<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JP</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JP"/>
	<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/w/Special:Contributions/JP"/>
	<updated>2026-05-20T09:51:11Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Pixel_6a_Battery_Performance_Program&amp;diff=40945</id>
		<title>Google Pixel 6a Battery Performance Program</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Pixel_6a_Battery_Performance_Program&amp;diff=40945"/>
		<updated>2026-03-04T18:21:06Z</updated>

		<summary type="html">&lt;p&gt;JP: Fixed a typo (you -&amp;gt; your)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}&lt;br /&gt;
{{Incomplete|Issue 1=Implimentation of &amp;quot;Media sources&amp;quot; section to references|Issue 2=Merging from [[Pixel 6a Battery Nerf]]}}&lt;br /&gt;
{{IncidentCargo&lt;br /&gt;
|Company=Google&lt;br /&gt;
|StartDate=2025-07-02&lt;br /&gt;
|EndDate=&lt;br /&gt;
|Status=Active&lt;br /&gt;
|ProductLine=&lt;br /&gt;
|Product=Pixel 6a&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Type=Forced Migration&lt;br /&gt;
|Description=&lt;br /&gt;
}}&lt;br /&gt;
The Google Pixel 6a is an Android smartphone designed, developed and marketed by [[Google]]. It was released on July 28, 2022. Android 16 is expected to be the last version supported with security updates expected to end sometime in 2027.&amp;lt;ref&amp;gt;{{Cite web |title=Pixel 6a end of life date |url=https://endoflife.date/pixel |url-status=live |access-date=2025-07-03 |website=endoflife.date |archive-url=http://web.archive.org/web/20260118201513/https://endoflife.date/pixel |archive-date=18 Jan 2026}}&amp;lt;/ref&amp;gt; On July 2, 2025, Google announced its Pixel 6a Battery Performance Program to users:&lt;br /&gt;
&lt;br /&gt;
[[File:Google pixel 6a email.png|thumb|right|Email sent to users with a Pixel 6a.]]&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;Google has determined that certain Pixel 6a phones (“Impacted Devices”) require a mandatory software update to reduce the risk of potential battery overheating which could pose a risk to users. The update will enable important battery management features that will reduce battery capacity and charging performance on Impacted Devices after the battery reaches 400 charge cycles. &lt;br /&gt;
&lt;br /&gt;
All Pixel 6a devices will receive a mandatory automatic software update to Android 16, with roll out starting July 8 2025, but only Impacted Devices will receive the battery management features. Some users will see changes sooner than others, because the battery management features activate only after an Impacted Device reaches 400 charge cycles.&lt;br /&gt;
&lt;br /&gt;
We want our customers to have the best possible experience with their products, so users of these Impacted Devices are eligible for support options from Google based upon country of purchase, location, and warranty status, subject to our terms and conditions below. Not all Pixel 6a devices are impacted by the reduction in battery capacity and charging performance. If your device is not impacted, your battery management features will remain the same as before, and you will not be eligible for these support options under this program.&amp;quot;&#039;&#039;&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;[https://support.google.com/pixelphone/answer/16340779? https://support.google.com/pixelphone/answer/16340779]&lt;br /&gt;
&lt;br /&gt;
Mirror, via the Wayback Machine: https://web.archive.org/web/20250703210308/https://support.google.com/pixelphone/answer/16340779&lt;br /&gt;
&amp;lt;/ref&amp;gt;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Google pixel needs certain battery replacements for 2025&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Compensation&amp;lt;!-- Written in present tense, as this situation is ongoing as of July 3, 2025. --&amp;gt;==&lt;br /&gt;
&lt;br /&gt;
===Request form sent out to users===&lt;br /&gt;
Google has asked users to provide the IMEI (International Mobile Equipment Identity) number of their Pixel 6a to determine whether their device is an &amp;quot;Impacted Device.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |title=Request a repair, payment, or future discount code |url=https://support.google.com/pixelphone/workflow/16310202 |url-status=live |archive-url=https://web.archive.org/web/20250703211550/https://support.google.com/pixelphone/workflow/16310202 |archive-date=2025-07-03 |access-date=2025-07-03}}&amp;lt;/ref&amp;gt; If the user&#039;s device is an &amp;quot;Impacted Device,&amp;quot; they may choose one of the following:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Free battery replacement&#039;&#039;&#039; (only available in: United States, Canada, United Kingdom, Germany, Singapore, and India)&lt;br /&gt;
*&#039;&#039;&#039;$150 USD&#039;&#039;&#039; (or local equivalent) &#039;&#039;&#039;discount code applicable towards the purchase of another Pixel phone&#039;&#039;&#039; on the Google Store (unavailable in certain countries)&lt;br /&gt;
*&#039;&#039;&#039;$100 USD&#039;&#039;&#039; (or local equivalent)&lt;br /&gt;
&lt;br /&gt;
Compensation&lt;br /&gt;
&lt;br /&gt;
===Payment-processing issues===&lt;br /&gt;
The $100 USD compensation option requires users to process payment through [[wikipedia:Payoneer|Payoneer]], which has many issues:&lt;br /&gt;
&lt;br /&gt;
*Users must provide sensitive personal information including Social Security numbers and bank details&lt;br /&gt;
*A $3 USD processing fee is deducted from the compensation&lt;br /&gt;
*An annual account fee of $29.95 USD is charged if the account balance does not exceed $2,000 USD in transactions within 12 months&amp;lt;nowiki&amp;gt;&amp;lt;ref&amp;gt;&amp;lt;/nowiki&amp;gt;{{Cite web |title=Annual account fee |url=https://payoneer.custhelp.com/app/answers/detail/a_id/43738/~/annual-account-fee |url-status=live |access-date=25 Mar 2025 |website=[[Payoneer]] |archive-url=http://web.archive.org/web/20251129174745/https://payoneer.custhelp.com/app/answers/detail/a_id/43738/~/annual-account-fee |archive-date=29 Nov 2025}}&amp;lt;nowiki&amp;gt;&amp;lt;/ref&amp;gt;&amp;lt;/nowiki&amp;gt; https://support.google.com/pixelphone/workflow/16310202&lt;br /&gt;
*Users report being advised to immediately delete their Payoneer account after receiving compensation to avoid fees&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;{{Cite web |title=I have replaced battery in a local shop not supported by Google |url=https://www.reddit.com/r/Pixel4a/comments/1i1e4ds/i_have_replaced_battery_in_a_local_shop_not/ |url-status=live |access-date=25 Mar 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Store-credit limitations===&lt;br /&gt;
[[File:6a-compensation-screenshot-Determine if your device qualifies for the Pixel 6a Battery Performance Program.png|alt=Screenshot of Google&#039;s Compensation Options for the Pixel 6a Battery Performance Program|thumb|Screenshot of Google&#039;s Compensation Options for the Pixel 6a Battery Performance Program]]&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
===Reimbursement===&lt;br /&gt;
There is an option if you have had your 6a battery replaced at an authorized service center prior to the program announcement.&lt;br /&gt;
