Do something

Windows 7大罪

Windows 7によってマイクロソフトはあなたのコンピュータの法的支配を確立し、その権力をもってコンピュータユーザーを利用しています。

プライバシーとマイクロソフト

あなたのコンピュータは誰から指示を受けるべきでしょうか

大抵の人は自分のコンピュータは、他人ではなく、自分に従うべきだと考えます。しかしながら、"「信頼できるコンピューティング」と呼ばれるプランと、「Windows 推奨プログラム」というソフトウェアを使って、マイクロソフトや他社はあなたのコンピュータが、あなたではなく、彼らの言うことに従うようにしようと計画しており、これはあなたのプライバシーに重大な影響をもたらします。

Windows 推奨プログラム(WGA)はあなたのコンピュータを遠隔からチェックするマイクロソフトのシステムです。WGAがあなたのハードドライブの様々なパーツをスキャンすることで、あなたが「認証」されたバージョンのウィンドウズを使っている事をマイクロソフトが確認します。 WGAは必須の監視システムで、もしマイクロソフトがあなたは「認証」されていない と判断した場合、あなたのコンピュータの機能が作動しないようにすることができます。現在、マイクロソフトはWGAがチェックをすることを認めています。:

  • Computer make and model
  • BIOS
  • MAC address
  • A unique number assigned to your computer - Globally Unique Identifier or GUID
  • Hard drive serial number
  • Region and language settings of the operating system
  • Operating system version
  • PC BIOS information (make, version, date)
  • PC manufacturer
  • User locale setting
  • Validation and installation results.
  • Windows or Office product key
  • Windows XP product ID

WGA has caused a number privacy related problems, including deletion of software. WGA gets automatically updated as part of Microsoft's critical update procedures, giving users little choice but to accept changes to the systems Microsoft can monitor. Many have claimed that WGA is spyware, and although Microsoft have denied such intent, they retain the power to decide what counts as an invasion of your privacy.

For Windows 7 they are changing the name of the product to Windows 7 Activation Technologies (WAT), but the functionality remains the same.

Microsoft's version of a "Trusted Computing" scheme is called "Palladium". Proprietary programs have included malicious features before, but Palladium would make it universal.

Hollywood and the record companies will use Palladium to ensure that downloaded videos and music can be played only on one specified computer and the sharing of 'authorized' files will be entirely impossible.

Making sharing impossible is bad enough, but it gets worse. There are plans to use the same facility for email and documents--resulting in email that disappears in two weeks, or documents that can only be read on the computers in one company.

Imagine if you get an email from your boss telling you to do something that you think is risky; a month later, when it backfires, you can't use the email to show that the decision was not yours. "Getting it in writing" doesn't protect you when the order is written in disappearing ink.

Treacherous computing puts the existence of free operating systems and free applications at risk, because you may not be able to run them at all.

Some versions of treacherous computing would require the operating system to be specifically authorized by a particular company. Free operating systems could not be installed. Some versions of treacherous computing would require every program to be specifically authorized by the operating system developer.

You could not run free applications on such a system. If you did figure out how, and told someone, that could be a crime.