proprietary-back-doors.de.po

Mismatched links: 118.

Mismatched ids: 0.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| type&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By type&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> Nutzer also schlecht behandeln). Unfreie Software wird von seinen Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber Nutzer versetzt. Das ist die <a href="/philosophy/free-software-even-more-important">grundlegende Ungerechtigkeit</a>. Häufig üben Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen sollte. 
12 | {+Some malicious functionalities are mediated by <a
| href="/proprietary/proprietary.html#f1">back doors</a>.+} Here are
| examples of [-demonstrated back doors in proprietary software. They are
| sorted out-] {+programs that contain one or several of those, classified+}
| according to what [-they are-] {+the back door is+} known to [-allow.-]
| {+have the power to do.+} Back doors that allow full control over the
| [-operating system-] {+programs which contain them+} are said to be
| [-&ldquo;universal&rdquo;.-] {+&ldquo;universal.&rdquo;+} 
Some malicious functionalities are mediated by <a href="/proprietary/proprietary.html#f1">back doors</a>. Here are examples of programs that contain one or several of those, classified according to what the back door is known to have the power to do. Back doors that allow full control over the programs which contain them are said to be &ldquo;universal.&rdquo; 
Hier sind Beispiele von Hintertüren in proprietärer Software aufgeführt, und sind nach dem was sie zulassen geordnet. Hintertüren, die die volle Kontrolle über das Betriebssystem ermöglichen, werden als „universell“ bezeichnet. 
15  
<a href="#spy">Spying</a> 
 
16 | [-Altering-]{+<a href="#alter-data">Altering+} user's data or
| [-settings-] {+settings</a>+} 
<a href="#alter-data">Altering user's data or settings</a> 
Ändern&#160;von&#160;Benutzerdaten/&#8209;einstellungen 
17 | [-Installing or-]{+<a href="#install-delete">Installing,+} deleting
| [-programs-] {+or disabling programs</a>+} 
<a href="#install-delete">Installing, deleting or disabling programs</a> 
Programme&#160;installieren/entfernen 
18  
<a href="#universal">Full control</a> 
 
19  
<a href="#other">Other/undefined</a> 
 
21  
Google Nest <a href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 
 
27  
Apple can, and regularly does, <a href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"> remotely extract some data from iPhones for the state</a>. 
Apple kann <a href="//arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/" title="New guidelines outline what iPhone data Apple can give to police, unter: arstechnica.com 2014.">aus der Ferne irgendwelche Daten von iPhones für Vater Staat anzapfen</a>&#160;&#8209;&#160;und macht es regelmäßig. 
28 | This may have improved with <a
| [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-]
| {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+}
| iOS 8 security improvements</a>; but <a
| href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as
| much as Apple claims</a>. 
This may have improved with <a href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"> iOS 8 security improvements</a>; but <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as much as Apple claims</a>. 
Dies mag sich mit den jüngsten <a href="//www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html" title="Apple will no longer unlock most iPhones, iPads for police, even with search warrants, unter: washingtonpost.com 2014.">iOS 8-Sicherheitsverbesserungen</a> gebessert haben, allerdings <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/" title="Apple Still Has Plenty of Your Data for the Feds, unter: firstlook.org 2014.">nicht so sehr wie es Apple behauptet</a>. 
30  
Some Xiaomi phones <a href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns">have a malfeature to bleep out phrases that express political views China does not like</a>. In phones sold in Europe, Xiaomi leaves this deactivated by default, but has a back door to activate the censorship. 
 
32  
BlizzCon 2019 imposed a <a href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"> requirement to run a proprietary phone app</a> to be allowed into the event. 
 
33  
This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"> near-complete control</a> over the phone. 
 
34  
Android has a <a href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"> back door for remotely changing &ldquo;user&rdquo; settings</a>. 
 
