<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2A02%3A810D%3A548D%3AE500%3A5C12%3AAC0E%3A83CE%3A3E2E</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2A02%3A810D%3A548D%3AE500%3A5C12%3AAC0E%3A83CE%3A3E2E"/>
	<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/w/Special:Contributions/2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E"/>
	<updated>2026-05-21T22:09:10Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Bootloader_unlocking&amp;diff=22833</id>
		<title>Bootloader unlocking</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Bootloader_unlocking&amp;diff=22833"/>
		<updated>2025-08-29T17:52:16Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Workaround Google Play Services */ Add Unified Push to list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ToneWarning}}&lt;br /&gt;
&lt;br /&gt;
Unlocking the bootloader of a smartphone allows the user to install an alternative system on the device, also more popularly known as a custom ROM.&amp;lt;ref&amp;gt;{{Cite web |date=19 Aug 2025 |title=Android ROM |url=https://www.pcmag.com/encyclopedia/term/android-rom |url-status=live |archive-url=https://web.archive.org/web/20241223222958/https://www.pcmag.com/encyclopedia/term/android-rom |archive-date=23 Dec 2024 |website=PCMag}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Availability==&lt;br /&gt;
Unlocking the bootloader is only [[Phones that do not allow bootloader unlock|possible on some, but not all Android devices]]. Apple has measures in place to prevent users from installing third party operating systems on iPhones and iPads.&amp;lt;!-- Source? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. Better Privacy&#039;&#039;&#039;===&lt;br /&gt;
Most custom ROMs do not contain any of the components that send data to the manufacturer, Google, and their partner companies.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; In some cases, they even contain components that prevent individual apps from doing so, such as:&lt;br /&gt;
&lt;br /&gt;
*[https://doc.e.foundation/support-topics/advanced_privacy_main.html /e/&#039;s Advanced Privacy]&lt;br /&gt;
*[https://calyxos.org/docs/tech/datura-details/ CalyxOS&#039;s Datura Firewall]&lt;br /&gt;
*[https://github.com/iodeOS/ota iodéOS&#039;s blocker]&lt;br /&gt;
&lt;br /&gt;
====Workaround Google Play Services====&lt;br /&gt;
On a default Android system there is a deep integration with Google Play Services. This is a system process that requires access to files, contacts, storage, call logs, SMS messages, location, camera and microphone. And without this process running, basic system apps will not function.&amp;lt;ref&amp;gt;{{Cite web |last=Aragon |first=Jonah |date=21 Jul 2024 |title=Android |url=https://www.privacyguides.org/en/android/#install-a-custom-distribution |url-status=live |access-date=17 Aug 2025 |website=Privacy Guides}}&amp;lt;/ref&amp;gt; Alternative systems avoid this process entirely, or use a privacy preserving workaround such as:&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/features#sandboxed-google-play GrapheneOS&#039;s Sandboxed Google Play]&lt;br /&gt;
*[https://github.com/microg/GmsCore/wiki MicroG]&amp;lt;ref&amp;gt;{{Cite web |last=Gordon |first=Arielle |date=7 Jun 2019 |title=The Open Source Project That Keeps Google&#039;s Hands Off Your Android Data |url=https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |url-status=live |archive-url=https://web.archive.org/web/20250630130025/https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |archive-date=30 Jun 2025 |access-date=19 Aug 2025 |website=Vice}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
*[https://unifiedpush.org/ Unified Push]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. Expanding Device Lifespan&#039;&#039;&#039;===&lt;br /&gt;
Most custom ROMs are free of bloatware and can thus be used extend the longevity of phones that have become unusable due to the default system growing larger with each manufacturer update. Especially on low-end phones, these updates usually end up exhausting the built-in storage after sometimes as little as two years. This renders the devices slow and unstable and leaves no room for user data. Custom ROMs are typically much smaller than the manufacturer software. Consequently, many old phones can run even faster with a custom ROM than they were when new, thus often more than doubling their useful lifespan.&amp;lt;ref&amp;gt;{{Cite web |title=By how much do custom roms really extend Phone lifespans? |url=https://www.reddit.com/r/AndroidQuestions/comments/gdq2rc/comment/fpj11ay/ |access-date=2025-08-23 |website=Reddit}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=2023-03 |title= |url=https://community.e.foundation/t/xiaomi-redmi-8a-olivelite-with-dual-sim/29192/12 |access-date=2025-08-23 |website=/e/OS Community}}&amp;lt;/ref&amp;gt;&amp;lt;!-- Please provide better sources than forums and reddits. You can read the citation guide on this wiki for more tips --&amp;gt;&lt;br /&gt;
===&#039;&#039;&#039;3. Updates after device is abandoned by manufacturer&#039;&#039;&#039;===&lt;br /&gt;