[[File:6a-battery-previously-replaced-screenshot-Determine if your device qualifies for the Pixel 6a Battery Performance ProgramScreenshot 2025-07-03 at 15-49-06 Determine if your device qualifies for the Pixel 6a Battery Performance Program.png|alt=Have you recently had your battery repaired at an authorized repair partner|thumb|Have you recently had your battery repaired at an authorized repair partner]]&lt;br /&gt;
&lt;br /&gt;
==Aftermath of software update==&lt;br /&gt;
After the update, users experience a battery cap of 80%, a message in the settings app&#039;s batttery section, Placeholder&lt;br /&gt;
&lt;br /&gt;
===Battery-performance issues===&lt;br /&gt;
Users have reported several issues following the update: Including inability to charge&amp;lt;ref&amp;gt;{{Cite web |date=19 Jul 2025 |title=My pixel 6a doesn&#039;t charge - at all - after update |url=https://old.reddit.com/r/pixel_phones/comments/1m42zn3/my_pixel_6a_doesnt_charge_at_all_after_update/ |url-status=live |archive-url=https://web.archive.org/web/20250721024418/https://old.reddit.com/r/pixel_phones/comments/1m42zn3/my_pixel_6a_doesnt_charge_at_all_after_update/ |archive-date=21 Jul 2025 |access-date=21 Jul 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=18 Jul 2025 |title=Will it charge? |url=https://old.reddit.com/r/Pixel6/comments/1m2xtlt/will_it_charge/ |url-status=live |archive-url=https://web.archive.org/web/20250721024834/https://old.reddit.com/r/Pixel6/comments/1m2xtlt/will_it_charge/ |archive-date=21 Jul 2025 |access-date=21 Jul 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
===Safety issue===&lt;br /&gt;
A Pixel 6a caught fire after the update, indicating the Battery Performance Program isn&#039;t enough to prevent overheating&amp;lt;ref&amp;gt;{{Cite web |last=Whitwam |first=Ryan |date=29 Jul 2025 |title=Another Google Pixel 6a catches fire after battery-nerfing update |url=https://arstechnica.com/gadgets/2025/07/another-google-pixel-6a-catches-fire-after-battery-nerfing-update/ |url-status=live |archive-url=https://web.archive.org/web/20250729114215/https://arstechnica.com/gadgets/2025/07/another-google-pixel-6a-catches-fire-after-battery-nerfing-update/ |archive-date=29 Jul 2025 |website=Arstechnica}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Battery-replacement complications===&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
===Technical evidence of battery changes===&lt;br /&gt;
The battery voltage has been dropped to below 4.0V after the update, the actual capacity has been reduced to below 60%&amp;lt;ref&amp;gt;{{Cite web |date=10 Jul 2025 |title=Thank you Google for Fast Charging Update /s |url=https://old.reddit.com/r/Pixel6aUsers/comments/1lwf3p5/thank_you_google_for_fast_charging_update_s/ |url-status=live |archive-url=https://web.archive.org/web/20250721025129/https://old.reddit.com/r/Pixel6aUsers/comments/1lwf3p5/thank_you_google_for_fast_charging_update_s/|archive-date=2025-07-21 |access-date=2025-07-20 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Possible technical rationale==&lt;br /&gt;
While Google has not provided detailed technical explanations for the update, there are several known factors about lithium-ion battery aging that could potentially justify such measures:&lt;br /&gt;
&lt;br /&gt;
===Aging lithium-ion batteries===&lt;br /&gt;
Lithium-ion batteries face degradation as they age:&lt;br /&gt;
*Loss of active lithium ions through repeated charge cycles&lt;br /&gt;
*Growth of the Solid Electrolyte Interphase (SEI) layer&lt;br /&gt;
*Physical expansion &amp;amp; contraction stress during charging cycles&lt;br /&gt;
*Potential for dendrite formation in aged cells&lt;br /&gt;
*Increased internal resistance over time&amp;lt;ref&amp;gt;{{Cite web |last=Chu |first=Tien-Fu |last2=Rajendran |first2=Raja |last3=Kuznetsova |first3=Iren |last4=Wang |first4=Gou-Jen |date=31 Mar 2020 |title=High-power, non-enzymatic glucose biofuel cell based on a nano/micro hybrid-structured Au anode |url=https://www.sciencedirect.com/science/article/abs/pii/S0378775320301476 |url-status=live |access-date=22 Mar 2025 |website=ScienceDirect}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Safety considerations===&lt;br /&gt;
Several factors specific to the Pixel 6a situation could indicate that this was a battery safety concern:&lt;br /&gt;
*The device was released in July 2022; many units are approaching 3 years of use&lt;br /&gt;
*The mandatory nature of the update suggests safety implications rather than performance optimization&lt;br /&gt;
*There have been reports of the device spontaneously catching on fire&lt;br /&gt;
===Precedent in mobile phones===&lt;br /&gt;
Similar battery-related interventions have occurred previously; Google&#039;s own Pixel 4a in January of 2025 and Apple&#039;s 2017 iPhone throttling was done to prevent unexpected shutdowns in devices with degraded batteries.&lt;br /&gt;
&lt;br /&gt;
===Potential manufacturing variables===&lt;br /&gt;
Several factors could explain why only certain devices are affected:&lt;br /&gt;
*Different battery suppliers or manufacturing batches&lt;br /&gt;
*Variations in battery cell chemistry or construction&lt;br /&gt;
*Manufacturing date ranges coinciding with specific material supplies&lt;br /&gt;
*Quality control variations between production runs&lt;br /&gt;
&lt;br /&gt;
==Media Articles==&lt;br /&gt;
https://9to5google.com/2025/07/02/pixel-6a-battery-update-details/&lt;br /&gt;
&lt;br /&gt;
https://www.androidauthority.com/pixel-6a-battery-limit-3573411/&lt;br /&gt;
&lt;br /&gt;
https://www.theverge.com/news/697103/google-android16-update-pixel-6a-battery-overheating-fix-july-8&lt;br /&gt;
&lt;br /&gt;
https://9to5google.com/2025/07/02/google-removes-pixel-6a-factory-images/&lt;br /&gt;
&lt;br /&gt;
https://www.techradar.com/phones/google-pixel-phones/the-pixel-6a-will-get-a-mandatory-update-that-will-reduce-battery-capacity-soon-and-other-pixel-phones-could-be-next&lt;br /&gt;
&lt;br /&gt;
==Criticism by community==&lt;br /&gt;
&lt;br /&gt;
#This update is an automatic update &#039;&#039;&#039;users can not opt&#039;&#039;&#039; &#039;&#039;&#039;out&#039;&#039;&#039; of.&lt;br /&gt;
#Despite claim, this update &#039;&#039;&#039;does not prevent&#039;&#039;&#039; the phone from overheating or catching fire, as shown by this user whose Pixel 6a that got the July update, caught fire while charging overnight&amp;lt;ref&amp;gt;{{Cite web |last=Whitwam |first=Ryan |date=29 Jul 2025 |title=Another Google Pixel 6a catches fire after battery-nerfing update |url=https://arstechnica.com/gadgets/2025/07/another-google-pixel-6a-catches-fire-after-battery-nerfing-update/?comments-page=1#comments |url-status=live |archive-url=https://web.archive.org/web/20250728172217/https://arstechnica.com/gadgets/2025/07/another-google-pixel-6a-catches-fire-after-battery-nerfing-update/ |archive-date=2025-07-28 |access-date=4 Aug 2025 |website=Ars Technica}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=27 Jul 2025 |title=I&#039;m the 3rd one posting this for this month. Pixel 6a caught on fire right next to me on the nightstand. |url=https://old.reddit.com/r/GooglePixel/comments/1ma6hpa/im_the_3rd_one_posting_this_for_this_month_pixel/ |url-status=live |archive-url=https://web.archive.org/web/20250728055102/https://old.reddit.com/r/GooglePixel/comments/1ma6hpa/im_the_3rd_one_posting_this_for_this_month_pixel/ |archive-date=2025-07-28 |access-date=28 Jul 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Restoring battery functionality==&lt;br /&gt;
