malware-microsoft.de.po

Mismatched links: 152.

Mismatched ids: 1.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| company&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By company&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
15 | <a [-href="#back-doors">Back doors</a>-] {+href="#drm">DRM</a>+} 
<a href="#drm">DRM</a> 
<a href="#back-doors">Hintertüren</a> 
18 | <a [-href="#back-doors">Back doors</a>-] {+href="#jails">Jails</a>+} 
<a href="#jails">Jails</a> 
<a href="#back-doors">Hintertüren</a> 
22 | <a [-href="#interference">Interference</a>-]
| {+href="#tethers">Tethers</a>+} 
<a href="#tethers">Tethers</a> 
<a href="#interference">Interferenz</a> 
23 | <a [-href="#sabotage">Sabotage</a>-] {+href="#tyrants">Tyrants</a>+} 
<a href="#tyrants">Tyrants</a> 
<a href="#sabotage">Sabotage</a> 
25  
Microsoft is <a href="https://www.slashgear.com/windows-10-users-are-grumpy-over-forced-updates-and-unwanted-apps-18643135/">forcing Windows users</a> to <a href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe">install upgrades it pushes</a> using <a href="/proprietary/proprietary-back-doors.html#windows-update">its universal back doors</a>. These upgrades can do various harms to users such as restricting computers from some functions and/or forcing users to defenselessly do whatever Microsoft tells them to do. 
 
26  
Microsoft Windows has a universal back door through which <a href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"> any change whatsoever can be imposed on the users</a>. 
Microsoft Windows enthält universelle Hintertür, durch welche <a href="https://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183" title="Microsoft Updates Windows Without User Permission, Apologizes, unter: informationweek.com 2007.">Nutzern Änderungen jeglicher Art aufgezwungen</a> werden können.<a href="#tn01" id="tn01-ref" class="transnote">[1]</a> 
27  
This was <a href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want"> reported in 2007</a> for XP and Vista, and it seems that Microsoft used the same method to push the <a href="/proprietary/malware-microsoft.html#windows10-forcing"> Windows 10 downgrade</a> to computers running Windows 7 and 8. 
 
28 | In Windows 10, the universal back door is no longer hidden; all
| &ldquo;upgrades&rdquo; will be <a
| href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">{+
| +}forcibly and immediately imposed</a>. 
In Windows 10, the universal back door is no longer hidden; all &ldquo;upgrades&rdquo; will be <a href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"> forcibly and immediately imposed</a>. 
In Windows 10 wird die universale Hintertür nicht mehr verborgen; alle <i>„Verbesserungen“</i> werden <a
href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/" title="Windows 10 updates to be automatic and mandatory for Home users, unter: arstechnica.com 2015.">zwangsweise und unmittelbar [mit der Installation] durchgesetzt</a>. 
29 | [-<a
| href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">-]Microsoft
| has [-already-] {+<a
| href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">+}
| backdoored its disk encryption</a>. 
Microsoft has <a href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"> backdoored its disk encryption</a>. 
Microsoft hat seine <a href="//theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/" title="Micah Lee, Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key, The Intercept, 2015.">Festplattenverschlüsselung bereits hintergangen</a>. 
30  
The German government <a href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers away from Windows 8 computers with TPM 2.0</a> (<a href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original article in German</a>), due to potential back door capabilities of the TPM 2.0 chip. 
 
