title="Häufig gestellte Fragen zu iCloud Drive, unter: https://support.apple.com/de-de/HT201104">iCloud deaktivieren</a> zu können, sie ist jedoch standardmäßig aktiviert, so dass sie noch immer als Überwachungsfunktion gewertet wird. 
154 (" ") unnecessary inconvenience!!!#. type: Content of: <ul><li><p> 
Apple has made various <a href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. 
Apple hat verschiedenen <a href="//www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud" title="Apple users raise privacy concerns after hard-drive files uploaded to servers, unter: theguardian.com 2014.">Mac OS-Programmen Dateien an Apple-Server ohne vorherige Zustimmung senden lassen</a>. Das setzt die Dateien dem Großen Bruder und vielleicht anderen Schnüffeleien aus. 
156 | [-<a
| href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">-]MacOS
| automatically {+<a
| href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">+}
| sends to Apple servers unsaved documents being edited</a>. The [-<a
| href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter">-]
| things you have not decided to save are {+<a
| href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">+}
| even more [-sensitive-] {+sensitive</a>+} than the things you have stored
| in [-files</a>.-] {+files.+} 
MacOS automatically <a href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"> sends to Apple servers unsaved documents being edited</a>. The things you have not decided to save are <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"> even more sensitive</a> than the things you have stored in files. 
<a href="//www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/" title="How one man’s private files ended up on Apple’s iCloud without his consent, unter: washingtonpost.com 2014.">Mac OS: [iCloud-Apps] speicherm <em>ungesicherte</em> Dokumente automatisch in iCloud</a>. Die <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter" title="Apple Copies Your Files Without Your Knowledge or Consent, unter: schneier.com 2014.">Dinge, bei denen man sich entschieden hat sie nicht zu speichern, sind noch heikler als die Dinge, die man in Dateien gespeichert hat</a>. 
157 (" ") unnecessary inconvenience!!!#. type: Content of: <ul><li><p> 
Apple admits the <a href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"> spying in a search facility</a>, but there's a lot <a href="https://github.com/fix-macosx/yosemite-phone-home"> more snooping that Apple has not talked about</a>. 
Apple räumt die <a href="//www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/" title="Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?, unter: intego.com 2014.">Bespitzelung von Suchmöglichkeiten</a> ein, aber es gibt noch viel <a href="https://github.com/fix-macosx/yosemite-phone-home" title="fix-macosx/yosemite-phone-home, unter: github.com 2014.">mehr Schnüffelei, die Apple nicht erwähnt hat</a>. 
158  
Various operations in <a href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"> the latest MacOS send reports to Apple</a> servers. 
Verschiedene Vorgänge im <a href="//lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540" title="Safari and Spotlight Can Send Data to Apple, Here's How to Turn it Off. unter: lifehacker.com 2014.">neuesten Mac OS senden Berichte an Apple</a>-Server. 
159  
Apple can, and regularly does, <a href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"> remotely extract some data from iPhones for the state</a>. 
Apple kann <a href="//arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/" title="New guidelines outline what iPhone data Apple can give to police, unter: arstechnica.com 2014.">aus der Ferne irgendwelche Daten von iPhones für Vater Staat anzapfen</a>&#160;&#8209;&#160;und macht es regelmäßig. 
160 | This may have improved with <a
| [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-]
| {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+}
| iOS 8 security improvements</a>; but <a
| href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as
| much as Apple claims</a>. 
This may have improved with <a href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"> iOS 8 security improvements</a>; but <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as much as Apple claims</a>. 
Dies mag sich mit den jüngsten <a href="//www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html" title="Apple will no longer unlock most iPhones, iPads for police, even with search warrants, unter: washingtonpost.com 2014.">iOS 8-Sicherheitsverbesserungen</a> gebessert haben, allerdings <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/" title="Apple Still Has Plenty of Your Data for the Feds, unter: firstlook.org 2014.">nicht so sehr wie es Apple behauptet</a>. 
161  
<a href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. 
<a href="//www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services" title="iPhone 'backdoors' can be used for surveillance, warns researcher, unter: theguardian.com 2014.">Einige „Merkmale“ von iOS scheinen aus keinem anderen Zweck außer der Überwachung vorhanden zu sein</a>. Hier eine technische <a href="//www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf" type="application/pdf" title="Jonathan Zdziarski, Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices, unter: pentest.com 2014.">Präsentation</a>.<a href="#tn01" id="tn01-ref" class="transnote">[1]</a> 
162 (" ") unnecessary inconvenience!!!#. type: Content of: <ul><li><p>
| [-Spyware in MacOS:-]<a
| href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
| Spotlight search</a> sends users' search terms to Apple. 
<a href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> Spotlight search</a> sends users' search terms to Apple. 
Spionagesoftware in Mac OS: <a href="//finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html" title="Privacy advocates worry over new Apple iPhone tracking feature, unter: //finance.yahoo.com 2014.">Spotlight-Suche</a> sendet Suchbegriffe der Nutzer an Apple. 
163  
The <a class="not-a-duplicate" href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. 
<a href="//finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html" title="Privacy advocates worry over new Apple iPhone tracking feature, unter: finance.yahoo.com 2014." class="not-a-duplicate">iBeacon</a> lässt Filialen genau bestimmen, wo sich ein iDing befindet und holt sich natürlich auch andere Informationen. 