&lt;br /&gt;
===Replacing the battery===&lt;br /&gt;
Placeholder&lt;br /&gt;
&lt;br /&gt;
Google has removed all official images for the pixel 6a released prior to the date of this program&#039;s inception.&lt;br /&gt;
&lt;br /&gt;
===Rolling-back Android===&lt;br /&gt;
By editing android-info.txt file, Users are able to bypass the anti-rollback bootloader update and successfully downgrade Android 14 from Android 16&amp;lt;ref&amp;gt;{{Cite web |date=19 Jul 2025 |title=Hey guys! I just rollback to android14 success! |url=https://xdaforums.com/t/hey-guys-i-just-rollback-to-android14-success.4750539/ |url-status=live |archive-url=https://web.archive.org/web/20250721022623/https://xdaforums.com/t/hey-guys-i-just-rollback-to-android14-success.4750539/ |archive-date=21 Jul 2025 |access-date=21 Jul 2025 |website=XDA Developers}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Incidents]]&lt;br /&gt;
[[Category:Google Pixel 6a]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=27216</id>
		<title>Google Play Integrity API</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=27216"/>
		<updated>2025-10-17T03:55:13Z</updated>

		<summary type="html">&lt;p&gt;JP: Changed GrapheneOS link to Wikipedia article&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Play Integrity API is an API provided by [[Google]] for the [[Android]] Operating System that allows applications to verify the genuineness of the app&#039;s binary and Android version.&amp;lt;ref&amp;gt;{{Cite web |title=Overview of the Play Integrity API |url=https://developer.android.com/google/play/integrity/overview |archive-url=https://web.archive.org/web/20250607124755/https://developer.android.com/google/play/integrity/overview |archive-date=2025-06-07 |access-date=2025-06-10 |website=Android Developers}}&amp;lt;/ref&amp;gt; It is the successor of the now deprecated SafetyNet Attestation API.&amp;lt;ref&amp;gt;{{Cite web |title=About the SafetyNet Attestation API deprecation |url=https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline |website=Android Developers}}&amp;lt;/ref&amp;gt; The API offers 4 device integrity labels, which are detailed in the table below.&amp;lt;ref&amp;gt;{{Cite web |title=Integrity verdicts |url=https://developer.android.com/google/play/integrity/verdicts#device-integrity-field |website=Android Developers}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Integrity Level&lt;br /&gt;
!Bootloader Can Be Unlocked&lt;br /&gt;
!Customized OSes Allowed&lt;br /&gt;
!Description&lt;br /&gt;
!Requirement(s)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_BASIC_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|The app is running on a device that passes basic system integrity checks. The device may not be Play Protect certified.&lt;br /&gt;
|Attestation root of trust provided by Google&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_VIRTUAL_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
|The app is running on an Android-powered emulator with Google Play services.&lt;br /&gt;
|The emulator passes system integrity checks and meets core Android compatibility requirements.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device.&lt;br /&gt;
|Hardware-backed proof that the device bootloader is locked and the loaded Android OS is a certified device manufacturer image.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device with a recent security update.&lt;br /&gt;
|Android 13+: &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; and security updates in the last year for all partitions of the device, including an Android OS partition patch and a vendor partition patch.&lt;br /&gt;
Android 12 and lower: Only hardware-backed proof of boot integrity&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Since the Play Integrity API relies on Google to certify devices, any apps requiring &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt; are only allowed on operating systems that Google allows. This allows Google to exert [[Monopoly|monopolistic]] power by not certifying competitors&#039; operating systems, since many apps choose to use the Play Integrity API instead of the Key Attestation API that is built into Android.&amp;lt;ref&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Verify hardware-backed key pairs with key attestation |url=https://developer.android.com/privacy-and-security/security-key-attestation |website=Android Developers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notable examples of apps requiring Google-certified operating systems:&lt;br /&gt;
&lt;br /&gt;
*Google Wallet&lt;br /&gt;
*VPN by Google&lt;br /&gt;
*Netflix&lt;br /&gt;
*McDonald&#039;s&lt;br /&gt;
*Uber Driver&lt;br /&gt;
*Twitter/X&lt;br /&gt;
*Twilio Authy Authenticator&lt;br /&gt;
*ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This has led to users being unable to use apps on privacy-focused forks of Android, like [[wikipedia:GrapheneOS|GrapheneOS]].&amp;lt;ref&amp;gt;{{Cite web |title=Wallet - Google Pay |url=https://discuss.grapheneos.org/d/475/ |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
[https://mayrhofer.eu.org/courses/android-security/selected-paper/2024/Comparing_key_attestation_and_Play_Integrity_API.pdf Android System Integrity: Comparing Key Attestation and the Play Integrity API]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Android]]&lt;br /&gt;
[[Category:Google Play Store]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=StarForce_Technologies&amp;diff=20300</id>
		<title>StarForce Technologies</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=StarForce_Technologies&amp;diff=20300"/>
		<updated>2025-08-17T03:07:30Z</updated>

		<summary type="html">&lt;p&gt;JP: Added stub notice&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}{{CompanyCargo&lt;br /&gt;
|Founded=2000-09&lt;br /&gt;
|Industry=Software&lt;br /&gt;
|Logo=Starforce logo.png&lt;br /&gt;
|Type=Private&lt;br /&gt;
|Website=https://www.star-force.com/,https://www.star-force.ru/&lt;br /&gt;
|Description=StarForce Technologies develops copy protection and digital rights management (DRM) software for games and applications.&lt;br /&gt;
}}&lt;br /&gt;
{{Ph-C-Int}}&lt;br /&gt;
&lt;br /&gt;
==Consumer-impact summary==&lt;br /&gt;
{{Ph-C-CIS}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
{{Ph-C-Inc}}&lt;br /&gt;
&lt;br /&gt;
This is a list of all consumer-protection incidents this company is involved in. Any incidents not mentioned here can be found in the [[:Category:{{FULLPAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
===Example incident one (&#039;&#039;date&#039;&#039;)===&lt;br /&gt;
{{Main|link to the main article}}&lt;br /&gt;
Short summary of the incident (could be the same as the summary preceding the article).&lt;br /&gt;
===Example incident two (&#039;&#039;date&#039;&#039;)===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==Products==&lt;br /&gt;