31 | Here is a suspicion that we can't prove, but is worth thinking about: <a
| href="http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
| Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
| for the NSA to invade computers, with the help of Microsoft, say respected
| security experts. 
Here is a suspicion that we can't prove, but is worth thinking about: <a href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"> Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for the NSA to invade computers, with the help of Microsoft, say respected security experts. 
Ein unbewiesener Verdacht, aber Wert darübernachzudenken: <a href="https://web.archive.org/web/20150206003913/www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI" title="Christopher Joye, Intel chips could let US spies inside: expert, The Australian Financial Review 2013.">Schreibbarer Mikrocode für Intel- und AMD-Mikroprozessoren</a> kann durchaus ein Instrument für den US-Geheimdienst NSA sein, um&#160;&#8209;&#160;mit der Hilfe von Microsoft&#160;&#8209;&#160;in Rechner einzudringen, sagen angesehene Sicherheitsexperten. 
32 | [-<a
| href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">-]Windows
| 8 also has a back door for {+<a
| href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">+}
| remotely deleting apps</a>. 
Windows 8 also has a back door for <a href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"> remotely deleting apps</a>. 
<a href="https://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html" title="Microsoft: We can remotely delete Windows 8 apps, unter: computerworld.com 2011.">Windows 8 hat ebenfalls eine Hintertür zum rechnerfernen löschen von Anwendungssoftware</a>. 
35 | [-<a href="#drm">Digital-]{+Digital+} restrictions [-management</a>-]
| {+management,+} or [-&ldquo;DRM&rdquo; means-] {+&ldquo;DRM,&rdquo; refers
| to+} functionalities designed to restrict what users can do with the data
| in their computers. 
Digital restrictions management, or &ldquo;DRM,&rdquo; refers to functionalities designed to restrict what users can do with the data in their computers. 
<a href="#drm">Digitale Rechte-Minderung (DRM)</a><br />oder <em>Digitale Beschränkungsverwaltung</em><br />&#8209;&#160;Funktionen, entwickelt um zu beschränken, was Nutzer mit den Daten auf ihren Rechnern tun können. 
36  
Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is valid by connecting to the store every time their &ldquo;owner&rdquo; wants to read them. Microsoft is going to close this store, <a href="https://www.bbc.com/news/technology-47810367"> bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;</a>. (The article additionally highlights the pitfalls of DRM.) 
 
38 | <a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">[- -]DRM
| in Windows</a>, introduced to cater to <a [-href="#bluray">Bluray</a>-]
| {+href="/proprietary/proprietary-drm.html#bluray">Bluray</a>+} disks.
| (The article talks about how the same malware would later be introduced in
| MacOS. That had not been done at the time, but it was done subsequently.) 
<a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM in Windows</a>, introduced to cater to <a href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. (The article talks about how the same malware would later be introduced in MacOS. That had not been done at the time, but it was done subsequently.) 
<a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM in Windows</a>, eingeführt, um <a href="#bluray">Blu-ray</a>-Speichermedien gerecht zu werden. (Der Artikel spricht davon, wie die gleiche Schadsoftware später unter Mac OS eingeführt wurde. Dies war zu dem Zeitpunkt noch nicht geschehen.)  
41  
A newly found Microsoft Windows vulnerability <a href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"> can allow crackers to remotely gain access to the operating system</a> and install programs, view and delete data, or even create new user accounts with full user rights. 
 
43 | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
| term <a
| href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+wrongly refers to crackers as &ldquo;<a
| href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small>
| +} 
<small>Please note that the article wrongly refers to crackers as &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
44  
At least 30 thousand organizations in the United States are newly &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">cracked</a>&rdquo; via <a href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes in Microsoft's proprietary email software, named Microsoft 365</a>. It is unclear whether there are other holes and vulnerabilities in the program or not but history and experience tells us it wouldn't be the last disaster with proprietary programs. 
 
45  
Researchers at the security firm SentinelOne discovered a <a href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security flaw in proprietary program Microsoft Windows Defender that lurked undetected for 12 years</a>. If the program was free (as in freedom), more people would have had a chance to notice the problem, therefore, it could've been fixed a lot sooner. 
 
46  
The proprietary program Microsoft Teams' insecurity <a href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif">could have let a malicious GIF steal user data from Microsoft Teams accounts</a>, possibly across an entire company, and taken control of &ldquo;an organization's entire roster of Teams accounts.&rdquo; 
 
48  
A <a href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw in Internet Explorer and Edge</a> allows an attacker to retrieve Microsoft account credentials, if the user is tricked into visiting a malicious link. 
Ein <a href="//www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/" title=" Zack Whittaker, Microsoft won't fix Windows flaw that lets hackers steal your username and password, unter: ZDNet.com 2016.">Fehler in Internet Explorer und Edge</a> ermöglicht Angreifer Anmeldeinformationen von Microsoft abzugreifen, wenn der Nutzer darin getäuscht wurde einen böswilligen Verweis zu besuchen. 
49  
<a href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"> Point-of-sale terminals running Windows were taken over</a> and turned into a botnet for the purpose of collecting customers' credit card numbers. 
<ins>Geräte bzw. Terminals zum bargeldlosen Zahlen an elektronischen Kassen (eigentlich <i>Verkaufsort</i>), sogenannte </ins><a
href="//arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/" title="Credit card fraud comes of age with advances in point-of-sale botnets, unter: arstechnica.com 2013."><i>Point-of-Sale</i> (POS)-Terminals wurden&#160;&#8209;&#160;unter Windows&#160;&#8209;&#160;übernommen und zu einem Botnetz</a> gemacht, um Kreditkartendaten von Kunden zu sammeln. 
52  
Microsoft is making it harder and harder to <a href="https://www.theverge.com/22630319/microsoft-windows-11-default-browser-changes">replace default apps in its Windows</a> operating system and is pressuring users to use its proprietary programs instead. We believe the best approach to this would be replacing Windows with a free (as in freedom) operating system like GNU. We also maintain a <a href="/distros/free-distros.html">list of fully free distributions of GNU</a>. 
 
