<!--#includevirtual="/server/header.html"virtual="/server/html5-header.html" --> <!-- Parent-Version:1.791.96 --> <!-- This page is derived from /server/standards/boilerplate.html --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Please do not edit <ul class="blurbs">! Instead, edit /proprietary/workshop/mal.rec, then regenerate pages. See explanations in /proprietary/workshop/README.md. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <title>Proprietary Software - GNU Project - Free Software Foundation</title> <!--#include virtual="/proprietary/po/proprietary.translist" --> <style type="text/css" media="print,screen">div.companies<!-- #skiplinks .button { float:right; margin-bottom:left; margin: .5em; }div.malfunctions#skiplinks .button a { display: inline-block; } #about-section { font-size: 1.06em; font-style: italic; margin: 2em 0; } table#TOC { display: block; max-width:27em;100%; width: max-content; overflow: auto; border: .2em solid #e0dfda; margin: 2.5em auto; }<!-- #content div.toc#TOC th, #TOC td { text-align: center; padding: .7em; border-collapse: collapse; } #TOC th { vertical-align: middle; font-size: 1.1em; font-weight: bold; background: #fffae0; } #TOC td { vertical-align: top; } #TOC ul { padding-top: .5em; margin: 0; } #TOC ul li { padding-bottom: .5em; margin: 0; list-style: none;margin-bottom: 1em;}#content div.toc#TOC ol { text-align: left; margin: 0; } #TOC ol li { margin: .5em 5%; } #TOC a, #TOC a:visited, #skiplinks a, #skiplinks a:visited {margin-top: 1em;color: #004caa; text-decoration: none; } #TOC a { text-decoration: none; } #TOC a:hover { text-decoration: underline; } --> </style> <style type="text/css" media="print,screen"> .reduced-width { width: 55em; } </style> <!--#include virtual="/server/banner.html" --> <div class="reduced-width"> <h2>Proprietary Software Is Often Malware</h2> <div id="skiplinks"> <p class="button"><a href="#TOC">Table of contents</a></p> <p class="button"><a href="#latest">Latest additions</a></p> </div> <div style="clear: both"></div> <div id="about-section"> <p>Proprietary software, also called nonfree software, means software that doesn't <a href="/philosophy/free-sw.html">respect users' freedom and community</a>. A proprietary program puts its developer or owner <a href="/philosophy/free-software-even-more-important.html"> in a position of power over its users.</a> This power is in itself an injustice.</p> <p>The point of thispagedirectory is to show by examples that the initial injustice of proprietary software often leads to further injustices: malicious functionalities.</p> <p>Power corrupts; the proprietary program's developer is tempted to design the program to mistreat its users. (Softwarewhose functioningdesigned to function in a way that mistreats the user is called <em>malware</em>.) Of course, the developer usually does not do this out of malice, but rather to profit more at the users' expense. That does not make it any less nasty or more legitimate.</p> <p>Yielding to that temptation has become ever more frequent; nowadays it is standard practice. Modern proprietary software is typically an opportunity to be tricked, harmed, bullied or swindled.</p> <p>Online services are not released software, but in regard to all the bad aspects, using awayservice is equivalent to using a copy of released software. In particular, a service can behad.</p>designed to mistreat the user, and many services do that. However, we do not list instances of malicious dis-services here, for two reasons. First, a service (whether malicious or not) is not a program that one could install a copy of, and there is no way at all for users to change it. Second, it is so obvious that a service can mistreat users if the owner wishes that we hardly need to prove it.</p> <p>However, most online services require the user to run a nonfree app. The app <em>is</em> released software, so we do list malicious functionalities of these apps. Mistreatment by the service itself is imposed by use of the app, so sometimes we mention those mistreatments too—but we try to state explicitly what is done by the app and what is done by the dis-service.</p> <p>When a web site provides access to a service, it very likely sends nonfree JavaScript software to execute in the user's browser. Such JavaScript code is released software, and it's morally equivalent to other nonfree apps. If it does malicious things, we want to mention them here.</p> <p>When talking about mobile phones, we do list <a href="/proprietary/malware-mobiles.html#phone-communications">one other malicious characteristic, location tracking</a> which is caused by the underlying radio system rather than by the specific software in them.</p> </div> <p>As ofJanuary, 2017,March 2025, thefilespages in this directory list around260600 instances of maliciousfunctionalities,functionalities (with more than 750 references to back them up), but there are surely thousands more we don't know about.</p><div class="toc"> <div class="companies"> <ul> <li><strong>Company<p>Ideally we would list every instance. If you come across an instance which we do not list, please write to webmasters@gnu.org to tell us about it. Please include a reference to a reputable article that describes the malicious behavior clearly; we won't list an item without documentation to point to.</p> <p>If you want to be notified when we add new items ortype of product</strong></li> <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li> <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li> <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li> <li><a href="/proprietary/malware-mobiles.html">Malware in mobile devices</a></li> <li><a href="/proprietary/malware-kindle-swindle.html">Malware inmake other changes, subscribe to theAmazon Swindle</a></li> <li><a href="/proprietary/malware-games.html">Malware in games</a></li><a href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing list <www-malware-commits@gnu.org></a>.