Low-end devices usually receive only a few years or even months of security updates.&amp;lt;ref&amp;gt;{{Cite web |title=Android Update Matrix |url=https://www.androidupdatetracker.com/update-matrix |access-date=2025-08-23 |website=Android Update Tracker}}&amp;lt;/ref&amp;gt; Since most custom ROMs are built by the open source community, installing one of these custom ROMs allows users to receive security updates for the Android system and default components like web browser engines and PDF readers much longer than with the manufacturer&#039;s OS.&amp;lt;!-- Source? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Customisation&#039;&#039;&#039;===&lt;br /&gt;
Some applications cannot be removed easily with the default OS. A custom ROM can be used to only include the applications the user wants, potentially with customisation that isn&#039;t originally available by default.&amp;lt;!-- Source? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Alternative Android-based Operating Systems==&lt;br /&gt;
These include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS]&lt;br /&gt;
*[https://iode.tech/iodeos/ IodéOS]&lt;br /&gt;
*[https://e.foundation/e-os/ /e/OS]&lt;br /&gt;
*[https://lineageos.org/ LineageOS]&lt;br /&gt;
*[https://calyxos.org/ CalyxOS]&lt;br /&gt;
&lt;br /&gt;
*[https://source.android.com/ AOSP (Android Open Source Project)] , also known as &amp;quot;stock&amp;quot; Android.&amp;lt;ref&amp;gt;https://eylenburg.github.io/android_comparison.htm&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last=Patel |first=Pratham |date=20 Feb 2024 |title=5 De-Googled Android-based Operating Systems to Free Your Smartphone from Google and other Big Tech |url=https://itsfoss.com/android-distributions-roms/ |url-status=live |archive-url=https://web.archive.org/web/20250707220149/https://itsfoss.com/android-distributions-roms/ |archive-date=7 Jul 2025 |access-date=19 Aug 2025 |website=It&#039;s FOSS}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Home_Connect&amp;diff=22812</id>
		<title>Home Connect</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Home_Connect&amp;diff=22812"/>
		<updated>2025-08-29T16:38:37Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Links */ Format as list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&#039;&#039;&#039;Home Connect&#039;&#039;&#039; is the IoT Ecosystem brand for home appliances by the &#039;&#039;B/S/H Group&#039;&#039; which is the home of these appliance brands: &#039;&#039;Bosch&#039;&#039;, &#039;&#039;Siemens&#039;&#039;, &#039;&#039;Gaggenau&#039;&#039;, &#039;&#039;&amp;lt;u&amp;gt;Neff&amp;lt;/u&amp;gt;&#039;&#039;, &#039;&#039;Thermador&#039;&#039;, &#039;&#039;Constructa&#039;&#039;, &#039;&#039;Balay&#039;&#039;, &#039;&#039;Pitsos&#039;&#039;, &#039;&#039;Junker&#039;&#039;, &#039;&#039;Profilo&#039;&#039;.&amp;lt;ref&amp;gt;[https://www.bsh-group.com/ B/S/H Group website]&amp;lt;/ref&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
==Anti consumer practices==&lt;br /&gt;
Products that are part of this service, such as home appliances (dishwashers, etc.), require the user to register with a BSH owned single-sign-on-provider and create a cloud account to enable the Wi-Fi functionality.&amp;lt;ref&amp;gt;[https://www.youtube.com/watch?v=8XDBJ_CPi9I How to connect your Siemens washing machine to the Home Connect app]&amp;lt;/ref&amp;gt; After this you are allowed to disconnect the appliances from the cloud and use it offline with their app (no official local API provided) which bears the question of ownership of the device.  &lt;br /&gt;
&lt;br /&gt;
On 23th of March, 2025, Youtuber Jeff Geerling, under his second channel [https://www.youtube.com/@Level2Jeff Level 2 Jeff], uploaded a [https://www.youtube.com/watch?v=5M_hmwBBPnc video] detailing his process of installing a new Bosch 500 Series dishwasher in his home, and only after installing it, realizing it requires access to his Wi-Fi and an account in the Bosch&#039;s Home Connect Cloud, with some basic features like Rinsing and Delayed Washing not functioning without internet access. He details how the device took several seconds to boot up, having touch controls that didn&#039;t work properly and not having buttons for basic controls. Looking into the manual, several options were marked with an asterisk, with small text on the bottom of the page indicating a &amp;quot;required account on the Home Connect Cloud&amp;quot;. He further explains that since the service is free, he anticipates that Bosch is either going to require a subscription fee in the future or shut the service down when it is no longer viable for the manufacturer to maintain it. &lt;br /&gt;
&lt;br /&gt;
The manufacturer claims this to be necessary for security and call the (only after registration available) offline option &#039;No Cloud mode.&#039;&amp;lt;ref&amp;gt;[https://trmm.net/homeconnect/ Hacking your dishwasher (or Cloudless Home-Connect Appliances)], Trummel Hudson, trmm.net, Oct.2022&amp;lt;/ref&amp;gt; Primary function of the app is not controlling the device, but up-selling more B/S/H products, which can be discerned from that it takes two clicks upon opening the app the see the remaining time on the washing program, but immediately shows more purchasable products.&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=5EVf9a-nji4 YouTube video: B/S/H manager explaining their favorite Home Connect features]&lt;br /&gt;