53  
Microsoft is <a href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows">forcibly removing the Flash player from computers running Windows 10</a>, using <a href="/proprietary/proprietary-back-doors.html#windows-update">a universal backdoor in Windows</a>. 
 
54  
The fact that Flash has been <a href="/proprietary/proprietary-back-doors.html#M202012020">disabled by Adobe</a> is no excuse for this abuse of power. The nature of proprietary software, such as Microsoft Windows, gives the developers power to impose their decisions on users. Free software on the other hand empowers users to make their own decisions. 
 
55  
One version of Windows 10 <a href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"> harangues users if they try to install Firefox (or Chrome)</a>. 
 
58  
Windows displays <a href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"> intrusive ads for Microsoft products and its partners' products</a>. 
Windows 10 zeigt <a href="https://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer" title="Microsoft is infesting Windows 10 with annoying ads, unter: TheVerge.com 2017.">aufdringliche Werbung für Produkte von Microsoft und seiner Partner</a> an. 
60  
The Microsoft Telemetry Compatibility service <a href="https://answers.microsoft.com/en-us/windows/forum/all/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2"> drastically reduces the performances of machines running Windows&nbsp;10</a>, and can't be disabled easily. 
 
61  
After <a href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the download of Windows 10</a> on computers that were running Windows 7 and 8, Microsoft <a href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"> repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope that some day they would fail to say no. To do this, Microsoft used <a href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"> malware techniques</a>. 
 
63  
Microsoft has made companies' Windows machines managed by the company's sysadmins <a href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows 10</a>. 
Auf vielen Unternehmens-Rechnern, bei denen System-Administratoren das System betreuen, erscheint nun ein neues Fenster, dass <a href="//www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html" title="Microsoft is telling users that their admins are somehow guilty of blocking upgrades to their PCs, InfoWorld 2016.">eine „Verbesserung“ des Betriebssystems auf Windows 10 deaktiviert und Nutzer ihren System-Administrator danach fragen sollen</a>. 
64  
Microsoft has <a href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported all future Intel CPUs for Windows 7 and 8</a>. Those machines will be stuck with the nastier Windows 10. <a href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"> AMD and Qualcomm CPUs, too</a>. 
Microsoft hat die <a href="//www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">Unterstützung aller künftiger Intel-CPUs für Windows 7 und 8 eingestellt</a>. Diese Rechner werden mit dem scheußlicherem Windows 10 ausgeliefert. <a href="//gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">AMD- und Qualcomm-CPUs sind ebenso betroffen</a>. 
69  
Microsoft has been <a href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"> force-installing a &ldquo;remediation&rdquo; program</a> on computers running certain versions of Windows 10. Remediation, in Microsoft's view, means <a href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a"> tampering with users' settings and files</a>, notably to &ldquo;repair&rdquo; any components of the updating system that users may have intentionally disabled, and thus regain full power over them. Microsoft repeatedly pushed faulty versions of this program to users' machines, causing numerous problems, some of which <a href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"> critical</a>. 
 
70  
This exemplifies the arrogant and manipulative attitude that proprietary software developers have learned to adopt toward the people they are supposedly serving. Migrate to a <a href="/distros/free-distros.html">free operating system</a> if you can! 
 