36 | The Dropbox app for Macintosh <a
| [-href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">-]
| {+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">+}
| takes control of user interface items after luring the user into entering
| an admin password</a>. 
The Dropbox app for Macintosh <a href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"> takes control of user interface items after luring the user into entering an admin password</a>. 
Dropbox-App für Macintosh <a href="//applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/" title="Revealing Dropbox’s Dirty Little Security Hack, unter: applehelpwriter.com 2016.">übernimmt Kontrolle über Elemente der Benutzeroberfläche nachdem Nutzer zur Eingabe eines Administratorpassworts geködert wurden</a>. 
37  
A pregnancy test controller application not only can <a href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. 
Ein Bluetooth-Schwangerschaftstest- App kann nicht nur viele <a href="//www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security" title="First Response's Bluetooth pregnancy test is intriguing — and a privacy nightmare, unter: TheVerge.com 2016.">Daten im Smartphone und in Server-Konten ausschnüffeln, sondern auch ändern</a>. 
38 | <a
| [-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">-]
| {+href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">+}
| Some D-Link routers</a> have a back door for changing settings in a dlink
| of an eye. 
<a href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. 
<a href="//www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">Einige D-Link Router</a> haben eine Hintertür zum Ändern von Einstellungen.<a href="#tn03" id="tn03-ref" class="transnote">[3]</a> 
39  
<a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link router has a back door</a>. 
<a href="//sekurak.pl/tp-link-httptftp-backdoor/" title="TP-Link HTTP/TFTP backdoor, unter: sekurak.pl 2013.">TP-Link-Router hat eine Hintertür</a>. 
41  
Google has long had <a href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a back door to remotely unlock an Android device</a>, unless its disk is encrypted (possible since Android 5.0 Lollipop, but still not quite the default). 
Google hat eine <a href="//www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted" title="Samuel Gibbs, Google can unlock some Android devices remotely, district attorney says, unter: theguardian.com 2015.">Hintertür eingebaut, um ein Android-Gerät aus der Ferne zurückzusetzen</a>, sofern die Daten auf dem Gerät nicht vollverschlüsselt sind (geplant seit Android 5.0 Lollipop, aber noch nicht ganz der Standard). 
42  
Caterpillar vehicles come with <a href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"> a back door to shutoff the engine</a> remotely. 
Fahrzeuge von Caterpillar, weltgrößter US-Baumaschinen-Hersteller, sind mit einer <a href="//www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it" title="Tyler Durden, For Caterpillar The Depression Has Never Been Worse… But It Has A Cunning Plan How To Deal With It, Zero Hedge 2015.">Hintertür zur Abschaltung des Motors via Fernzugriff</a> ausgestattet. 
43  
Modern gratis game cr&hellip;apps <a href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"> collect a wide range of data about their users and their users' friends and associates</a>. 
Moderne, kostenlose Spiele-Apps von sehr schlechter Qualität <a href="//toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/" title="Eli Hodapp, ‚We Own You“ - Confessions of an Anonymous Free to Play Producer, unter: http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ TouchArcade 2015.">sammeln eine Vielzahl von Daten über ihre Nutzer und deren Freunde und Partner</a>. 
48 | The Amazon Kindle-Swindle has a back door that has been used to <a
| href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
| remotely erase books</a>. One of the books erased was [-1984,-]
| {+<cite>1984</cite>,+} by George Orwell. 
The Amazon Kindle-Swindle has a back door that has been used to <a href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"> remotely erase books</a>. One of the books erased was <cite>1984</cite>, by George Orwell. 
Der Amazon Sw(K)indle verfügt über eine bereits ausgenutzte Hintertür um <a href="//pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/" title="Some E-Books Are More Equal Than Others, unter: nytimes.com 2013.">Bücher aus der Ferne zu löschen</a>. Eines der gelöschten Bücher war <cite>1984</cite> von George Orwell. 
51 # (" ") unnecessary inconvenience!!! 
The iPhone has a back door for <a href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"> remote wipe</a>. It's not always enabled, but users are led into enabling it without understanding. 
Das iPhone enthält eine Hintertür zur <a href="//www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone" title="Martin Kaste, Wipeout: When Your Company Kills Your iPhone, unter: npr.org 2010.">Fern-Löschung</a>. Sie ist nicht immer aktiviert, aber Nutzer werden dazu angehalten sie ohne es wirklich zu verstehen zu aktivieren. 
53  
Adobe <a href="https://web.archive.org/web/20211014123717/https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash">has licensed its Flash Player to China's Zhong Cheng Network</a> who is offering the program bundled with spyware and a back door that can remotely deactivate it. 
 
54  
Adobe is responsible for this since they gave Zhong Cheng Network permission to do this. This injustice involves &ldquo;misuse&rdquo; of the DMCA, but &ldquo;proper,&rdquo; intended use of the DMCA is a much bigger injustice. There is <a href="/philosophy/right-to-read.html">a series of errors related to DMCA</a>. 
 