* [https://www.youtube.com/watch?v=5M_hmwBBPnc YouTube video: Jeff Geerling with explanation of his own dishwasher and Home Connect]&lt;br /&gt;
* [[Bosch Cloud Dishwasher Incident]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Android_Developer_Verification&amp;diff=22759</id>
		<title>Android Developer Verification</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Android_Developer_Verification&amp;diff=22759"/>
		<updated>2025-08-29T08:14:12Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Consumer response */ Formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
{{IncidentCargo&lt;br /&gt;
|Company=Google&lt;br /&gt;
|StartDate=2025-08-25&lt;br /&gt;
|Status=Active&lt;br /&gt;
|ProductLine=Google-certified Android devices&lt;br /&gt;
|Product=Android&lt;br /&gt;
|ArticleType=Service&lt;br /&gt;
|Type=Anticompetitive Behavior, Digital restrictions, Privacy&lt;br /&gt;
|Description=A planned restriction that forces developers to submit their identity to Google and pay a fee for their apps to be installable onto Android devices.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
On August 25th 2025, Google has announced an upcoming application installation restriction on Google-certified Android devices, unless the developer is registered and verified through their Developer Verification program, which in some cases requires a legal identity document verification as well as a flat fee.&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
On the Android mobile operating system, the user can, currently, freely install applications developed by anyone, with no kinds of penalty as to their origin, feature set or purpose. The only requirements is that the application follows the technical guidelines, that ensure that the application will be functional on the device, and is signed with any kind of certificate, which is required to maintain a chain of trust during application updates.&lt;br /&gt;
&lt;br /&gt;
==Introduction of Developer Verification==&lt;br /&gt;
On August 25th 2025, Google has released&amp;lt;ref&amp;gt;{{Cite web |date=2025-08-25 |title=Android developer console {{!}} Android developer verification {{!}} Android Developers |url=https://developer.android.com/developer-verification |url-status=live |archive-url=https://web.archive.org/web/20250825180832/https://developer.android.com/developer-verification |archive-date=2025-08-25 |access-date=2025-08-25}}&amp;lt;/ref&amp;gt; a roadmap of a new requirement for application installations called the Developer Verification, which will require developers to register on the Android Developer Console, if they want their applications to be installable after the roll out of this system. When registering, the developers are offered a choice&amp;lt;ref&amp;gt;{{Cite web |date=2025-08-25 |title=Android developer verification {{!}} Android Developers |url=https://developer.android.com/developer-verification/guides/android-developer-console |url-status=live |archive-url=https://web.archive.org/web/20250825204008/https://developer.android.com/developer-verification/guides/android-developer-console |archive-date=2025-08-25 |access-date=2025-08-25}}&amp;lt;/ref&amp;gt; between &amp;quot;Limited&amp;quot; and &amp;quot;Full&amp;quot; distribution types. The &amp;quot;Limited&amp;quot; distribution type is considered by Google to be best for &amp;quot;students, hobbyists, and other personal use&amp;quot;, and is free to register, unlike the &amp;quot;Full&amp;quot; distribution type, which is considered to be suited for &amp;quot;organizations and professional developers with wide distribution&amp;quot;. The &amp;quot;Limited&amp;quot; type is stated to have a &amp;quot;capped number of apps and installs&amp;quot;, unlike the &amp;quot;Full&amp;quot; type. It is currently unclear whether or not the &amp;quot;Limited&amp;quot; type requires any kind of identity verification, as opposed to &amp;quot;Full&amp;quot;, which requires full identity verification, as stated by Google.&lt;br /&gt;
&lt;br /&gt;
===Google&#039;s response===&lt;br /&gt;
{{Ph-I-ComR}}&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Ph-I-ConR}}Alongside the announcement, Google provided a Q&amp;amp;A page for existing developers to ask further questions&amp;lt;ref&amp;gt;{{Cite web |date=2025-08-25 |title=Q&amp;amp;A: New Android developer verification requirements |url=https://support.google.com/googleplay/android-developer/thread/361325854 |access-date=2025-08-29 |website=Play Console Help}}&amp;lt;/ref&amp;gt;. There was a range of responses, some with practical questions about the implementation whereas others highlighting key flaws with the plans from both a consumer and developer perspective including:&lt;br /&gt;
&lt;br /&gt;
*The hypocrisy of enforcing security on side loaded apps (i.e. user installed apps not from the playstore) whilst Google&#039;s playstore maintains its levels of scamware, malware and adware.&lt;br /&gt;
*The ambiguity of the announcement leading some to conclude you would have to pay a one time $25 fee to install apps on your own device.&lt;br /&gt;
*Confusion over the requirement to register every package name before it can be installed leading some developers whom beta test multiple versions of the same app to register huge slightly duplicated package names.&lt;br /&gt;