72  
Microsoft has made Windows 7 and 8 cease to function on certain new computers, <a href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively forcing their owners to switch to Windows 10</a>. 
Microsoft hat Windows 7 und 8.1 dazu gebracht auf bestimmten neuen Rechnern aufzuhören zu funktionieren, um <a href="https://support.microsoft.com/de-de/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that" title="Fehlermeldung „Ihr PC verwendet einen unter dieser Windows-Version nicht unterstützten Prozessor beim Suchen oder Herunterladen von Windows-Updates, unter: support.microsoft.com 2017 ff." hreflang="de">wirksam deren Eigentümer dazu zu zwingen auf Windows 10 umzusteigen</a>. 
75  
In its efforts to trick users of Windows 7 and 8 into installing all-spying Windows 10 against their will, Microsoft forced their computers to <a href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"> silently download&hellip; the whole of Windows 10</a>! Apparently, this was done through a <a href="/proprietary/proprietary-back-doors.html#windows-update"> universal back door</a>. Not only did the unwanted downloads <a href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"> jeopardize important operations in regions of the world with poor connectivity</a>, but many of the people who let installation proceed found out that this &ldquo;upgrade&rdquo; was in fact a <a href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"> downgrade</a>. 
 
76 | Once Microsoft has tricked a user into accepting installation of Windows
| 10, <a
| href="http{+s+}://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
| find that they are denied the option to cancel or even postpone the
| imposed date of installation</a>. 
Once Microsoft has tricked a user into accepting installation of Windows 10, <a href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they find that they are denied the option to cancel or even postpone the imposed date of installation</a>. 
Sobald Microsoft einen Nutzer dazu verleitet hat die Installation von Windows 10 zu akzeptieren, wird die <a href="https://web.archive.org/web/20160603113832///www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/" title="Windows 10 nagware: You can't click X. Make a date OR ELSE – reader, The Register, unter: web.archive.org 2016.">Möglichkeit verweigert, die Installation abzubrechen oder auch das auferlegte Datum zurückzusetzen</a>. 
78  
FTDI's proprietary driver for its USB-to-serial chips has been designed to <a href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage alternative compatible chips</a> so that they no longer work. Microsoft is <a href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing this automatically</a> as an &ldquo;upgrade&rdquo;. 
Proprietäre Treiber von <em>FTDI</em> für deren USB-zu-Seriell-Chips wurden so entwickelt, <a href="//arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/" title="Windows Update drivers bricking USB serial chips beloved of hardwar, unter: arstechnica.com 2014.">alternative &amp; kompatible Chips zu sabotieren</a>, damit diese nicht mehr funktionieren. Microsoft wird dieses als „Upgrade“ (engl. für „Verbesserung“) <a href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again" title="FTDI Driver Breaks Hardware Again, unter: Slashdot 2016.">automatisch installieren</a>. 
79  
Windows 10 &ldquo;upgrades&rdquo; <a href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"> delete applications</a> without asking permission. 
Windows 10-„Verbesserungen“ <a href="//www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/" title="Martin Brinkmann, Beware, latest Windows 10 Update may remove programs automatically, gHacks 2015.">löschen Anwendungen</a> ohne Rückfrage. 
80 | <a
| [-href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
| Microsoft-]
| {+href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html">Microsoft+}
| cut off security fixes for Windows XP, except to some big users that pay
| [-exorbitantly.</a>-] {+exorbitantly</a>.+} 
<a href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html">Microsoft cut off security fixes for Windows XP, except to some big users that pay exorbitantly</a>. 
Microsoft <a href="//www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/" title="Windows XP: End of an Era, End of an Error, unter: computerworlduk.com 2014.">stoppt Sicherheitsaktualisierungen für Windows&#160;XP</a>&#160;&#8209;&#160;außer für einige große und schwere Nutzer, die exorbitante Summen bezahlen. 
81 | Microsoft is going to <a
| [-href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">-]
| {+href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">+}
| cut off support for some Internet Explorer versions</a> in the same way. 
Microsoft is going to <a href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"> cut off support for some Internet Explorer versions</a> in the same way. 
Microsoft wird die <a href="//www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/" title="More than half of all IE users face patch axe in 10 months, unter: computerworlduk.com 2015.">Unterstützung für einige Internet Explorer-Versionen auf die gleiche Weise stoppen</a>. 
83 | <a
| href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">[-
| -]Microsoft informs the NSA of bugs in Windows before fixing [-them.</a>-]
| {+them</a>.+} 
<a href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft informs the NSA of bugs in Windows before fixing them</a>. 
<a href="https://web.archive.org/web/20130622044225///blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm" title="How Can Any Company Ever Trust Microsoft Again?, unter: computerworlduk.com 2013 (Internet Archive).">Microsoft informiert die NSA über Programmfehler in Windows</a>, bevor sie behoben werden. 
85 | Microsoft Office forces users <a
| [-href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to-]
| {+href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to+}
| subscribe to Office 365 to be able to create/edit documents</a>. 
Microsoft Office forces users <a href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to subscribe to Office 365 to be able to create/edit documents</a>. 
Microsoft Office erzwingt ein <a href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html" title="Office for Windows 10 will require Office 365 subscription on PCs, larger tablets, IDG Communications 2018.">Office 365-Abo</a> um Dokumente erstellen bzw. bearbeiten zu können. 
87  
Microsoft's Office 365 suite enables employers <a href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to snoop on each employee</a>. After a public outburst, Microsoft stated that <a href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it would remove this capability</a>. Let's hope so. 
 