55  
Recent Samsung TVs have a back door with which Samsung can <a href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"> brick them remotely</a>. 
 
56  
<a href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google automatically installed an app on many proprietary Android phones</a>. The app might or might not do malicious things but the power Google has over proprietary Android phones is dangerous. 
 
57  
Adobe Flash Player <a href="https://www.adobe.com/products/flashplayer/end-of-life.html"> has a universal back door</a> which lets Adobe control the software and, for example, disable it whenever it wants. Adobe will block Flash content from running in Flash Player beginning January 12, 2021, which indicates that they have access to every Flash Player through a back door. 
 
59  
BMW is trying to <a href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock certain features of its cars, and force people to pay to use part of the car they already bought</a>. This is done through forced update of the car software via a radio-operated back door. 
 
60  
A very popular app found in the Google Play store contained a module that was designed to <a href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly install malware on the user's computer</a>. The app developers regularly used it to make the computer download and execute any code they wanted. 
 
62  
Apple appears to say that <a href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"> there is a back door in MacOS</a> for automatically updating some (all?) apps. 
 
64  
Corel Paintshop Pro has a <a href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"> back door that can make it cease to function</a>. 
 
68  
&ldquo;<a href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>&rdquo; means attacking ships. Using that word to refer to sharing copies is a smear; please don't smear sharing. 
 
69  
The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term &ldquo;IP&rdquo; itself is a <a href="/philosophy/not-ipr.html">bogus generalization about things that have nothing in common</a>. 
 
71 | Some &ldquo;Smart&rdquo; TVs automatically <a
| [-href="https://news.ycombinator.com/item?id=16727319">load-]
| {+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
| load+} downgrades that install a surveillance app</a>. 
Some &ldquo;Smart&rdquo; TVs automatically <a href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"> load downgrades that install a surveillance app</a>. 
Einige „Kluge“ TVs <a href="https://news.ycombinator.com/item?id=16727319" title="Unter: Guidelines 2018.">laden automatisch Downgrades herunter, die eine Überwachungs-App installieren</a>. 
75 | {+In addition to its+} <a
| [-href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">Windows-]
| {+href="#windows-update">universal back door</a>, Windows+} 8 [-also-]
| has a back door for {+<a
| href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">+}
| remotely deleting apps</a>. 
In addition to its <a href="#windows-update">universal back door</a>, Windows 8 has a back door for <a href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"> remotely deleting apps</a>. 
<a href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html" title="Microsoft: We can remotely delete Windows 8 apps, unter: computerworld.com 2011.">Windows 8 hat auch eine Hintertür zum rechnerfernen Löschen von Anwendungssoftware</a>. 
77 <a href="#tn02" id="tn02-ref" class="transnote">[2]</a>
| In Android, <a
| [-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">-]
| {+href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">+}
| Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
| was in a program called GTalkService, which seems since then to have been
| merged into Google Play.) 
In Android, <a href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"> Google has a back door to remotely delete apps</a>. (It was in a program called GTalkService, which seems since then to have been merged into Google Play.) 
Google hat in <a href="//www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html" title="Google throws 'kill switch' on Android phones, unter: computerworld.com 2011.">Android eine Hintertür um Apps aus der Ferne zu löschen</a>: sie befand sich in einem Programm namens <em>GTalkService</em>, der dann im <em>Google Play</em>-Dienst verschmolzen worden zu sein scheint. 
80  
The iPhone has a back door <a href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"> that allows Apple to remotely delete apps</a> which Apple considers &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power because of course we can trust Apple. 
Das iPhone hat eine Hintertür, die <a href="//www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html" title="Apple's Jobs confirms iPhone 'kill switch', unter: telegraph.co.uk 2008.">Apple per Fernzugriff das Löschen von Apps erlaubt</a>, die als „unangemessen“ betrachtet werden. Steve Jobs<ins>, damaliger Apple-CEO,</ins> sagte, es sei <em>für Apple in Ordnung diese Macht zu haben</em>, weil wir Apple selbstverfreilich vertrauen können.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a> 
82  
Peloton company which produces treadmills recently <a href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/">locked people out of basic features of people's treadmills by a software update</a>. The company now asks people for a membership/subscription for what people already paid for. 
 
86  
Microsoft is <a href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows">forcibly removing the Flash player from computers running Windows 10</a>, using <a href="/proprietary/proprietary-back-doors.html#windows-update">a universal backdoor in Windows</a>. 
 