*The confusion over &#039;development version&#039; apps being installed over ADB (a USB android debugging interface) and how they would persist and whether they need full verification.&lt;br /&gt;
*The requirement of app signing thus potentially meaning installing apps requires an internet connection. This essentially bricks the functionality of devices that are intended to be used offline e.g. barcode scanners in supermarkets etc.&lt;br /&gt;
&lt;br /&gt;
There has also been much kickback by the android community with a plethora of videos&amp;lt;ref&amp;gt;{{Cite web |last=Mental Outlaw |date=2025-08-29 |title=Google is Locking Down Android |url=https://www.youtube.com/watch?v=L1S0SiBuJN8 |access-date=2025-08-29 |website=YouTube}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=BrenTech |date=2025-08-26 |title=Google Will Soon Block Apps from Unverified Developers! Is This The End of Sideloading on Android? |url=https://www.youtube.com/watch?v=-nCgnXByGrY |access-date=2025-08-29 |website=YouTube}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=TechLore |date=2025-08-27 |title=Android Is Becoming iOS: The End of Sideloading? |url=https://www.youtube.com/watch?v=PxGjwtiI8uM |access-date=2025-08-29 |website=YouTube}}&amp;lt;/ref&amp;gt; being published online, including Google&#039;s own platform YouTube, about the harms this will cause and the angry user sentiment.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Android]]&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Jailbreak&amp;diff=22758</id>
		<title>Jailbreak</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Jailbreak&amp;diff=22758"/>
		<updated>2025-08-29T08:10:39Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Legality */ Converted section about legality into a table and added information regarding the legal situation in Germany&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}&lt;br /&gt;
&#039;&#039;&#039;Jailbreaking&#039;&#039;&#039; (also known as &#039;&#039;&#039;rooting&#039;&#039;&#039;) is the act of gaining control of the software on a device.&amp;lt;ref&amp;gt;{{Cite web |title=JAILBREAK Definition &amp;amp; Meaning {{!}} Dictionary.com |url=https://www.dictionary.com/browse/jailbreak |url-status=live}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Reasons to jailbreak==&lt;br /&gt;
&lt;br /&gt;
Jailbreaking enables users to install unsigned applications and tweak functionality of the OS.&amp;lt;ref&amp;gt;{{Cite web | title = FAQ {{!}} iOS Guide |url=https://ios.cfw.guide/faq/ |url-status=live}}&amp;lt;/ref&amp;gt; It also allows users to [[Piracy | pirate]] applications on their devices.&lt;br /&gt;
&lt;br /&gt;
==Legality==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!Country&lt;br /&gt;
!Legal?&lt;br /&gt;
!Details and Source&lt;br /&gt;
|-&lt;br /&gt;
|🇩🇪&lt;br /&gt;
|Germany&lt;br /&gt;
|Yes&lt;br /&gt;
|&amp;lt;ref&amp;gt;{{Cite web |last=Aschermann |first=Tim |date=2018-09-07 |title=iPhone/iPad Jailbreak - legal oder illegal? |url=https://praxistipps.chip.de/iphoneipad-jailbreak-legal-oder-illegal_46467 |access-date=2025-08-29 |website=CHIP}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|🇺🇸&lt;br /&gt;
|United States of America&lt;br /&gt;
|Yes&lt;br /&gt;
|Jailbreaking was declared exempt from the[[Digital Millennium Copyright Act | DMCA]] in 2010&amp;lt;ref&amp;gt;{{Cite news |last=Kravets |first=David |date=July 26, 2010 |title=U.S. Declares iPhone Jailbreaking Legal, Over Apple’s Objections |url=https://www.wired.com/2010/07/feds-ok-iphone-jailbreaking/ |url-status=live}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Malicious_compliance&amp;diff=22755</id>
		<title>Malicious compliance</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Malicious_compliance&amp;diff=22755"/>
		<updated>2025-08-29T08:00:04Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: Expanded explanation a bit, added two well-known examples&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}&lt;br /&gt;
Malicious compliance is an action where one complies with a request or demand, but in such a way that it follows the wording, but not the spirit or intent of the mandate.&lt;br /&gt;
&lt;br /&gt;
Applied to consumer rights, this means a manufacturer or brand complies with regulations in word, but not in spirit, thus rendering the regulation ineffective.&lt;br /&gt;
&lt;br /&gt;
Some common practices include making it intentionally difficult for a consumer to exercise their rights through use of [[Dark pattern|dark patterns]], obstacles such requiring communication by letter, imposing fees, requiring registration and many more.&lt;br /&gt;
&lt;br /&gt;
== Prominent Examples ==&lt;br /&gt;
&lt;br /&gt;