{{Ph-C-P}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
{{Ph-C-SA}}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Forced_User_Agreement_on_Jetbrains_IntelliJ_software&amp;diff=17942</id>
		<title>Forced User Agreement on Jetbrains IntelliJ software</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Forced_User_Agreement_on_Jetbrains_IntelliJ_software&amp;diff=17942"/>
		<updated>2025-08-01T13:46:58Z</updated>

		<summary type="html">&lt;p&gt;JP: Add another potential workaround&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}&lt;br /&gt;
&lt;br /&gt;
{{ProductLineCargo&lt;br /&gt;
|Company=Jetbrains&lt;br /&gt;
|ReleaseYear=2024&lt;br /&gt;
|InProduction=Yes&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Category=Software&lt;br /&gt;
|Website=https://www.jetbrains.com/&lt;br /&gt;
|Description=Jetbrains Developer Tools is a set of IDEs designed for major programming languages.&lt;br /&gt;
}}Forced User Agreement on Jetbrains IntelliJ software is an attempt to alter past fallback licenses. In 2025 company is trying to enforce new terms on software bought in 2024 or prior.&amp;lt;blockquote&amp;gt;&#039;&#039;&#039;What is the perpetual fallback license?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The perpetual fallback license is a part of JetBrains&#039; subscription system. It allows you to use a particular software version indefinitely, even if your active subscription ends. However, to upgrade to a newer version, you’ll need to buy or renew your subscription.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer protection incidents related to this product line. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|Users who bought Jetbrains software prior to 2025 and decided to discontinue subscription are getting popups with &amp;quot;Jetbrains User Agreement 2.0&amp;quot;. You can only accept of exit the software. The workaround it to remove `~/.local/share/JetBrains` which gives few days of rest. A more permanent workaround may be to make the directory inaccessible to the Jetbrains processes (e.g. using chmod and chown). }}&lt;br /&gt;
[[File:Screenshot at 2025-07-24 11-25-46.png|thumb|In year 2025 WebStorm 2024.1.7 is connecting to Jetbrains servers and showing new terms. Jetbrains does not allow you to say no and stay under old terms.]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Slashdot_websites_require_TOS_acceptance_without_consent&amp;diff=16240</id>
		<title>Slashdot websites require TOS acceptance without consent</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Slashdot_websites_require_TOS_acceptance_without_consent&amp;diff=16240"/>
		<updated>2025-07-01T21:18:17Z</updated>

		<summary type="html">&lt;p&gt;JP: Add stub notice&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
Sourceforge.net, a common place for developers to share their code, forces their users to unconditionally accept new terms and conditions without any other alternative. The only button to press is &amp;quot;I agree&amp;quot;.{{Citation needed}} There is no way to refuse the new terms and conditions. There is also no way for a user to delete their account without accepting the new conditions.{{Citation needed}} A link to those terms and conditions is available and shows content that amounts to an equivalent of 54 pages in format A4.&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
==Incident==&lt;br /&gt;
Denying users to disagree or refuse terms and conditions may be illegal in Europe, according to GDPR. The company has been contacted. The incident will be updated accordingly once their response has been received.&lt;br /&gt;
&lt;br /&gt;
===Company&#039;s response===&lt;br /&gt;
&lt;br /&gt;
SourceForge.net&#039;s has yet to respond to inquires.&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Slashdot_websites_require_TOS_acceptance_without_consent&amp;diff=16237</id>
		<title>Slashdot websites require TOS acceptance without consent</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Slashdot_websites_require_TOS_acceptance_without_consent&amp;diff=16237"/>
		<updated>2025-07-01T21:13:09Z</updated>

		<summary type="html">&lt;p&gt;JP: Clean up formatting, add cit. needed notices.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sourceforge.net, a common place for developers to share their code, forces their users to unconditionally accept new terms and conditions without any other alternative. The only button to press is &amp;quot;I agree&amp;quot;.{{Citation needed}} There is no way to refuse the new terms and conditions. There is also no way for a user to delete their account without accepting the new conditions.{{Citation needed}} A link to those terms and conditions is available and shows content that amounts to an equivalent of 54 pages in format A4.&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
==Incident==&lt;br /&gt;
Denying users to disagree or refuse terms and conditions may be illegal in Europe, according to GDPR. The company has been contacted. The incident will be updated accordingly once their response has been received.&lt;br /&gt;
&lt;br /&gt;
===Company&#039;s response===&lt;br /&gt;
&lt;br /&gt;
SourceForge.net&#039;s has yet to respond to inquires.&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Life360&amp;diff=15936</id>
		<title>Life360</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Life360&amp;diff=15936"/>
		<updated>2025-06-25T00:05:23Z</updated>

		<summary type="html">&lt;p&gt;JP: Added &amp;quot;Citation needed&amp;quot; notes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxCompany&lt;br /&gt;
| Name = {{PAGENAME}}&lt;br /&gt;
| Type =Private&lt;br /&gt;
| Founded =April 17, 2007&lt;br /&gt;
| Industry =Social Networking&lt;br /&gt;
| Official Website =https://www.life360.com/&lt;br /&gt;
| Logo =Life360 Horizontal.png&lt;br /&gt;
}}&#039;&#039;&#039;Life360 is a&#039;&#039;&#039; location-based social networking application developed by Life360, Inc., a San Mateo, California–based technology company. Designed primarily for families, the app enables users to share real-time locations, communicate through group messaging, receive alerts about members’ movements, and access emergency services. Since its launch in 2008, Life360 has evolved into a comprehensive safety and coordination platform with millions of active users worldwide.{{Citation needed}} Its emphasis on private circles and family-focused features distinguishes it from other location-sharing tools, making it a widely used app for digital family life management.&lt;br /&gt;
==Consumer-impact summary==&lt;br /&gt;