88  
Microsoft is imposing its surveillance on the game of Minecraft by <a href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring every player to open an account on Microsoft's network</a>. Microsoft has bought the game and will merge all accounts into its network, which will give them access to people's data. 
 
89  
Minecraft players <a href="https://directory.fsf.org/wiki/Minetest">can play Minetest</a> instead. The essential advantage of Minetest is that it is free software, meaning it respects the user's computer freedom. As a bonus, it offers more options. 
 
90  
As of 2019-2020, Minecraft players are <a href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being forced to move to Microsoft servers</a>, which results in privacy violation. Microsoft publishes a program so users can run their own server, but the program is proprietary and it's another <a href="/philosophy/free-software-even-more-important.html">injustice to users</a>. 
 
91  
People can play <a href="https://directory.fsf.org/wiki/Minetest">Minetest</a> instead. Minetest is free software and respects the user's computer freedom. 
 
92  
Proprietary programs Google Meet, Microsoft Teams, and WebEx <a href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are collecting user's personal and identifiable data</a> including how long a call lasts, who's participating in the call, and the IP addresses of everyone taking part. From experience, this can even harm users physically if those companies hand over data to governments. 
 
93  
Google, Apple, and Microsoft (and probably some other companies) <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are collecting people's access points and GPS coordinates (which can identify people's precise location) even if their GPS is turned off</a>, without the person's consent, using proprietary software implemented in person's smartphone. Though merely asking for permission would not necessarily legitimize this. 
 
94  
Microsoft is <a href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking users to create an account on their network</a> to be able to install and use the Windows operating system, which is malware. The account can be used for surveillance and/or violating people's rights in many ways, such as turning their purchased software to a subscription product. 
 
95  
Microsoft recorded users of Xboxes and had <a href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"> human workers listen to the recordings</a>. 
 
97  
Skype refuses to say whether it can <a href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop on calls</a>. 
 
99  
Microsoft <a href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces people to give their phone number</a> in order to be able to create an account on the company's network. On top of mistreating their users by providing nonfree software, Microsoft is tracking their lives outside the computer and violates their privacy. 
 