* [[Apple]]: After being required by the EU to open up their devices to apps sold outside the [[Apple App Store]], the company created a multitude of hurdles, fees and complications to make it as difficult as possible for developers to actually do this, including a requirement that every independently distributed app stil be approved by Apple and fees be paid by the developer.&amp;lt;ref&amp;gt;{{Cite web |last=Mendes |first=Marcus |date=2025-05-27 |title=EU ruling: Apple’s App Store still in violation of DMA, 30 days to comply |url=https://9to5mac.com/2025/05/27/apple-dma-30-days-deadline/ |access-date=2025-08-29 |website=9to5Mac}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* [[Apple]]: After the EU mandated USB-C as a charging port for all phones, Apple explored various ways to still require cable and accessorty manufacturers to go through their costly [[Made for iPhone]] certification programmes and require consumers to still buy additional cables and accessories.&amp;lt;ref&amp;gt;{{Cite web |last=Roberts |first=Paul |date=2023-09-12 |title=Will Apple Use a Loophole in EU’s USB-C Requirement? |url=https://de.ifixit.com/News/81197/will-apple-use-a-loophole-in-eus-usb-c-requirement |access-date=2025-08-29 |website=iFixit}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Microsoft_Office_365&amp;diff=22646</id>
		<title>Microsoft Office 365</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Microsoft_Office_365&amp;diff=22646"/>
		<updated>2025-08-28T13:28:05Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Incidents */ Added forced autosave to cloud in Word&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Incomplete|Issue 1= All issues in this article need sources (| Issue 2=  }}&lt;br /&gt;
&#039;&#039;&#039;[[wikipedia:Microsoft_365|Microsoft 365]]&#039;&#039;&#039; is a family of software, including Microsoft Word, Microsoft PowerPoint, and Microsoft Excel. The branding &#039;&#039;&#039;Office 365&#039;&#039;&#039; was introduced in 2010 to refer to its subscription-based [[software as a service]], including hosted services such as Office on the web. &lt;br /&gt;
&lt;br /&gt;
==How to avoid Price Increase (At least for Microsoft 365 Personal Subscriptions)==&lt;br /&gt;
[[File:Screenshot 2025-04-05 205541.jpg|thumb|Cancel Microsoft 365 Personal Screenshot, showing the cheaper subscription plan]]&lt;br /&gt;
If you currently have a &amp;quot;Microsoft 365 Personal&amp;quot; subscription, and don&#039;t want to pay the $30 price increase, there is a way to &amp;quot;revert&amp;quot; back to the $69.99 subscription. Sign in to your Microsoft account, and go to your current subscriptions. Click on your &amp;quot;Microsoft 365 Personal&amp;quot; subscription, then click on cancel subscription. It will then give you the option to switch to the &amp;quot;Microsoft 365 Personal Classic&amp;quot; subscription (see image to right for reference), which is Microsoft&#039;s new name for what was the &amp;quot;Microsoft 365 Personal&amp;quot; subscription. There is a [https://www.reddit.com/r/microsoft/comments/1i7jrek/microsoft_365_personal_goes_up_in_price_by_30/ reddit thread] on how to do this, which is linked if you want to read through it as well.&lt;br /&gt;
&lt;br /&gt;
==Consumer Impact Summary==&lt;br /&gt;
{{Placeholder box|Overview of concerns that arise from the conduct towards users of the product (if applicable):&lt;br /&gt;
* User Freedom&lt;br /&gt;
* User Privacy&lt;br /&gt;
* Business Model&lt;br /&gt;
* Market Control}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Microsoft Copilot on by default (Word, PowerPoint, Excel)===&lt;br /&gt;
In the current version of Office 365, Microsoft Copilot is turned on by default. It can be turned off in some of the Office applications&#039; options (Word, Excel, but not PowerPoint, though Microsoft say they&#039;ll add the &amp;quot;off&amp;quot; button to PowerPoint in February 2025).&lt;br /&gt;
&lt;br /&gt;
===Forced upsell===&lt;br /&gt;
In January 2025, YouTuber Atomic Shrimp reported&amp;lt;ref name=&amp;quot;video-explanation&amp;quot;&amp;gt;{{cite web|author=Atomic Shrimp|title=Microsoft’s Sneaky Forced-Upsell to 365 Users; If You Don’t Need/Want Copilot, Don’t Pay for It|url=https://www.youtube.com/watch?v=eYVPThx7yss|website=Youtube|date=25 Jan 2025|access-date=25 Feb 2025|url-status=live|archive-url=https://web.archive.org/web/20250225115451/https://www.youtube.com/watch?v=eYVPThx7yss%2A|archive-date=25 Feb 2025}}&amp;lt;/ref&amp;gt; that Microsoft had enacted a &amp;quot;forced upsell&amp;quot; of 365&#039;s new AI Copilot feature. Users with basic accounts (now called &amp;quot;Classic&amp;quot;), such as Shrimp himself, had been informed their subscription fee was going up, but that they would enjoy new features as a result, including Copilot. In his efforts to disable Copilot, Shrimp subsequently discovered that Microsoft now offered &amp;quot;Classic&amp;quot; plans, identical to the old basic plans both in features and in subscription fee. The option to downgrade to Classic, however, was only visible to enterprise users, not to personal users. In essence Microsoft upgraded users&#039; plans without their consent and disabled the option to downgrade, forcing the user to contact Microsoft support in order to opt out of the newly introduced Copilot AI features. The forceful upgrade was at the user&#039;s expense, and the downgrading process through support, according to Shrimp, was very time consuming. It is possible to downgrade a personal account through the website without contacting support. If you go to the first page of the cancellation process, there should be an option to downgrade to the &amp;quot;Classic&amp;quot; plan.&lt;br /&gt;