&#039;&#039;&#039;User Freedom&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Life360 has been criticized for enabling overbearing surveillance, particularly of teenagers and young adults.{{Citation needed}} Critics argue that the app can be misused by parents or guardians to exercise excessive control, limiting users’ autonomy and contributing to anxiety or strained relationships.{{Citation needed}} While the company has attempted to address this with features like &#039;&#039;Bubbles&#039;&#039;, which allow for temporary location obfuscation, some view these efforts as insufficient or superficial.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Serious privacy concerns have emerged around Life360’s handling of location data. Investigations revealed that the company previously sold precise user location data to third-party data brokers, raising ethical and legal questions about consent and transparency.{{Citation needed}} Though Life360 claimed the data was anonymized and later announced it would cease this practice, skepticism remains about the extent to which user information is protected.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Business Model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Life360 operates on a freemium model, offering basic services for free while monetizing premium features and until recently, user data. Critics argue this incentivized data exploitation, as revenue generation relied not only on subscriptions but also on selling behavioral and location-based data. The tension between maximizing profit and protecting user rights has led to public backlash and regulatory scrutiny.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Market Control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Through its 2021 acquisition of Tile, a major competitor in the tracking device space, Life360 expanded its presence in the location services market.{{Citation needed}} This consolidation raised concerns about reduced competition and increased centralization of user data. With fewer independent alternatives available, users may find it difficult to opt out of the ecosystem without losing access to widely used tracking features, effectively tightening Life360’s control over the market.&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Sale of Data to Arity and Allstate (2016)===&lt;br /&gt;
{{Main|Allstate and Arity&#039;s alleged unauthorized driver data collection through mobile apps}}&lt;br /&gt;
Life360 collected and sold data to Arity, a subsidiary of Allstate, which allegedly broke the Texas Data Privacy and Security Act in its later use to increase car insurance premiums&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
*[[Data brokers]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Software_locks&amp;diff=15713</id>
		<title>Software locks</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Software_locks&amp;diff=15713"/>
		<updated>2025-06-21T17:10:18Z</updated>

		<summary type="html">&lt;p&gt;JP: Improve summary&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
Software locks are security measures used to control access and features in consumer electronic hardware and software. &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Lock_(computer_science)&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software&amp;lt;/ref&amp;gt; Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused.      &lt;br /&gt;
&lt;br /&gt;
==Noteworthy bad practice examples==&lt;br /&gt;
&lt;br /&gt;
===Anti Interoperability===&lt;br /&gt;
 Also see: [[wikipedia:Proprietary_protoco|Proprietary protocols]], [[Anti Interoperability]], [[Hardware Anti Interoperability]]&amp;lt;ref&amp;gt;[https://en.wikipedia.org/wiki/Proprietary_hardware? https://en.wikipedia.org/wiki/Proprietary_hardware?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
wip  stub example you can&#039;t use our competitors Bluetooth headset with our XYZ operating system because we invented a our own new proprietary XYZ Bluetooth audio codec and that product doesn&#039;t support it. &lt;br /&gt;
&lt;br /&gt;
real example apple mfi certifications on charging and data transfer accessories  &lt;br /&gt;
&lt;br /&gt;
apple&#039;s history of anti-Interoperability&lt;br /&gt;
&lt;br /&gt;
===Account-required products===&lt;br /&gt;
&lt;br /&gt;
=====Mobile phones=====&lt;br /&gt;
[https://pirg.org/articles/refurbishers-repairers-and-recyclers-call-on-the-fcc-to-stop-phone-software-locks/ ref] Small preamble focused on how mobile phones require an account in order to be used, reference Google Pixels and specific Android devices requiring a Google account, and iPhones needing an Apple account.&lt;br /&gt;
&lt;br /&gt;
=====in appliances=====&lt;br /&gt;
hvac app activation of furnace control boards (also an example of [[Forced app download]]  (editors note hard to find credible ref this is a thing with ruud furnace control boards) ) &lt;br /&gt;
&lt;br /&gt;
====Binding hardware features to non-transferable user accounts / activation &amp;amp; licensing locks&amp;lt;!-- This needs a much shorter name --&amp;gt;====&lt;br /&gt;
-wip&lt;br /&gt;
&lt;br /&gt;
===Server connectivity reliance===&lt;br /&gt;
 Also see: [[Subscription service]], [[Digital rights management]]&lt;br /&gt;
-wip&lt;br /&gt;
&lt;br /&gt;
==Further reading / also see==&lt;br /&gt;
[[Digital rights management|DRM (digital right managment)]]&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Comparison_of_open-source_and_closed-source_software|Proprietary Software]]&lt;br /&gt;
&lt;br /&gt;
[[Walled garden]] / [[Software Ecosystem]]&lt;br /&gt;
&lt;br /&gt;
[[Bootloader unlocking]]&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Proprietary_firmware|Proprietary firmware]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Template_talk:StubNotice&amp;diff=15712</id>
		<title>Template talk:StubNotice</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Template_talk:StubNotice&amp;diff=15712"/>
		<updated>2025-06-21T17:07:03Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Duplicate title text, simplify text */ Reply&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Duplicate title text, simplify text==&lt;br /&gt;
&lt;br /&gt;
Two issues:&lt;br /&gt;
&lt;br /&gt;
#The notice has 2 titles: &amp;quot;Article Status Notice: This Article is a stub&amp;quot; and &amp;quot;Notice: This Article Requires Additional Expansion&amp;quot;. Can we look at having just a single title? Maybe just &amp;quot;This Article is a stub&amp;quot;&lt;br /&gt;
#The text of the notice is really long and obsures the article content. It would be really useful if the notice was similar to Wikipedia&#039;s by including a single sentence linking to the guidelines.&lt;br /&gt;
&lt;br /&gt;
(Pinging @[[User:Keith|Keith]] so this gets some attention, sorry) [[User:JP|JP]] ([[User talk:JP|talk]]) 17:02, 21 June 2025 (UTC)&lt;br /&gt;
&lt;br /&gt;
:This could also be added under a details item (&amp;quot;Show more&amp;quot;), just like the incomplete article notice. [[User:JP|JP]] ([[User talk:JP|talk]]) 17:07, 21 June 2025 (UTC)&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Template_talk:StubNotice&amp;diff=15710</id>
		<title>Template talk:StubNotice</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Template_talk:StubNotice&amp;diff=15710"/>
		<updated>2025-06-21T17:02:14Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Duplicate title text, simplify text */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Duplicate title text, simplify text ==&lt;br /&gt;
&lt;br /&gt;
Two issues:&lt;br /&gt;
&lt;br /&gt;
# The notice has 2 titles: &amp;quot;Article Status Notice: This Article is a stub&amp;quot; and &amp;quot;Notice: This Article Requires Additional Expansion&amp;quot;. Can we look at having just a single title? Maybe just &amp;quot;This Article is a stub&amp;quot;&lt;br /&gt;
# The text of the notice is really long and obsures the article content. It would be really useful if the notice was similar to Wikipedia&#039;s by including a single sentence linking to the guidelines.&lt;br /&gt;
&lt;br /&gt;