102 | The <a
| href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
| &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
| to access, among other things, registry keys <a
| [-href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which-]
| {+href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
| which+} can contain sensitive information like administrator's login
| password</a>. 
The <a href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"> &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, among other things, registry keys <a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"> which can contain sensitive information like administrator's login password</a>. 
<a href="https://docs.microsoft.com/de-de/windows/privacy/configure-windows-diagnostic-data-in-your-organization#stufe-vollständig">Telemetrie-Stufe „Vollständig“</a> ermöglicht Microsoft Windows-Ingenieuren unter anderem Zugriff auf Registrierungsschlüssel, <a href="https://technet.microsoft.com/de-de/library/cc939702.aspx">die vertrauliche Informationen wie das Administrator-Anmeldekennwort enthalten können</a>. 
104  
By default, Windows 10 <a href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends debugging information to Microsoft, including core dumps</a>. Microsoft now distributes them to another company. 
Windows 10 sendet standardmäßig <a href="//betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">Debugging-Informationen an Microsoft, einschließlich Speicherabzüge des Register- und Hauptspeicherabbilds eines Prozesses</a>. Microsoft vermarktet diese nun an andere Unternehmen. 
107  
It appears <a href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"> Windows 10 sends data to Microsoft about what applications are running</a>. 
Es scheint, <a href="//www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/" title=" Martin Brinkmann, Microsoft may be collecting more data than initially thought, unter: ghacks.net 2016.">Windows 10 sendet Daten an Microsoft über ausgeführte Anwendungen</a>. 
108 | A downgrade to Windows 10 deleted surveillance-detection applications.
| Then another downgrade inserted a general spying program. Users noticed
| this and complained, so Microsoft renamed it <a
| [-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">-]
| {+href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">+}
| to give users the impression it was gone</a>. 
A downgrade to Windows 10 deleted surveillance-detection applications. Then another downgrade inserted a general spying program. Users noticed this and complained, so Microsoft renamed it <a href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"> to give users the impression it was gone</a>. 
Ein „Rückrüsten“ auf Windows 10 löschte die für Sicherheitsüberwachung zuständige Anwendungen. Daraufhin führte ein anderes Downgrade abermals ein allgemeines Schnüffelorogramm ein. Nutzer bemerkten dies jedoch und klagten, woraufhin Microsoft es umbenannte, <a href="https://web.archive.org/web/20160407082751///www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/" title="Andrew Orlowski, Sneaky Microsoft renamed its data slurper before sticking it back in Windows 10, unter: The Register, web.archive.org 2015.">um bei Nutzern den Eindruck zu erwecken, es sei weg</a>. 
110  
<a href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"> Windows 10 sends identifiable information to Microsoft</a>, even if a user turns off its Bing search and Cortana features, and activates the privacy-protection settings. 
<a href="//arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/" title="Even when told not to, Windows 10 just can’t stop talking to Microsoft, unter: arstechnica.com 2015.">Windows 10 sendet identifizierbare Daten an Microsoft</a>, selbst wenn ein Nutzer seine Bing-Suche und besondere Cortana-Eigenschaften deaktiviert und die <i>Schutz für die Privatsphäre</i>-Einstellungen aktiviert. 
111 | Windows 10 <a
| [-href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">-]
| {+href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">+}
| ships with default settings that show no regard for the privacy of its
| users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users'
| files, text input, voice input, location info, contacts, calendar records
| and web browsing history, as well as automatically connecting the machines
| to open hotspots and showing targeted ads. 
Windows 10 <a href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"> ships with default settings that show no regard for the privacy of its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' files, text input, voice input, location info, contacts, calendar records and web browsing history, as well as automatically connecting the machines to open hotspots and showing targeted ads. 
Windows 10 wird <a href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">mit Standardeinstellungen ausgeliefert, die keine Rücksicht auf die Privatsphäre seiner Nutzerinnen und Nutzer nimmt</a>, was Microsoft das „Recht“ gibt Nutzer-Dateien, Text- und Spracheingaben, Ortsangaben, Kontakte, Termine und den Internetverlauf auszuschnüffeln sowie Rechner automatisch mit offenen Hotspots zu verbinden und personenbezogene Werbung einzublenden. 
113 | Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose
