malware-apple.nl.po

Mismatched links: 80.

Mismatched ids: 0.

#text
10  
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
 
12  
If you know of an example that ought to be in this page but isn't here, please write to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a> to inform us. Please include the URL of a trustworthy reference or two to serve as specific substantiation. 
 
16 | <a [-href="#back-doors">Back doors</a>-] {+href="#drm">DRM</a>+} 
<a href="#drm">DRM</a> 
<a href="#back-doors">Achterdeuren</a> 
17 | <a [-href="#insecurity">Insecurity</a>-]
| {+href="#incompatibility">Incompatibility</a>+} 
<a href="#incompatibility">Incompatibility</a> 
<a href="#insecurity">Onveiligheid</a> 
20 TODO: please take a look. 
<a href="#jails">Jails</a> 
<a href="#manipulation">Manipulatie</a> 
24 TODO: please take a look. 
<a href="#subscriptions">Subscriptions</a> 
<a href="#manipulation">Manipulatie</a> 
26 | <a [-href="#sabotage">Sabotage</a>-] {+href="#tyrants">Tyrants</a>+} 
<a href="#tyrants">Tyrants</a> 
<a href="#sabotage">Saboteren</a> 
28  
Apple appears to say that <a href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"> there is a back door in MacOS</a> for automatically updating some (all?) apps. 
 
30  
The Dropbox app for Macintosh <a href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"> takes control of user interface items after luring the user into entering an admin password</a>. 
 
35  
Apple mainly uses iOS, which is a typical jail, to impose censorship through the Apple Store. Please refer to the <a href="#jails">Apple Jails</a> section for more information. 
 
37 | [-<a href="#drm">Digital-]{+Digital+} restrictions [-management</a>-]
| {+management,+} or [-&ldquo;DRM&rdquo;&mdash;functionalities-]
| {+&ldquo;DRM,&rdquo; refers to functionalities+} designed to restrict what
| users can do with the data in their computers. 
Digital restrictions management, or &ldquo;DRM,&rdquo; refers to functionalities designed to restrict what users can do with the data in their computers. 
<a href="#drm">Digitaal beheer van beperkingen</a> or &ldquo;DRM&rdquo;&mdash;mechanismen die zijn gemaakt om te beperken wat gebruikers kunnen doen met bestanden in hun eigen computer. 
38  
Apple's new tactic to restrict users from repairing their own device and impose DRM on people is to <a href="https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever">completely disable its Face ID functionality</a> when you replace its screen. 
 
39  
Apple is putting DRM on iPhone batteries, and the system proprietary software <a href="#M201908150">turns off certain features when batteries are replaced other than by Apple.</a> 
 
40  
DRM makes the iPhone 7 nearly <a href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple. 
 
41 | <a
| [-href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">-]
| {+href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">+}
| Apple uses DRM software to prevent people from charging an iThing with a
| generic USB cable</a>. 
<a href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"> Apple uses DRM software to prevent people from charging an iThing with a generic USB cable</a>. 
<a href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"> Apple gebruikt DRM-software om mensen te verhinderen om een iDing op te laden met een generieke USB-kabel</a>. 
44  
iTunes videos have DRM, which allows Apple to <a href="https://en.wikipedia.org/wiki/FairPlay">dictate where its customers can watch the videos they purchased</a>. 
 
47  
In MacOS and iOS, the procedure for <a href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"> converting images from the Photos format</a> to a free format is so tedious and time-consuming that users just give up if they have a lot of them. 
 
48  
Apple devices lock users in <a href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"> solely to Apple services</a> by being designed to be incompatible with all other options, ethical or unethical. 
 
49  
iWork (office software that runs on MacOS, iOS and iCloud) uses secret formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no means of converting them to or from Open Document Formats</a>. iWork formats have changed several times since they were first introduced. This may have had the effect of thwarting <a href="https://github.com/obriensp/iWorkFileFormat">reverse engineering efforts</a>, thus preventing free software from fully supporting them. 
 
50  
iWork formats are considered <a href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"> unfit for document preservation</a>. 
 