&lt;br /&gt;
File request, a common feature in other cloud service providers&#039; &#039;&#039;free&#039;&#039; plans, that allows you to invite users to anonymously upload files to a designated cloud folder (e.g. group vacation photos) is only available in personal plans if every uploader is logged-in to a Microsoft account. If you want anonymous uploads, you have to upgrade to a One Drive for Business-Account. Since this is a common feature in other providers&#039; free private plans (e.g. Dropbox), consumers subconsciously expect it to be a feature in paid personal OneDrive plans of the highest tier, but it&#039;s not offered.&lt;br /&gt;
&lt;br /&gt;
===Obfuscation of local saving in favor of OneDrive (Word, PowerPoint, Excel)===&lt;br /&gt;
Because of OneDrive, since the introduction of Office 365, saving files locally has been getting more and more difficult to do. Previously, the user would get the expected saving dialog with a pop-up to browse their computer and choose a file-storage location. This is now multiple clicks away, making it harder to avoid saving the file on OneDrive, Microsoft&#039;s cloud service. &lt;br /&gt;
&lt;br /&gt;
Files on one&#039;s computer are also automatically uploaded to OneDrive by default, causing numerous issues (such as synchronization errors and duplicate files) Turning off this automatic backup is also of considerable difficulty, as one has to navigate a number of settings to get to this option. &lt;br /&gt;
&lt;br /&gt;
To mitigate this somewhat, user can go into Options &amp;gt; Save &amp;gt; Set the check mark on &amp;quot;save locally as default&amp;quot;. It still takes multiple clicks to save a file, but the cloud options are at least a bit less intrusive.&lt;br /&gt;
&lt;br /&gt;
===Forced Diagnostic Data Transmission===&lt;br /&gt;
Versions other than the Enterprise or Education volume licensing editions do not allow turning telemetry off fully. Moreover, the setting is configured to the least private setting by default.&lt;br /&gt;
&lt;br /&gt;
Office transmits data about 23 000 to 25 000 different types of events&amp;lt;ref&amp;gt;https://www.privacycompany.eu/blog/impact-assessment-shows-privacy-risks-microsoft-office-proplus-enterprise&amp;lt;/ref&amp;gt; (other reports in context of the German BSI audit speak of 30 000 types of events) to Microsoft. Microsoft can adjust the level of detail transmitted remotely. This can go up to every single keystroke being broadcast live to Microsoft servers in the background. &lt;br /&gt;
&lt;br /&gt;
Given that it is not uncommon in some countries even for hospital to run consumer versions of the software, the privacy implications are tremendous. It cannot reasonably be assumed that any data entered into nor any interaction with a Microsoft Office application will stay private.&lt;br /&gt;
&lt;br /&gt;
===Publisher Removal from Microsoft 365 Computers (Oct. 2026)===&lt;br /&gt;
In October 2026, Microsoft will be removing Publisher from computers&amp;lt;ref&amp;gt;{{Cite web |last=Poremsky |first=Diane |date=2025-03-31 |title=Can people keep using Microsoft Publisher unsupported after the end of support date in October 2026 |url=https://learn.microsoft.com/en-us/answers/questions/5389573/can-people-keep-using-microsoft-publisher-unsuppor}}&amp;lt;/ref&amp;gt; with Microsoft 365 as part of their &amp;quot;end of support&amp;quot; of the application. &lt;br /&gt;
&lt;br /&gt;
=== Automatically saving Word Documents to the Cloud (August 2025) ===&lt;br /&gt;
In its company blog, Microsoft announced that Word would from now on create documents and save their autosave information to Microsoft servers by default. This setting can be manually reconfigured to use the local computer.&amp;lt;ref&amp;gt;{{Cite web |last=Munoz |first=Raoul |date=2025-08-26 |title=Save new files automatically to the cloud in Word for Windows |url=https://techcommunity.microsoft.com/blog/microsoft365insiderblog/save-new-files-automatically-to-the-cloud-in-word-for-windows/4445216 |access-date=2025-08-28 |website=Microsoft 365 Insider Blog}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This leads to all information in the document being uploaded to Microsoft servers even before a user has the chance to select local storage when first saving the document. &lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[[Software as a service]]&lt;br /&gt;
*[[Dark pattern]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[[Category:Microsoft Office]]&lt;br /&gt;
[[Category:Subscription-based services]]&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Android_restrict_app_sideloading&amp;diff=22640</id>
		<title>Google Android restrict app sideloading</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Android_restrict_app_sideloading&amp;diff=22640"/>
		<updated>2025-08-28T13:07:43Z</updated>