</p> <table id="TOC"> <tr> <th>Injustices or techniques</th> <th>Products or companies</th> </tr> <tr> <td> <ul class="columns"> <li><ahref="/proprietary/malware-appliances.html">Malware in appliances</a></li> </ul> </div> <div class="malfunctions"> <ul> <li><strong>Type of malware</strong></li>href="/proprietary/proprietary-addictions.html">Addictions</a></li> <li><a href="/proprietary/proprietary-back-doors.html">Backdoors</a></li>doors</a> (<a href="#f1">1</a>)</li> <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li> <li><a href="/proprietary/proprietary-coercion.html">Coercion</a></li> <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li> <li><a href="/proprietary/proprietary-deception.html">Deception</a></li> <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a href="#f2">2</a>)</li> <li><a href="/proprietary/proprietary-fraud.html">Fraud</a></li> <li><a href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li> <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li> <li><a href="/proprietary/proprietary-interference.html">Interference</a></li> <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a href="#f3">3</a>)</li> <li><a href="/proprietary/proprietary-manipulation.html">Manipulation</a></li> <li><a href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li> <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li> <li><ahref="/proprietary/proprietary-interference.html">Interference</a></li>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li> <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li> <li><ahref="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a href="#f4">4</a>)</li> <li><ahref="/proprietary/proprietary-tethers.html">Tethers</a> to servers</li>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a href="#f5">5</a>)</li> <li><a href="/proprietary/potential-malware.html">In the pipe</a></li> </ul> </td> <td> <ul> <li><a href="/proprietary/malware-appliances.html">Appliances</a></li> <li><a href="/proprietary/malware-cars.html">Cars</a></li> <li><a href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li> <li><a href="/proprietary/malware-edtech.html">EdTech</a></li> <li><a href="/proprietary/malware-games.html">Games</a></li> <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li> <li><a href="/proprietary/malware-webpages.html">Webpages</a></li> </ul> <ul> <li><ahref="/proprietary/proprietary-drm.html">Digitalhref="/proprietary/malware-adobe.html">Adobe</a></li> <li><a href="/proprietary/malware-amazon.html">Amazon</a></li> <li><a href="/proprietary/malware-apple.html">Apple</a></li> <li><a href="/proprietary/malware-google.html">Google</a></li> <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li> </ul> </td> </tr> <tr> <td colspan="2"> <ol> <li id="f1"><em>Back door:</em> any feature of a program that enables someone who is not supposed to be in control of the computer where it is installed to send it commands.</li> <li id="f2"><em>Digital restrictionsmanagement</a>management, or“DRM” means“DRM”:</em> functionalities designed to restrict what users can do with the data in their computers.</li><li><a href="/proprietary/proprietary-jails.html">Jails</a>—systems<li id="f3"><em>Jail:</em> system thatimposeimposes censorship on application programs.</li><li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems<li id="f4"><em>Tether:</em> functionality that requires permanent (or very frequent) connection to a server.</li> <li id="f5"><em>Tyrant:</em> system thatrejectrejects any operating system not “authorized” by the manufacturer.</li></ul> </div> </div></ol> </td> </tr> </table> <p>Users of proprietary software are defenseless against these forms of mistreatment. The way to avoid them is by insisting on <a href="/philosophy/free-software-even-more-important.html">free (freedom-respecting)software.</a>software</a>. Since free software is controlled by its users, they have a pretty good defense against malicious software functionality.</p> <h3 id="latest">Latest additions</h3> <ul class="blurbs"> <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. --> <li id="M202408140"> <!--#set var="DATE" value='<small class="date-tag">2024-08</small>' --><!--#echo encoding="none" var="DATE" --> <p><a href="https://www.bleepingcomputer.com/news/microsoft/zero-click-windows-tcp-ip-rce-impacts-all-systems-with-ipv6-enabled-patch-now/"> A critical vulnerability in Windows systems that support IPv6</a> was discovered in 2024, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063"> 16 years after the first affected system</a> was released. Unless the relevant patch is applied, an attacker can remotely execute arbitrary code on these systems. Microsoft considers exploits “likely.”</p> <p>The same sort of vulnerability in a free/libre operating system would probably be discovered sooner, since many more people would be able to look at the source code.</p> </li> <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. --> <li id="M202411040"> <!--#set var="DATE" value='<small class="date-tag">2024-11</small>' --><!--#echo encoding="none" var="DATE" --> <p>The Pixel 9 “smart”phone <a href="https://cybernews.com/security/google-pixel-9-phone-beams-data-and-awaits-commands/"> frequently updates Google servers with its location and current configuration</a> along with personally identifiable data, raising concerns about user privacy. Moreover, it communicates with services that are not in use, and periodically attempts to download experimental, possibly insecure software. The system does not inform the user that it is doing all this.