(Pinging @[[User:Keith|Keith]] so this gets some attention, sorry) [[User:JP|JP]] ([[User talk:JP|talk]]) 17:02, 21 June 2025 (UTC)&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Kernel_level_driver&amp;diff=15709</id>
		<title>Kernel level driver</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Kernel_level_driver&amp;diff=15709"/>
		<updated>2025-06-21T16:49:34Z</updated>

		<summary type="html">&lt;p&gt;JP: Reword and format the article to flow better. Also corrected some terminology.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
Kernel drivers, kernel modules, or drivers are modules of code that run inside the kernel of an operating system. Kernel drivers allow the computer to communicate with hardware devices such as keyboards, mice, storage, and network cards. Kernel access is required since these drivers usually manage hardware directly, which isn&#039;t possible in user space. This code is unresricted since it runs inside of the kernel, meaning drivers have the highest privledge level— higher than even the traditional administrator role. If kernel code fails, the entire system crashes. In comparision, user processes can gracefully exit without affecting other processes. Also, if a kernel driver has any vulnerabilities, these can be exploited by bad actors to gain kernel access and bypass any security measures the user has in place.&lt;br /&gt;
&lt;br /&gt;
== Consumer Impact ==&lt;br /&gt;
Code running in the kernel presents numerous privacy and security concerns. Code running in the kernel can read the memory of any running process, including apps and websites used for banking, passwords, and other highly sensitive actions. Additionally, it has full control over all hardware, including the capability to permantely damage or disable hardware components.&lt;br /&gt;
&lt;br /&gt;
Many companies now require the use of proprietary drivers in order to use applications that would work fine in user space, like [[Kernel Level Anti-Cheats]]. This gives these companies unrestricted access to a consumer&#039;s system, allowing for unmoderated data collection and control.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
* [[wikipedia:CrowdStrike|CrowdStrike]]&lt;br /&gt;
* [[wikipedia:Cheating_in_online_games#Anti-cheating_methods_and_limitations|Anti-cheats]], like Easy Anti Cheat and EA Anti Cheat&lt;br /&gt;
&lt;br /&gt;
== Incidents ==&lt;br /&gt;
&lt;br /&gt;
* [[wikipedia:2024_CrowdStrike-related_IT_outages|2024 CrowdStrike-related IT outages]]&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Kernel Level Anti-Cheats]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Talk:Unjust_and_extraterritorial_law:_DMCA&amp;diff=15707</id>
		<title>Talk:Unjust and extraterritorial law: DMCA</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Talk:Unjust_and_extraterritorial_law:_DMCA&amp;diff=15707"/>
		<updated>2025-06-21T16:21:46Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Merge with existing article */ Reply&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Merge with existing article==&lt;br /&gt;
&lt;br /&gt;
The [[Digital Millennium Copyright Act]] article already exists. I think we should merge this one into it. [[User:JP|JP]] ([[User talk:JP|talk]]) 19:44, 10 June 2025 (UTC)&lt;br /&gt;
&lt;br /&gt;
:I agree. — [[User:Sojourna|Sojourna]] ([[User talk:Sojourna|talk]]) 00:12, 15 June 2025 (UTC)&lt;br /&gt;
:Perhaps it would be better to remove this article? The tone doesn&#039;t really fit with the wiki, and I&#039;m getting some LLM vibes from the content. @[[User:Keith|Keith]] do we have a process for deletion? Maybe @[[User:HouseStationLive.com|HouseStationLive.com]] (the author of the article) can talk about how the article was drafted and what they think about the proposal. [[User:JP|JP]] ([[User talk:JP|talk]]) 16:21, 21 June 2025 (UTC)&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Mazda&amp;diff=15706</id>
		<title>Mazda</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Mazda&amp;diff=15706"/>
		<updated>2025-06-21T16:16:03Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Incidents */ Add existing incidents to the incidents section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxCompany&lt;br /&gt;
| Name = {{PAGENAME}}&lt;br /&gt;
| Type =Public&lt;br /&gt;
| Founded =1920&lt;br /&gt;
| Industry =Automotive&lt;br /&gt;
| Official Website =https://www.mazda.com/&lt;br /&gt;
| Logo =QuestionMark.svg&lt;br /&gt;
}}&#039;&#039;&#039;Mazda Motor Corporation&#039;&#039;&#039; (マツダ株式会社, &#039;&#039;Matsuda Kabushiki gaisha&#039;&#039;) is a Japanese multinational automotive manufacturer headquartered in Fuchū, Hiroshima, Japan.&lt;br /&gt;
&lt;br /&gt;
==Consumer-impact summary==&lt;br /&gt;
{{Placeholder box|Overview of concerns that arise from the company&#039;s conduct regarding (if applicable):&lt;br /&gt;
* User freedom&lt;br /&gt;
* User privacy&lt;br /&gt;
* Business model&lt;br /&gt;
* Market control}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer-protection incidents this company is involved in. Any incidents not mentioned here can be found in the [[:Category:{{FULLPAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
=== Mazda DMCA takedown of Home Assistant Integration (October 2023) ===&lt;br /&gt;
{{Main|Mazda DMCA takedown of Open Source Home Assistant App}}&lt;br /&gt;
On October 10th 2023 Mazda issued a DMCA takedown notice to github claiming the Home Assistant integration that adds connectivity with Mazda vehicles infringes on their intellectual properly rights by stealing code from their official app and wanted it, along with forks of the project, removed from the website. The developer did not want to challenge the claims and took down the repository within a few days to avoid potential legal repercussions. With the repository and all its forks gone, the integration was also removed from the Home Assistant app.&lt;br /&gt;
&lt;br /&gt;
=== Mazda remote-start subscription (2019) ===&lt;br /&gt;
{{Main|Mazda remote-start subscription}}In 2019, Mazda introduced Mazda Connected Services, a feature enabling remote start and other functionalities through the MyMazda smartphone app. Customers, however, were only offered a three-year complimentary trial, after which continued access required a $10 monthly subscription. As these trials began expiring in 2023, affected users received notifications encouraging subscription enrollment.&lt;br /&gt;
&lt;br /&gt;
==Products==&lt;br /&gt;
Mazda produces numerous veichles. Specific models include:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;None yet&#039;&#039;&amp;lt;!-- When specific models are added to the wiki, they should be listed and linked here. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
*[[Allstate and Arity&#039;s alleged unauthorized driver data collection through mobile apps]]&lt;br /&gt;
*[[Texas Sues Allstate Over Illegally Collecting Driver Data; you might want to uninstall gasbuddy....]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=TeamViewer&amp;diff=15699</id>