		<summary type="html">&lt;p&gt;2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E: /* Consumer response */ Grammar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On 25 August 2025, &#039;&#039;&#039;[[Google]]&#039;&#039;&#039; announced that starting in 2026, the company will block the installation of Android apps from outside the Play Store unless the developer has verified their identity with Google. The policy will first roll out in Brazil, Indonesia, Singapore, and Thailand in September 2026 with global enforcement targeted for 2027.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last=Frey |first=Suzanne |date=25 Aug 2025 |title=A new layer of security for certified Android devices |url=https://android-developers.googleblog.com/2025/08/elevating-android-security.html |url-status=live |access-date=25 Aug 2025 |website=Android Developers Blog}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;{{Cite web |last=Perez |first=Sarah |date=25 Aug 2025 |title=Google will require developer verification for Android apps outside the Play Store |url=https://techcrunch.com/2025/08/25/google-will-require-developer-verification-for-android-apps-outside-the-play-store/ |url-status=live |access-date=25 Aug 2025 |website=TechCrunch}}&amp;lt;/ref&amp;gt; This marks a significant change to Android&#039;s long-standing support for sideloading apps and has sparked debate among developers, consumers, and digital rights advocates.&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;{{Cite web |last=Anderson |first=Tim |date=26 Aug 2025 |title=Google kneecaps indie Android devs, forces them to register |url=https://www.theregister.com/2025/08/26/android_developer_verification_sideloading |url-status=live |access-date=26 Aug 2025 |website=The Register}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:3&amp;quot;&amp;gt;{{Cite web |first= |date=26 Aug 2025 |title=Google will block sideloading of unverified Android apps starting next year |url=https://www.bleepingcomputer.com/forums/t/810335/google-will-block-sideloading-of-unverified-android-apps-starting-next-year |url-status=live |access-date=26 Aug 2025 |website=BleepingComputer}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
The open-source Android operating system has historically allowed [[sideloading]], the installation of apps from outside the Google Play Store. Users would need to enable &amp;quot;unknown sources&amp;quot; in their device settings to make this possible. This level of openness distinguished Android OS from Apple&#039;s restrictive iOS that does not allow sideloading. Alternative android app stores, such as F-Droid, Amazon&#039;s Appstore, and web downloads from sites like APKMirror, thrived under this model.&amp;lt;ref&amp;gt;{{Cite web |last=Thomas |first=Dallas |date=14 Sep 2024 |title=The Wild West days of sideloading on Android are officially over in this week&#039;s news |url=https://www.androidpolice.com/weekly-android-news-roundup-september-14-2024/ |url-status=live |access-date=25 Aug 2025 |website=Android Police}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Over time, Google introduced restrictions to the open-source operating system citing security concerns. In 2023, Google began requiring Play Store developers to verify their identities in order to reduce &amp;quot;impersonation and malware.&amp;quot;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; Android versions 13 and 15 further limited what sideloaded apps could do, blocking access to sensitive permissions for apps not installed through Google&#039;s channels.&amp;lt;ref name=&amp;quot;:4&amp;quot;&amp;gt;{{Cite web |last=Rahman |first=Mishaal |date=25 Aug 2025 |title=Google wants to make sideloading Android apps safer by verifying developers&#039; identities |url=https://www.androidauthority.com/android-developer-verification-requirements-3590911/ |url-status=live |access-date=26 Aug 2025 |website=Android Authority}}&amp;lt;/ref&amp;gt; These steps appear to have laid the groundwork for Google&#039;s new, broader enforcement.&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
On 25 August 2025, Google announced that &#039;&#039;&#039;apps can only be installed on certified Android devices if their developers have verified their personal identity with Google&#039;&#039;&#039;.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; Developers must register through a new Android Developer Console, pay a one-time $25 fee (except for hobbyists or students, who will have a separate free path), and provide identifying details such as legal name, address, and government-issued ID.&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt; Apps must also be registered with their signing keys to prove ownership.&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The rollout will proceed in stages:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;October 2025:&#039;&#039;&#039; Early access program for select developers.&lt;br /&gt;
*&#039;&#039;&#039;March 2026:&#039;&#039;&#039; Verification opens for all developers worldwide.&lt;br /&gt;
*&#039;&#039;&#039;September 2026:&#039;&#039;&#039; Enforcement begins in Brazil, Indonesia, Singapore, and Thailand.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;2027:&#039;&#039;&#039; Targeted global rollout, eventually covering nearly all certified Android devices.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The new system applies to certified Android devices which are phones and tablets that ship with Google Mobile Services (e.g., Pixel, Samsung, Xiaomi). Devices running uncertified AOSP builds or custom ROMs (e.g., GrapheneOS, LineageOS) are not subject to this restriction.&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt; However, uncertified devices often face their own sideloading and app compatibility due to SafetyNet/Play Integrity checks.&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Google&#039;s response==&lt;br /&gt;