87  
The fact that Flash has been <a href="/proprietary/proprietary-back-doors.html#M202012020">disabled by Adobe</a> is no excuse for this abuse of power. The nature of proprietary software, such as Microsoft Windows, gives the developers power to impose their decisions on users. Free software on the other hand empowers users to make their own decisions. 
 
88  
Some Wavelink and JetStream wifi routers have universal back doors that enable unauthenticated users to remotely control not only the routers, but also any devices connected to the network. There is evidence that <a href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"> this vulnerability is actively exploited</a>. 
 
89  
If you consider buying a router, we encourage you to get one that <a href="https://ryf.fsf.org/categories/routers">runs on free software</a>. Any attempts at introducing malicious functionalities in it (e.g., through a firmware update) will be detected by the community, and soon corrected. 
 
90  
If unfortunately you own a router that runs on proprietary software, don't panic! You may be able to replace its firmware with a free operating system such as <a href="https://librecmc.org">libreCMC</a>. If you don't know how, you can get help from a nearby GNU/Linux user group. 
 
91  
A new app published by Google <a href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets banks and creditors deactivate people's Android devices</a> if they fail to make payments. If someone's device gets deactivated, it will be limited to basic functionality, such as emergency calling and access to settings. 
 
92  
BMW will remotely <a href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"> enable and disable functionality in cars</a> through a universal back door. 
 
93  
The <a href="https://www.google.com/mobile/android/market-tos.html"> Google Play Terms of Service</a> insist that the user of Android accept the presence of universal back doors in apps released by Google. 
 
95  
Android phones subsidized by the US government come with <a href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"> preinstalled adware and a back door for forcing installation of apps</a>. 
 
96  
The adware is in a modified version of an essential system configuration app. The back door is a surreptitious addition to a program whose stated purpose is to be a <a href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"> universal back door for firmware</a>. 
 
98  
The Chinese Communist Party's <a href="/proprietary/proprietary-surveillance.html#M201910130"> &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"> a back-door allowing developers to run any code they wish</a> in the users' phone, as &ldquo;superusers.&rdquo; 
 
99  
Note: The <a href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 
 
100  
ChromeBooks are programmed for obsolescence: ChromeOS has a universal back door that is used for updates and <a href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"> ceases to operate at a predefined date</a>. From then on, there appears to be no support whatsoever for the computer. 
 
102  
The FordPass Connect feature of some Ford vehicles has <a href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 
 
104  
New GM cars <a href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"> offer the feature of a universal back door</a>. 
 
107 | Sony has brought back its robotic pet Aibo, this time <a
| [-href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">-]
| {+href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">+}
| with a universal back door, and tethered to a server that requires a
| subscription</a>. 
Sony has brought back its robotic pet Aibo, this time <a href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"> with a universal back door, and tethered to a server that requires a subscription</a>. 
Sony bringt Roboterhund <b>Aibo</b> zurück: <a href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"> mit universeller Hintertür und an einen Server angebunden, der ein Abonnement erforderlich macht</a>. 
111 | Xiaomi phones come with <a
| [-href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">-]
| {+href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">+}
| a universal back door in the application processor, for Xiaomi's use</a>. 
Xiaomi phones come with <a href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"> a universal back door in the application processor, for Xiaomi's use</a>. 
Xiaomi Telefone kommen mit einer <a href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">universellen Hintertür im Applikations-Prozessor</a>, zur Nutzung durch Xiaomi. 
113  
Microsoft Windows has a universal back door through which <a href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"> any change whatsoever can be imposed on the users</a>. 
Microsoft Windows enthält universelle Hintertür, durch welche <a href="https://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183" title="Microsoft Updates Windows Without User Permission, Apologizes, unter: informationweek.com 2007.">Nutzern Änderungen jeglicher Art aufgezwungen</a> werden können.<a href="#tn01" id="tn01-ref" class="transnote">[1]</a> 
114  
This was <a href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want"> reported in 2007</a> for XP and Vista, and it seems that Microsoft used the same method to push the <a href="/proprietary/malware-microsoft.html#windows10-forcing"> Windows 10 downgrade</a> to computers running Windows 7 and 8. 
 