		<title>TeamViewer</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=TeamViewer&amp;diff=15699"/>
		<updated>2025-06-21T13:56:27Z</updated>

		<summary type="html">&lt;p&gt;JP: Added stub notice&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{stub}}&lt;br /&gt;
&lt;br /&gt;
TeamViewer has previously sold a &amp;quot;perpetual&amp;quot; license for versions 8-12, but after switching to a subscription-based Software As A Service model, they have pestered &amp;quot;perpetual&amp;quot; license owners to &amp;quot;upgrade&amp;quot; to a subscription license for their newer versions.&lt;br /&gt;
&lt;br /&gt;
Recently, they have announced support will be fully shut down for these versions: [https://community.teamviewer.com/English/discussion/141015/end-of-support-for-teamviewer-versions-11-and-12/p1 https://community.teamviewer.com/English/discussion/141015/end-of-support-for-teamviewer-versions-11-and-12/]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Microsoft%27s_anticompetitive_practices&amp;diff=15698</id>
		<title>Microsoft&#039;s anticompetitive practices</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Microsoft%27s_anticompetitive_practices&amp;diff=15698"/>
		<updated>2025-06-21T13:54:08Z</updated>

		<summary type="html">&lt;p&gt;JP: Add missing period&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Incomplete|Issue 1=Needs more incident variety - Most, if not all of these incidents listed refer in some way to a browser developed by Microsoft. We should invest time into getting more anticompetitive incidents that are unrelated to browsers here for the sake of variety|Issue 2=Needs more source variety - Being mostly sources from The Verge acts more as an ad for the site rather than provide credibility to this article}}&lt;br /&gt;
&lt;br /&gt;
The software company &#039;&#039;[[Microsoft]]&#039;&#039; has had a history of harming its competition on devices running &#039;&#039;[[Windows]]&#039;&#039;. This is a historical list of every incident where &#039;&#039;[[Microsoft]]&#039;&#039; has harmed its competition.&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Soon after the introduction of applications that came preinstalled with &#039;&#039;[[Windows]]&#039;&#039;, &#039;&#039;[[Microsoft]]&#039;&#039; has had the incentive to force users into the native applications installed, rather than any third-party programs. As an example, with the release of [[Windows|&#039;&#039;Windows 10&#039;&#039;]], the preinstalled web browser [[Microsoft Edge|&#039;&#039;Microsoft Edge&#039;&#039;]] has had a litany of incidents where the web browser forced users into using it rather than the browser the user installed.&lt;br /&gt;
&lt;br /&gt;
==History of incidents&amp;lt;!-- I request that this section is organized chronologically, where the product with the oldest incident is focused at the top! - JamesTDG --&amp;gt;==&lt;br /&gt;
&lt;br /&gt;
===Anticompetitive lawsuits===&lt;br /&gt;
&lt;br /&gt;
====United States v. &#039;&#039;&#039;Microsoft Corp.: 2000&#039;&#039;&#039;====&lt;br /&gt;
In the case &#039;&#039;United States v. Microsoft &#039;&#039;&#039;Corp.&#039;&#039;&#039;,&#039;&#039; 87 F. Supp. 2d 30 (D.D.C. 2000),&amp;lt;ref&amp;gt;[https://law.justia.com/cases/federal/district-courts/FSupp2/87/30/2307082/ &amp;quot;United States v. Microsoft Corp., 87 F. Supp. 2d 30 (D.D.C. 2000)&amp;quot;] - law.justia.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s conduct taken as a whole was described as a &amp;quot;deliberate assault upon entrepreneurial efforts that, could well have enabled the introduction of competition into the market for [[Intel]]-compatible PC operating systems&amp;quot;. Further, &amp;quot;&#039;&#039;Microsoft&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s anti-competitive actions trammeled the competitive process through which the computer software industry generally stimulates innovation and conduces to the optimum benefit of consumers.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
====US Department of Justice, U.S. v. &#039;&#039;&#039;Microsoft Corp.: 2001&#039;&#039;&#039;====&lt;br /&gt;
In a major antitrust case brought by the &#039;&#039;US Department of Justice&#039;&#039;, &#039;&#039;U.S. v. Microsoft Corp.,&#039;&#039; 253 F.3d 34 (D.C. Cir. 2001),&amp;lt;ref&amp;gt;[https://law.justia.com/cases/federal/appellate-courts/F3/253/34/576095/ &amp;quot;U.S. v. Microsoft Corp., 253 F.3d 34 (D.C. Cir. 2001)&amp;quot;] - law.justia.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; &#039;&#039;Microsoft&#039;&#039; argued that there was no barrier to entry in the market they were in. A central issue at that time was whether &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039; could bundle the web browser &#039;&#039;Internet Explorer&#039;&#039; with the &#039;&#039;[[Windows|&#039;&#039;&#039;Microsoft&#039;&#039;&#039; Windows]]&#039;&#039; operating system. The &#039;&#039;District Court&#039;&#039; stated the following in the court case:&amp;lt;blockquote&amp;gt;&amp;quot;The District Court condemned a number of provisions in &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s agreements licensing &#039;&#039;[[Windows]]&#039;&#039; to OEMs, because it found that &#039;&#039;Microsoft&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s imposition of those provisions (like many of &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s other actions at issue in this case) serves to reduce usage share of &#039;&#039;Netscape&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s browser and, hence, protect &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s operating system monopoly.&amp;quot;&amp;lt;/blockquote&amp;gt;The court specifically identified three main license restrictions for [[Original Equipment Manufacturers]] (OEMs) that were considered problematic:&lt;br /&gt;
&lt;br /&gt;
#The prohibition upon the removal of desktop icons, folders, and Start menu entries&lt;br /&gt;
#The prohibition for modifying the initial boot sequence&lt;br /&gt;
#The prohibition of otherwise altering the appearance of the Windows desktop&lt;br /&gt;
&lt;br /&gt;
The case was eventually settled,&amp;lt;ref&amp;gt;[https://www.justice.gov/atr/case-document/file/503541/dl &amp;quot;Final judgment of US v. Microsoft&amp;quot;] - justice.gov - accessed 2025-01-29&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[https://law.justia.com/cases/federal/appellate-courts/F3/373/1199/474311/ &amp;quot;Commonwealth of Massachusetts, Ex Rel., Appellant, v. Microsoft Corporation&amp;quot;] - law.justia.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; and did not result in a company breakup.&amp;lt;ref&amp;gt;[https://www.seattletimes.com/business/microsoft/long-antitrust-saga-ends-for-microsoft/ &amp;quot;Long antitrust saga ends for Microsoft&amp;quot;] - seattletimes.com - accessed 2025-01-29&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Section III.H of the Consent Decree&amp;lt;ref&amp;gt;[https://www.justice.gov/atr/microsoft-consent-decree-compliance-advisory-august-1-2003-us-v-microsoft &amp;quot;Microsoft Consent Decree Compliance Advisory - August 1, 2003 : U.S. V. Microsoft&amp;quot;] - justice.gov - accessed 2025-01-29&amp;lt;/ref&amp;gt; required &#039;&#039;Microsoft&#039;&#039; to &amp;quot;allow end users and OEMs to enable or remove access to all middleware products­, including web browsers, e-mail clients, and media players ­through a readily accessible, centralized mechanism.&amp;quot; End users and OEMs should be able &amp;quot;to specify a non-&#039;&#039;Microsoft&#039;&#039; middleware product as the default middleware product to be launched in place of the corresponding &#039;&#039;&#039;&#039;&#039;Microsoft&#039;&#039;&#039;&#039;&#039; middleware product.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Microsoft Edge&amp;lt;!-- Because many of these are 1:1 copy/pastes, the references will need to be reformatted, and be far more descriptive. --&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