Google framed this new policy as a necessary security measure to reduce malware, fraud, and impersonation. The company stated that malware is &amp;quot;50× more common outside the Play Store&amp;quot; and that anonymity allows bad actors to evade accountability.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt; Suzanne Frey, VP of Product for Android, likened the change to an ID check at the airport: verifying who the developer is without inspecting app content.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Google emphasized that it will not review or police apps distributed outside the Play Store for content, only verify developer identities.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt; Google&#039;s move gained support from some industry and institutions, including the Developers Alliance, Brazil&#039;s banking federation FEBRABAN, and Indonesia&#039;s Ministry of Communication and Informatics, all of which praised the move as protecting users from fraud.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
The announcement sparked backlash in online communities. On [[Reddit]], users accused Google of gradually eroding Android&#039;s openness.&amp;lt;ref name=&amp;quot;:5&amp;quot;&amp;gt;{{Cite web |date=26 Aug 2025 |title=Google will block sideloading of unverified Android apps starting next year |url=https://www.reddit.com/r/Android/comments/1n0f5zt/google_will_block_sideloading_of_unverified/ |access-date=26 Aug 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt; Many argued that Android is becoming indistinguishable from iOS, with some stating that they may switch to operating systems from Apple or Linux since Android&#039;s openness was its key advantage.&amp;lt;ref name=&amp;quot;:5&amp;quot; /&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Schenck |first=Stephen |date=27 Aug 2025 |title=With developer verification, I&#039;m struggling to think of Android as a proper smartphone platform |url=https://www.androidauthority.com/android-developer-registration-3591988/ |url-status=live |archive-url=https://web.archive.org/web/20250828113543/https://www.androidauthority.com/android-developer-registration-3591988/ |archive-date=28 Aug 2025 |access-date=28 Aug 2025 |website=Android Authority}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Independent developers raised concerns that hobby projects or sensitive apps (e.g., protest tools, ad-blockers) would be stifled since not all creators are willing to submit government IDs to Google.&amp;lt;ref&amp;gt;{{Cite web |date=25 Aug 2025 |title=Google will allow only apps from verified developers to be installed on Android |url=https://news.ycombinator.com/item?id=45017028 |url-status=live |access-date=26 Aug 2025 |website=Hacker News}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:6&amp;quot;&amp;gt;{{Cite web |date=26 Aug 2025 |title=Google wants to verify all app developers&#039; identities |url=https://discuss.grapheneos.org/d/25235-google-wants-to-verify-all-app-developers-identities |url-status=live |access-date=26 Aug 2025 |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt; Open-source communities, including GrapheneOS developers, argued this would discourage FOSS development and give Google exclusive control over Android&#039;s ecosystem.&amp;lt;ref name=&amp;quot;:6&amp;quot; /&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |first=Sarang |date=26 Aug 2025 |title=Finally Over: Google Blocks Sideloading of Android Apps |url=https://www.androidsage.com/2025/08/26/google-blocks-sideloading-of-android-apps/ |url-status=live |archive-url=https://web.archive.org/web/20250827/https://www.androidsage.com/2025/08/26/google-blocks-sideloading-of-android-apps/ |archive-date=27 Aug 2025 |access-date=28 Aug 2025 |website=Android Sage}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Conversely, some security experts and industry groups welcomed the move, calling it a reasonable compromise that still allows third-party distribution while deterring anonymous malware authors.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt; Critics countered that determined attackers could still exploit stolen IDs, and that this introduces a &amp;quot;choke point,&amp;quot; giving Google leverage over all app installs.&amp;lt;ref name=&amp;quot;:3&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Regulators had not formally responded within the first 24 hours, but commentators noted that the change resembles Apple&#039;s Developer ID system on macOS and that it may be Google&#039;s way of tightening control while remaining compliant with the EU&#039;s {{Wplink|Digital Markets Act}}.&amp;lt;ref name=&amp;quot;:4&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:6&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Incidents]]&lt;br /&gt;
[[Category:Android]]&lt;br /&gt;
[[Category:Google]]&lt;/div&gt;</summary>
		<author><name>2A02:810D:548D:E500:5C12:AC0E:83CE:3E2E</name></author>
	</entry>
</feed>