115  
In Windows 10, the universal back door is no longer hidden; all &ldquo;upgrades&rdquo; will be <a href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"> forcibly and immediately imposed</a>. 
In Windows 10 wird die universelle Hintertür nicht mehr verborgen; alle <i>„Verbesserungen“</i> werden <a
href="//arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/" title="Windows 10 updates to be automatic and mandatory for Home users, unter: arstechnica.com 2015.">zwangsweise und unmittelbar durchgesetzt</a>. 
118 | <a
| href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
| A Chinese version of Android has a universal back door</a>. Nearly all
| models of mobile phones have a <a [-href="#universal-back-door">-]
| {+href="#universal-back-door-phone-modem">+} universal back door in the
| modem chip</a>. So why did Coolpad bother to introduce another? Because
| this one is controlled by Coolpad. 
<a href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"> A Chinese version of Android has a universal back door</a>. Nearly all models of mobile phones have a <a href="#universal-back-door-phone-modem"> universal back door in the modem chip</a>. So why did Coolpad bother to introduce another? Because this one is controlled by Coolpad. 
Eine <a href="//www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor" title="Chinese Android phones contain in-built hacker ‘backdoor’, unter: theguardian.com 2014.">chinesische Android-Variante verfügt über eine universelle Hintertür</a>. Nahezu alle Smartphone-Modelle verfügen über eine <a href="#universal-back-door">universelle Hintertür im Modem-Chip</a>. Warum also bemüht sich Coolpad, eine andere einzuführen? Weil diese durch Coolpad kontrolliert wird. 
119 | <a
| href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
| Some applications come with MyFreeProxy, which is a universal back
| [-door-] {+door</a>+} that can download programs and run [-them.</a>-]
| {+them.+} 
<a href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"> Some applications come with MyFreeProxy, which is a universal back door</a> that can download programs and run them. 
<a href="//www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/" title="Ravi Mandalia, Bitcoin miners bundled with PUPs in legitimate applications backed by EULA, unter: techienews.co.uk 2013.">Einige Anwendungen kommen mit MyFreeProxy, bei dem es sich um eine universelle Hintertür handelt, die Programme herunterladen und ausführen kann</a>. 
121 | In addition to its <a href="#swindle-eraser">book eraser</a>, the
| Kindle-Swindle has a <a
| href="http{+s+}://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
| universal back door</a>. 
In addition to its <a href="#swindle-eraser">book eraser</a>, the Kindle-Swindle has a <a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"> universal back door</a>. 
Der Sw(K)indle besitzt neben seinem <a href="#swindle-eraser">Buchlöscher</a> eine <a href="https://www.amazon.de/gp/help/customer/display.html?nodeId=200774090">universelle Hintertür</a>. 
122 | Almost every phone's communication processor has a universal back door
| which is <a
| href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
| often used to make a phone transmit all conversations it hears</a>. {+See
| <a
| href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware
| in Mobile Devices</a> for more info.+} 
Almost every phone's communication processor has a universal back door which is <a href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"> often used to make a phone transmit all conversations it hears</a>. See <a href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware in Mobile Devices</a> for more info. 
Fast jeder Telefon-Kommunikationsprozessor hat eine universelle Hintertür, der <a href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html" title="Remotely Eavesdropping on Cell Phone Microphones, in: Schneier on Security 2006.">oft dazu verwendet wird alle Gespräche <ins>in der Nähe des Telefons</ins> abzuhören und zu übertragen</a>. 
126  
Dell computers, shipped with Windows, had a bogus root certificate that <a href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"> allowed anyone (not just Dell) to remotely authorize any software to run</a> on the computer. 
Mit Windows ausgelieferte Dell-Rechner hatten ein falsches Root-Zertifikat, das <a href="//fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/" title="Christine Hall, Dell, Comcast, Intel &amp; Who Knows Who Else Are Out to Get You, FOSS Force 2015.">jedermann (nicht nur Dell) autorisierte per Fernzugriff jegliche Software auf dem Rechner auszuführen</a>. 
127  
ARRIS cable modem has a <a href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"> back door in the back door</a>. 
Kabelmodems von Arris haben <a href="//w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1" title="Bernardo Rodrigues, ARRIS Cable Modem has a Backdoor in the Backdoor, w00tsec 2015.">Hintertür in der Hintertür</a>. 
128 | &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
| proprietary firmware so you can't trust it. Western Digital's [-<a
| href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">-]
| &ldquo;My Passport&rdquo; drives {+<a
| href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">+}
| have a back door</a>. 
&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo; drives <a href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"> have a back door</a>. 
„Selbstverschlüsselnde“ Plattenlaufwerke führen die Verschlüsselung mittels proprietärer Firmware durch, der man daher nicht uneingeschränkt vertrauen kann. Western Digitals „My Passport“-Festplatten <a href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption" title="Some Popular 'Self Encrypting' Hard Drives Have Really Bad Encryption, unter: motherboard.vice.com 2015.">haben eine Hintertür</a>. 
130  
Here is a big problem whose details are still secret: <a href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"> The FBI asks lots of companies to put back doors in proprietary programs</a>. We don't know of specific cases where this was done, but every proprietary program for encryption is a possibility. 
Hier liegt ein großes Problem vor, dessen Einzelheiten geheim gehalten werden:<a href="//mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">Das FBI fordert viele Unternehmen auf Hintertüren in proprietäre Programme hinzuzufügen</a><br />&#8209;&#160;uns sind zwar keine konkreten Fälle bekannt, aber jedes proprietäre Programm was der Verschlüsselung dient ist eine potentielle Möglichkeit. 
131  
The German government <a href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers away from Windows 8 computers with TPM 2.0</a> (<a href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original article in German</a>), due to potential back door capabilities of the TPM 2.0 chip. 
 