53  
<a href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"> The pegasus spyware used vulnerabilities on proprietary smartphone operating systems</a> to impose surveillance on people. It can record people's calls, copy their messages, and secretly film them, using a security vulnerability. There's also <a href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"> a technical analysis of this spyware</a> available in PDF format. 
 
55  
<small>Please note that the article wrongly refers to crackers as &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small> 
 
56  
Commercial crackware can <a href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say"> get passwords out of an iMonster</a>, use the microphone and camera, and other things. 
 
57  
Apple has <a href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 
 
59  
A series of vulnerabilities <a href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found in iOS allowed attackers to gain access to sensitive information including private messages, passwords, photos and contacts stored on the user's iMonster</a>. 
 
63  
<a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"> lots of bugs in the phones' radio software</a>. 
 
66  
<a href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple">Apple is systematically undermining interoperability</a>. At the hardware level, it does this via nonstandard plugs, buses and networks. At the software level, it does this by not letting the user have any data except within one app. 
 
67  
Apple is putting DRM on iPhone batteries, and the system proprietary software <a href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns off certain features when batteries are replaced other than by Apple.</a> 
 
69 | [-<a href="#jails">Jails</a>&mdash;systems-]{+Jails are systems+} that
| impose censorship on application programs. 
Jails are systems that impose censorship on application programs. 
<a href="#jails">Tralies</a>&mdash;systemen die censuur opleggen op toepassingen. 
70  
Apple has made it <a href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"> impossible to load Navalny's tactical voting app into an iPhone</a> in Russia. 
 
72  
Apple plans to require that <a href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"> all application software for MacOS be approved by Apple first</a>. 
 
73  
Offering a checking service as an option could be useful and would not be wrong. Requiring users to get Apple's approval is tyranny. Apple says the check will only look for malware (not counting the malware that is <a href="/proprietary/malware-apple.html#TOC">part of the operating system</a>), but Apple could change that policy step by step. Or perhaps Apple will define malware to include any app that China does not like. 
 
75  
<a href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"> iOS, the operating system of the Apple iThings, is the prototype of a jail</a>. It was Apple that introduced the practice of designing general purpose computers with censorship of application programs. 
 
79  
The Russian communications watchdog <a href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"> tells Google and Apple to remove Navalny's app</a> from their stores. 
 
81  
Apple is <a href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers"> putting the squeeze on all business</a> conducted through apps for iMonsters. 
 
83  
Apple has <a href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism"> banned the app that Hong Kong protesters use to communicate</a>. 
 
85  
Apple <a href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html"> censors the Taiwan flag in iOS</a> on behalf of the Chinese government. When the region is set to Hong Kong, this flag is not visible in the emoji selection widget but is still accessible. When the region is set to mainland China, all attempts to display it will result in the &ldquo;empty emoji&rdquo; icon as if the flag never existed. 
 
87  
Users caught in the jail of an iMonster are <a href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting ducks for other attackers</a>, and the app censorship prevents security companies from figuring out how those attacks work. 
 
89  
Apple is <a href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"> censoring apps for the US government too</a>. Specifically, it is deleting apps developed by Iranians. 
 
91  
Apple <a href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"> deleted several VPNs from its app store for China</a>, thus using its own censorship power to strengthen that of the Chinese government. 
 
92  
Apple used its censorship system to enforce Russian surveillance <a href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"> by blocking distribution of the LinkedIn app in Russia</a>. 
 
95  
Apple used its censorship system to enforce China's censorship <a href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"> by blocking distribution of the New York Times app</a>. 
 
100  
Apple has banned iThing applications that show the confederate flag. <a href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"> Not only those that use it as a symbol of racism</a>, but even strategic games that use it to represent confederate army units fighting in the Civil War. 
 
103  
Apple used this censorship power in 2014 to <a href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"> ban all bitcoin apps</a> for the iThings for a time. It also <a href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"> banned a game about growing marijuana</a>, while permitting games about other crimes such as killing people. Perhaps Apple considers killing more acceptable than marijuana. 
 