164 | <a
| href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
| Either Apple helps the NSA snoop on all the data in an iThing, or it is
| totally [-incompetent.</a>-] {+incompetent</a>.+} 
<a href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. 
<a href="//www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep" title="How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP), unter: zerohedge.com 2013.">Apple hilft der NSA entweder in all den Daten in einem iDing herumzuschnüffeln</a> oder ist völlig unfähig.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a><a href="#tn03" id="tn03-ref" class="transnote">[3]</a><a href="#tn04" id="tn04-ref" class="transnote">[4]</a> 
165 | The iThing also <a
| href="http{+s+}://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
| tells Apple its geolocation</a> by default, though that can be turned off. 
The iThing also <a href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"> tells Apple its geolocation</a> by default, though that can be turned off. 
Das iDing <ins>erhebt Bewegungsprofile und</ins> teilt Apple standardmäßig die <a href="//www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/" title="Apple: Of course we stalk your EVERY move. iOS 7 has a new map to prove it, unter: theregister.co.uk 2013.">genaue Ortung</a> mit&#160;&#8209;&#160;aber das kann abgeschaltet werden. 
166  
There is also a feature for web sites to track users, which is <a href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) 
Ebenfalls ist eine Eigenschaft für Internetpräsenzen enthalten, die <a href="//nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/" title="Apple resumes User Tracking with iOS 6. Here's how to disable it, unter: nakedsecurity.sophos.com 2012.">Nutzer standardmäßig aktiv verfolgt</a> (in dem Artikel geht es um iOS 6, er trifft aber auch auf iOS 7 zu). 
167 ???
| Users cannot make an Apple ID (<a
| [-href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary-]
| {+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary+}
| to install even gratis apps</a>) without giving a valid email address and
| receiving the verification code Apple sends to it. 
Users cannot make an Apple ID (<a href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary to install even gratis apps</a>) without giving a valid email address and receiving the verification code Apple sends to it. 
Ohne Angabe einer gültigen E-Mail-Adresse und des von Apple dorthin gesendeten Verifizierungscodes können Benutzer keine Apple-ID anlegen (<a href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">die auch notwendig ist, wenn Apps gratis sind</a>). 
169 | [-<a href="#tyrants">Tyrants</a>&mdash;systems-]{+Tyrants are systems+}
| that reject any operating system not &ldquo;authorized&rdquo; by the
| manufacturer. 
Tyrants are systems that reject any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="#tyrants">Tyrannen</a><br />&#8209;&#160;Systeme, die jedes nicht vom Hersteller „autorisierte“ Betriebssystem zurückweisen. 
171 | The Apple iThings are tyrant devices. There is a port of Android to the
| iThings, but installing it requires <a
| [-href="http://www.idroidproject.org/wiki/Status">-]
| {+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">+}
| finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install
| a different system. 
The Apple iThings are tyrant devices. There is a port of Android to the iThings, but installing it requires <a href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"> finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install a different system. 
Die Apple iDinger sind Tyrannen. Es gibt eine Portierung von Android auf die iDinger, aber deren Installation macht das <a href="http://www.idroidproject.org/wiki/Status">Auffinden eines Programmfehlers oder die <em>systematische Ausnutzung einer Schwachstelle</em> ‚<span xml:lang="en" lang="en">Exploit‘</span></a> erforderlich, um es überhaupt möglich zu machen, ein anderes System installieren zu können. 
172 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams</strong>:</p>
<ol id="transnote">
<li><p><strong>Weiterführende Referenzen</strong>:</p>
<ol style="list-style-type:none">
<li>Free Software Foundation Europe; Digitale Gesellschaft, <a
href="https://digitalegesellschaft.de/wp-content/uploads/2012/08/drm-booklet-digiges-fsfe.de_.pdf" type="application/pdf"><cite>DRM oder die merkwürdige, kaputte Welt der Digitalen Rechte-Minderung</cite></a>, unter: digitalegesellschaft.de 2012. (abgerufen 2014-09-10)
<p>Siehe auch:</p></li>
<li><a href="#tn00-ref"></a> Der Spiegel, <a href="//www.spiegel.de/spiegel/print/d-111320266.html"><cite>iSpy</cite></a>, unter: spiegel.de 2013. (abgerufen 2014-05-06)</li>
<li>Heise Online, <a href="//www.heise.de/mac-and-i/meldung/Wirbel-um-Aufzeichnung-von-Ortungsdaten-im-iPhone-1231573.html?view=print"><cite>Wirbel um Aufzeichnung von Ortungsdaten im iPhone“</cite></a>, unter: heise.de 2014. (abgerufen 2014-08-22)<br/></li>
<li id="tn01"><a href="#tn01-ref">[1]</a> Heise Online, <a href="//www.heise.de/mac-and-i/meldung/Sicherheitsforscher-weist-auf-Hintertueren-in-iOS-hin-2263888.html?view=print"><cite>Sicherheitsforscher weist auf Hintertüren in iOS hin“</cite></a>, unter: heise.de 2014. (abgerufen 2014-08-22)</li>
<li id="tn02"><a href="#tn02-ref">[2]</a> Spiegel Online, <a href="//www.spiegel.de/netzwelt/mobil/apple-jobs-bestaetigt-iphone-hintertuer-a-571219.html"><cite>Apple: Jobs bestätigt iPhone-Hintertür</cite></a>, unter: spiegel.de 2008. (abgerufen 2014-02-24)</li>
</ol></li></ol> 
174 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
176  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.