132 | Here is a suspicion that we can't prove, but is worth thinking about: <a
| href="http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
| Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
| for the NSA to invade computers, with the help of Microsoft, say respected
| security experts. 
Here is a suspicion that we can't prove, but is worth thinking about: <a href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"> Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for the NSA to invade computers, with the help of Microsoft, say respected security experts. 
Ein unbewiesener Verdacht, aber Wert darübernachzudenken: <a href="https://web.archive.org/web/20150206003913/www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI" title="Christopher Joye, Intel chips could let US spies inside: expert, The Australian Financial Review 2013.">Schreibbarer Mikrocode für Intel- und AMD-Mikroprozessoren</a> kann durchaus ein Instrument für den US-Geheimdienst NSA sein, um&#160;&#8209;&#160;mit der Hilfe von Microsoft&#160;&#8209;&#160;in Rechner einzudringen, sagen angesehene Sicherheitsexperten. 
135 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams</strong>:</p>
<ol id="transnote">
<li><p><strong>Weiterführende Referenzen</strong>:</p>
<ol style="list-style-type:none">
<li id="tn01"><a href="#tn01-ref">[1]</a> Zeit Online, <cite><a
href="//www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">Bundesbehörden sehen Risiken beim Einsatz von Windows 8</a></cite>, unter: zeit.de 2013. (abgerufen 2013-11-20)<br />
<span id="tn01-1"><a href="#tn01-1-ref">[1-1]</a> BSI, <cite><a
href="https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html">Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM</a></cite>, unter: bsi.bund.de 2013. (abgerufen 2017-01-26)</span></li>
<li id="tn02"><a href="#tn02-ref">[2]</a> Spiegel Online, <cite><a
href="//www.spiegel.de/netzwelt/mobil/apple-jobs-bestaetigt-iphone-hintertuer-a-571219.html">Apple: Jobs bestätigt iPhone-Hintertür</a></cite>, unter: spiegel.de 2008. (abgerufen 2014-02-24)</li>
<li id="tn03"><a href="#tn03-ref">[3]</a> Heise Security, <cite><a
href="//www.heise.de/security/meldung/D-Link-Router-mit-Hintertuer-1977835.html">D-Link-Router mit Hintertür</a></cite>, unter: heise.de 2013. (abgerufen 2014-02-24)</li>
<li id="tn04"><a href="#tn04-ref">[4]</a> Heise Online, <cite><a
href="//heise.de/-211807">Google kann Android-Anwendungen löschen</a></cite>, unter: heise.de 2008. (abgerufen 2014-07-04)</li>
<li id="tn05"><a href="#tn05-ref">[5]</a> Heise Online, <cite><a
href="//heise.de/-1029709">Googles Einfluss auf Android-Handys</a></cite>, unter: heise.de 2010. (abgerufen 2014-07-04)</li>
<li id="tn06"><a href="#tn06-ref">[6]</a> Heise Online, <cite><a
href="//heise.de/-1028907">Google löscht Android-App auf Smartphones aus der Ferne</a></cite>, unter: heise.de 2010. (abgerufen 2014-07-04)</li>
</ol></li></ol> 
137 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
139  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a
rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.