</p> <p>There is hope, however: it is possible to <a href="https://doc.e.foundation/devices"> replace the original Android operating system with a deGoogled version</a> in Pixel phones up to 8a, and in phones from many other brands. No doubt that the Pixel 9 will be supported soon.</p> </li> <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. --> <li id="M202312040"> <!--#set var="DATE" value='<small class="date-tag">2023-12</small>' --><!--#echo encoding="none" var="DATE" --> <p>Bungie's Destiny 2 is plagued with two major flaws:</p> <ul> <li>Like all proprietary tethered games, <a href="https://destinytracker.com/destiny-2/articles/is-destiny-2-down-how-to-check-server-maintenance-and-downtime"> it can't be played when the company's servers are offline</a>.</li> <li>Ever since Bungie chose BattlEye as an anti-cheat program, Destiny 2 has been <a href="https://areweanticheatyet.com/"> incompatible with GNU/Linux</a> <small>[this page can't be viewed without JavaScript]</small>. Bungie forces Steam Deck users to <a href="https://www.pcguide.com/steam-deck/play-destiny-2/"> replace SteamOS with Windows, or play from Edge browser</a>. This doesn't have to be so, as several other games that use BattlEye do support GNU/Linux systems. Rather than doing the necessary adjustments, Bungie forces users to run nonfree software in order to keep an absolute control over them.</li> </ul> </li> <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. --> <li id="M201801260"> <!--#set var="DATE" value='<small class="date-tag">2018-01</small>' --><!--#echo encoding="none" var="DATE" --> <p>Google's ad platform enabled advertisers to <a href="https://arstechnica.com/information-technology/2018/01/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners/"> run cryptocurrency miner code on the computers of YouTube users through proprietary JavaScript</a>. Some people noticed this, and the outrage made Google remove the miners, but the number of affected users was probably very high.</p> </li> <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. --> <li id="M202502280"> <!--#set var="DATE" value='<small class="date-tag">2025-02</small>' --><!--#echo encoding="none" var="DATE" --> <p><a href="https://arstechnica.com/gadgets/2025/02/on-may-5-microsofts-skype-will-shut-down-for-good/"> Microsoft is shutting down Skype</a> on May 5th, 2025. As with other tethered proprietary programs, users have to rely on servers that are controlled by the developer. When these servers shut down, the service disappears. Instead of migrating to the service that Microsoft suggests as a replacement, Skype users should regain control of their communications by switching to one that is based on free software. <a href="https://jitsi.org/jitsi-meet/">Jitsi Meet</a>, for example, is appropriate for small video meetings. Anyone can set up a Jitsi server and let other people use it, and indeed many of these are available around the world.</p> </li> </ul> <p class="button right-align"> <a href="/proprietary/all.html">More items…</a></p> </div> </div><!-- for id="content", starts in the include above --> <!--#include virtual="/server/footer.html" --> <divid="footer">id="footer" role="contentinfo"> <div class="unprintable"> <p>Please send general FSF & GNU inquiries to <a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>. There are also <a href="/contact/">other ways to contact</a> the FSF. Broken links and other corrections or suggestions can be sent to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p> <p><!-- TRANSLATORS: Ignore the original text in this paragraph, replace it with the translation of these two: We work hard and do our best to provide accurate, good quality translations. However, we are not exempt from imperfection. Please send your comments and general suggestions in this regard to <a href="mailto:web-translators@gnu.org"> <web-translators@gnu.org></a>.</p> <p>For information on coordinating andsubmittingcontributing translations of our web pages, see <a href="/server/standards/README.translations.html">Translations README</a>. --> Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating andsubmittingcontributing translations of this article.</p> </div> <!-- Regarding copyright, in general, standalone pages (as opposed to files generated as part of manuals) on the GNU web server should be under CC BY-ND 4.0. Please do NOT change or remove this without talking with the webmasters or licensing team first. Please make sure the copyright date is consistent with the document. For web pages, it is ok to list just the latest year the document was modified, or published. If you wish to list earlier years, that is ok too. Either "2001, 2002, 2003" or "2001-2003" are ok for specifying years, as long as each year in the range is in fact a copyrightable year, i.e., a year in which the document was published (including being publicly visible on the web or in a revision control system). There is more detail about copyright years in the GNU Maintainers Information document, www.gnu.org/prep/maintain. --> <p>Copyright ©2013, 2014, 2015, 2016, 20172013-2025 Free Software Foundation, Inc.</p> <p>This page is licensed under a <a rel="license"href="http://creativecommons.org/licenses/by-nd/4.0/">Creativehref="http://creativecommons.org/licenses/by/4.0/">Creative CommonsAttribution-NoDerivativesAttribution 4.0 International License</a>.</p> <!--#include virtual="/server/bottom-notes.html" --> <p class="unprintable">Updated: <!-- timestamp start --> $Date: 2025/03/17 14:42:46 $ <!-- timestamp end --> </p> </div></div></div><!-- for class="inner", starts in the banner include --> </body> </html>