| a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full
| disk encryption <a
| [-href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">-]
| {+href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">+}
| gives Microsoft a key</a>. 
Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk encryption <a href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"> gives Microsoft a key</a>. 
Microsoft verwendet die Windows 10 „Datenschutzerklärung“, um unverhohlen ein „Recht“ aufzuerlegen, jederzeit Nutzerdaten ausspähen zu können. Die Windows 10-Festplattenverschlüsselung <a href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/" title="Microsoft’s new small print – how your personal data is (ab)used, unter: edri.org 2015.">übergibt Microsoft dafür eigens einen Schlüssel</a>. 
117 This is a preview version, no final -> the participation is voluntary.
(not suited for productive application)
| {+It only gets worse with time.+} <a
| href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
| Windows 10 requires users to give permission for total snooping</a>,
| including their files, their commands, their text input, and their voice
| input. 
It only gets worse with time. <a href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"> Windows 10 requires users to give permission for total snooping</a>, including their files, their commands, their text input, and their voice input. 
<a href="//www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html" title="Microsoft’s Windows 10 has permission to spy on you, unter: techworm.net 2014.">Windows 10 <!--preview -->verlangt, Erlaubnis zum totalen Ausschnüffeln</a>, einschließlich der Dateien, der Befehle sowie der Text- und Spracheingaben von Benutzern. 
118 | <a
| [-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">-]
| {+href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">+}
| Microsoft SkyDrive allows the NSA to directly examine users' [-data.</a>-]
| {+data</a>.+} 
<a href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"> Microsoft SkyDrive allows the NSA to directly examine users' data</a>. 
<a href="//www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/" title="Microsoft openly offered cloud data to support NSA PRISM programme, unter: itproportal.com 2014.">Microsoft SkyDrive ermöglicht der NSA die direkte Auswertung von Nutzerdaten</a>.<a href="#tn03" id="tn03-ref" class="transnote">[3]</a><a href="#tn04" id="tn04-ref" class="transnote">[4]</a> 
119 | [-Spyware in Skype:-]{+Skype contains+} <a
| [-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
| http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.-]
| {+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.+}
| Microsoft changed Skype <a
| href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
| specifically for spying</a>. 
Skype contains <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>. Microsoft changed Skype <a href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"> specifically for spying</a>. 
<a href="//www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/" title="Project Chess: How U.S. Snoops On Your Skype, unter: forbes.com 2013.">NSA-Schnüffelei in Skype</a>. Microsoft änderte Skype <a href="//www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data" title="Microsoft handed the NSA access to encrypted messages, unter: theguardian.com 2013.">eigens für die Bespitzelung</a>. 
120 (fix) http_s_://www.infoworld.com …
| Spyware in {+older versions of+} Windows: <a
| href="http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
| Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
| [-href="https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">-]
| {+href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">+}
| Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
| there's a <a href="http://www.marketoracle.co.uk/Article40836.html">
| secret NSA key in Windows</a>, whose functions we don't know. 
Spyware in older versions of Windows: <a href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"> Windows Update snoops on the user</a>. <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"> Windows 8.1 snoops on local searches</a>. And there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA key in Windows</a>, whose functions we don't know. 
Spähprogramm in Windows: <a href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/" title="Windows Update keeps tabs on all system software, unter: theregister.co.uk 2003">Windows Update schnüffelt dem Benutzer hinterher</a>. <a href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175" title="A look at the black underbelly of Windows 8.1 'Blue', unter: infoworld.com 2013.">Windows 8.1 schnüffelt in lokaler Suche herum</a>. Und es gibt einen <a href="http://www.marketoracle.co.uk/Article40836.html" title="NSA Built Back Door In All Microsoft Windows Software Since 1999, unter: marketoracle.co.uk 2013">geheimen NSA-Schlüssel in Windows</a>, dessen Funktionen wir nicht kennen. 
123  
The recent versions of Microsoft Office require the user to <a href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372"> connect to Microsoft servers at least every thirty-one days</a>. Otherwise, the software will refuse to edit any documents or create new ones. It will be restricted to viewing and printing. 
 