113  
When Apple suspects a user of fraud, it judges the case secretly and presents the verdict as a fait accompli. The punishment to a user found guilty <a href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is being cut off for life, which more-or-less cripples the user's Apple devices forever</a>. There is no appeal. 
 
114  
Apple and Samsung deliberately <a href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade the performance of older phones to force users to buy their newer phones</a>. 
 
115  
Apple has <a href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked Telegram from upgrading its app for a month</a>. 
 
117  
The Telegram client is free software on other platforms, but not on iThings. Since <a href="/proprietary/proprietary-jails.html#apple">they are jails</a>, they don't permit any app to be free software. 
 
118  
MacOS High Sierra forcibly reformats SSD boot drives, and <a href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"> changes the file system from HFS+ to APFS</a>, which cannot be accessed from GNU/Linux, Windows or even older versions of MacOS. 
 
119  
Apple will stop <a href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing bugs for older model iThings</a>. 
 
121  
The iPhone 7 contains DRM specifically designed to <a href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>. &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple. 
 
122  
<small>(The article uses the term &ldquo;lock&rdquo; to describe the DRM, but we prefer to use the term <a href="/philosophy/words-to-avoid.html#DigitalLocks"> digital handcuffs</a>.)</small> 
 
130  
Apple can remotely <a href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games"> cut off any developer's access to the tools for developing software</a> for iOS or MacOS. 
 
131  
Epic (Apple's target in this example) makes nonfree games which have their own <a href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/"> malicious features</a>, but that doesn't make it acceptable for Apple to have this sort of power. 
 
133  
<a href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 
 
134  
Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 
 
137  
Google, Apple, and Microsoft (and probably some other companies) <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are collecting people's access points and GPS coordinates (which can identify people's precise location) even if their GPS is turned off</a>, without the person's consent, using proprietary software implemented in person's smartphone. Though merely asking for permission would not necessarily legitimize this. 
 
138  
Safari occasionally <a href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 
 
139  
The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 
 
140  
Note: The <a href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 
 
141  
In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"> sending users' personal information to third parties</a>. 
 
143  
Adware Doctor, an ad blocker for MacOS, <a href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports the user's browsing history</a>. 
 
144  
The DMCA and the EU Copyright Directive make it <a href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"> illegal to study how iOS cr&hellip;apps spy on users</a>, because this would require circumventing the iOS DRM. 
 
145  
In the latest iThings system, &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"> doesn't really turn them off</a>. A more advanced way really does turn them off&mdash;only until 5am. That's Apple for you&mdash;&ldquo;We know you want to be spied on&rdquo;. 
 
146  
Apple proposes <a href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a fingerprint-scanning touch screen</a>&mdash;which would mean no way to use it without having your fingerprints taken. Users would have no way to tell whether the phone is snooping on them. 
 
164  
<a href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. 
 
165  
The iThing also <a href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"> tells Apple its geolocation</a> by default, though that can be turned off. 
 
166  
There is also a feature for web sites to track users, which is <a href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) 
 
169 | [-<a href="#tyrants">Tyrants</a>&mdash;systems-]{+Tyrants are systems+}
| that reject any operating system not &ldquo;authorized&rdquo; by the
| manufacturer. 
Tyrants are systems that reject any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="#tyrants">Tirannen</a>&mdash;systemen die elk besturingssysteem dat niet is &ldquo;goedgekeurd&rdquo; door de fabrikant, niet uitvoeren. 
174 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
We doen ons best om goede vertalingen te maken maar staan altijd open voor verbeteringen. Suggesties, op- en aanmerkingen sturen aan: <a href="mailto:web-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p> <p>Zie <a href="/server/standards/README.translations.html"> Translations README</a> voor informatie over het onderhoud van vertalingen op deze website. 
176  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Deze pagina is uitgebracht onder een <a rel="license" href="https://creativecommons.org/licenses/by/4.0/deed.nl">Creative Commons Naamsvermelding 4.0 Internationaal licentie</a>.