125 | [-<a href="#jails">Jails</a>&mdash;systems-]{+Jails are systems+} that
| impose censorship on application programs. 
Jails are systems that impose censorship on application programs. 
<a href="#jails">Gefängnisse</a><br />&#8209;&#160;Systeme, die Anwendungsprogrammen Zensur auferlegen. 
126 | Windows 10 S was a jail: <a
| href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
| only programs from the Windows Store could be installed and executed</a>.
| It was however possible to <a
| href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
| upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a special
| configuration of Windows 10 called <a
| [-href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">-]
| {+href="https://support.microsoft.com/en-us/windows/windows-10-and-windows-11-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85">+}
| S mode</a>. The major difference with Windows 10 S is that there is an
| easy way to switch out of S mode. 
Windows 10 S was a jail: <a href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"> only programs from the Windows Store could be installed and executed</a>. It was however possible to <a href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide"> upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a special configuration of Windows 10 called <a href="https://support.microsoft.com/en-us/windows/windows-10-and-windows-11-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85"> S mode</a>. The major difference with Windows 10 S is that there is an easy way to switch out of S mode. 
Windows 10 S: <a href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison" title="What is Windows 10 S and how is it different from regular Windows 10?, Guardian News and Media Limited or its affiliated companies 2018.">Programme nur aus Windows Store installier- und ausführbar</a>. Eine <a href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide" title="How to upgrade from Windows 10 S to Windows 10 Pro, Vox Media 2018.">Aktualisierung auf Windows 10 Pro </a> war jedoch möglich. Nachfolger ist eine spezielle Konfiguration von Windows 10 namens <a href="https://support.microsoft.com/de-de/help/4020089/windows-10-in-s-mode-faq" title="Windows 10 im S Modus - Häufig gestellte Fragen, Microsoft 2018 (Stand: 2018-05-09).">S Modus</a>. Hauptunterschied zu Windows 10 S ist eine einfache Möglichkeit, den S-Modus auszuschalten. 
127 | <a
| [-href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">-]
| {+href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">+}
| Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>. 
<a href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>. 
<a href="https://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html" title="Microsoft Metro app store lock down, IDG Communications 2018.">Windows&#160;8 auf „Mobilgeräten“ <em>war</em> ein Gefängnis.</a> 
129 | [-<a href="#tyrants">Tyrants</a>&mdash;systems-]{+Tyrants are systems+}
| that reject any operating system not &ldquo;authorized&rdquo; by the
| manufacturer. 
Tyrants are systems that reject any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="#tyrants">Tyrannen</a><br />&#8209;&#160;Systeme, die jedes nicht vom Hersteller „autorisierte“ Betriebssystem zurückweisen. 
130  
Microsoft accidentally left a way for users to install GNU/Linux on Windows RT tablets, but now it has <a href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"> &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall to call this &ldquo;protecting&rdquo; the users. The article talks of installing &ldquo;Linux&rdquo;, but the context shows it is really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users install. 
Microsoft ließ Nutzern unbeabsichtigt ein Weg offen um <b>GNU/Linux</b> auf Windows RT-Tablets installieren zu können, aber dieser <a href="//www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/" title="Microsoft silently kills dev backdoor that boots Linux [sic] on locked-down Windows RT slabs, unter: securitynewspaper.com 2016.">„Fehler“ ist „behoben“</a>. Unverschämtheiterweise nennen sie dies „Schutz“ der Nutzer. [Anmerkung: Im Artikel wird von „Linux“ gesprochen, im Kontext geht es jedoch&#160;&#8209;&#160;und was tatsächlich installiert wird&#160;&#8209;&#160;um <a href="/gnu/linux-and-gnu">GNU/Linux</a>.] 
131 | <a href="http{+s+}://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
| Mobile devices that come with Windows 8 are [-tyrants.</a>-]
| {+tyrants</a>.+} 
<a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"> Mobile devices that come with Windows 8 are tyrants</a>. 
<a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Mobile Geräte mit Windows 8 sind Tyrannen</a><a href="#tn1" id="tn-ref" class="transnote">[*]</a>. 
133 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams:</strong></p>
<ol id="transnote">
<li>Digitale Gesellschaft; Free Software Foundation Europe, <cite><a href="https://digitalegesellschaft.de/wp-content/uploads/2012/08/drm-booklet-digiges-fsfe.de_.pdf" type="application/pdf">DRM oder die merkwürdige, kaputte Welt der Digitalen Rechte-Minderung</a></cite>, unter: digitalegesellschaft.de 2012. (abgerufen 2014-09-10)</li>
<li id="tn1"><a href="#tn1-ref">[*]</a> Mobile Geräte sind in erster Linie Geräte mit <i>berührungsempfindlichen Bildschirmen</i> (engl. <i>‚Touchscreens‘</i>) wie Smartphones, Mobiltelefone, Netbooks und Tablet-Rechner.</li>
<li>
<ol><li><p><strong>Weiterführende Referenzen</strong>:</p>
<ol style="list-style-type:none">
<li id="tn01"><a href="#tn01-ref">[1]</a> Heise Online, <cite><a
href="https://heise.de/-175014">Microsoft spielt heimlich Updates ein</a></cite>, unter: heise.de/-175014 2007. (abgerufen 2014-04-14)</li>
<li id="tn02"><a href="#tn02-ref">[2]</a> Zeit Online, <cite><a
href="//www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">Bundesbehörden sehen Risiken beim Einsatz von Windows 8</a></cite>, unter: zeit.de 2013. (abgerufen 2014-04-14))<br />
<span id="tn02-1"><a href="#tn02-1-ref">[2-1]</a> BSI, <cite><a
href="https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html">Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM</a></cite>, unter: bsi.bund.de 2013. (abgerufen 2017-01-26)</span></li>
<li id="tn03"><a href="#tn03-ref">[3]</a> Heise Online, <cite><a
href="https://heise.de/-1916340">PRISM-Überwachungskandal: Microsoft ermöglicht NSA Zugriff auf Skype, Outlook.com, Skydrive</a></cite>, unter: heise.de/-1916340 2013. (abgerufen 2014-06-01)</li>
<li id="tn04"><a href="#tn04-ref">[4]</a> Telepolis, <cite><a
href="https://heise.de/-3399676">Neue NSA-Dokumente enthüllen die Zusammenarbeit von Microsoft mit der NSA</a></cite>, unter: heise.de/-3399676 2013. (abgerufen 2014-06-01)</li>
</ol></li>
</ol></li>
</ol> 
135 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
137  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.