====Resetting primary browser: 2017 - Present====&lt;br /&gt;
[[Microsoft Edge|&#039;&#039;Edge&#039;&#039;]] has frequently been resetting the default browser to itself&amp;lt;ref&amp;gt;[https://answers.microsoft.com/en-us/windows/forum/all/default-browser-keeps-changing-to-edge/25e2939d-4674-40ab-b05a-6161e2297976 &amp;quot;Default Browser Keeps Changing to Edge&amp;quot;] - answers.microsoft.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; without consent from the user.&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;[https://answers.microsoft.com/en-us/windows/forum/all/windows-10-update-reset-my-computer-settings/e58bcee8-f4c9-40ef-a452-1dc5db7c45d9 &amp;quot;Windows 10 Update Reset my Computer Settings.&amp;quot;] - answers.microsoft.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; While there are methods available online to disable this,&amp;lt;ref&amp;gt;[https://www.reddit.com/r/techsupport/comments/15zbjar/default_browser_keeps_changing_to_microsoft_edge/ &amp;quot;Default browser keeps changing to Microsoft Edge after every PC restart. Win 11, tried everything&amp;quot;] - reddit.com - accessed 2025-01-29&amp;lt;/ref&amp;gt; it is tedious to achieve, especially for users who are not tech-savvy.&lt;br /&gt;
&lt;br /&gt;
====Inability to permanently remove the browser: 2018 - Present====&lt;br /&gt;
During major updates for &#039;&#039;[[Windows]]&#039;&#039;, users have been reporting their installations of [[Microsoft Edge|&#039;&#039;Edge&#039;&#039;]] being reinstalled to their devices without their consent.&amp;lt;ref&amp;gt;[https://www.windowscentral.com/how-prevent-microsoft-edge-chromium-installing-automatically-windows-10 &amp;quot;How to prevent new Microsoft Edge from installing automatically on Windows 10&amp;quot;] - windowscentral.com - accessed 2025-01-29&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Importing content from other browsers without consent: 2020 - Unknown&amp;lt;!-- After a Windows 11 update, Edge automatically opened with Chrome tabs auto-imported  https://x.com/tomwarren/status/1750175894306439601   https://www.theverge.com/24054329/microsoft-edge-automatic-chrome-import-data-feature --&amp;gt;====&lt;br /&gt;
Users have reported on frequent occasions that [[Microsoft Edge|&#039;&#039;Edge&#039;&#039;]] has imported user data from browsers such as [[Google Chrome|&#039;&#039;Chrome&#039;&#039;]] and [[Mozilla Firefox|&#039;&#039;Firefox&#039;&#039;]] without first requesting consent from the user.&amp;lt;ref&amp;gt;[https://www.komando.com/news/microsoft-edge-caught-importing-data/ &amp;quot;Microsoft caught importing data before you give the OK&amp;quot;] - komando.com - accessed 2025-01-29&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Harassing users into using Edge: 2020 - Unknown====&lt;br /&gt;
In 2020, users for [[Windows|Windows 10]] faced repeated harassment from Edge to use this browser instead of the user&#039;s chosen default browser.&amp;lt;ref&amp;gt;{{Cite news |last=Hollister |first=Sean |date=Jul 2, 2020 |title=With Edge, Microsoft’s forced Windows updates just sank to a new low |url=https://www.theverge.com/21310611/microsoft-edge-browser-forced-update-chromium-editorial |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt; Some examples included the browser opening on startup, the browser being forced into full screen, being incapable of closing the browser until the user acknowledges the pop-up, and the browser pinning itself to the taskbar.&amp;lt;ref&amp;gt;{{Cite web |last=Van Hemert |first=Taran |date=Jul 2, 2020 |title=Tweet from Taran Van Hemert |url=https://x.com/TaranVH/status/1278758217074405377?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1278758217074405377%7Ctwgr%5Ee004e3bc5652ed5a81062f5862eaf9a63967a58c%7Ctwcon%5Es1_c10&amp;amp;ref_url=https%3A%2F%2Fwww.theverge.com%2F21310611%2Fmicrosoft-edge-browser-forced-update-chromium-editorial |access-date=Jun 21, 2025 |website=X, formerly [[Twitter]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Prompts to stop users from installing competing browsers: 2021 - Present====&lt;br /&gt;
[[File:MS Edge pop-up.png|thumb|A [https://www.theverge.com/2021/12/2/22813733/microsoft-windows-edge-download-chrome-prompts screenshot] that shows an example of Edge harassing the user into using Edge.]]&lt;br /&gt;
Since &#039;&#039;&#039;December 2021&#039;&#039;&#039;, users who install other web browsers, such as &#039;&#039;[[Google Chrome|Chrome]], [[Brave browser|Brave]], or [[Opera web browser|Opera]],&#039;&#039; will face a pop-up on their screen telling users to instead use [[Microsoft Edge|&#039;&#039;Edge&#039;&#039;]].&amp;lt;ref&amp;gt;{{Cite news |last=Warren |first=Tom |date=Dec 2, 2021 |title=Microsoft’s new Windows prompts try to stop people downloading Chrome |url=https://www.theverge.com/2021/12/2/22813733/microsoft-windows-edge-download-chrome-prompts |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt;  Some of the messages of these pop-ups include:&amp;lt;ref&amp;gt;{{Cite news |last=Sen |first=Sayan |date=Dec 2, 2021 |title=Microsoft says its own Edge browser is more trustworthy than &amp;quot;so 2008&amp;quot; Google Chrome |url=https://www.neowin.net/news/microsoft-says-its-own-edge-browser-is-more-trustworthy-than-so-2008-google-chrome/ |access-date=Jun 21, 2025 |work=Neowin}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;“Microsoft Edge runs on the same technology as Chrome, with the added trust of Microsoft.”&lt;br /&gt;
&lt;br /&gt;
“That browser is so 2008! Do you know what’s new? Microsoft Edge.”&lt;br /&gt;
&lt;br /&gt;
“‘I hate saving money,’ said no one ever. Microsoft Edge is the best browser for online shopping.”&amp;lt;/blockquote&amp;gt;This has been reported to occur on devices running either &#039;&#039;[[Windows|Windows 10]]&#039;&#039; or &#039;&#039;[[Windows|Windows 11]]&#039;&#039;, and frequently aims to directly harm the market share of Chrome,&amp;lt;ref&amp;gt;{{Cite news |last=Hollister |first=Sean |date=Oct 24, 2024 |title=Microsoft now thirstily injects a poll when you download Google Chrome |url=https://www.theverge.com/23930960/microsoft-edge-google-chrome-poll-why-try-another-browser |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt; despite the browser itself running on the same codebase as &#039;&#039;[[Chromium]]&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
===Windows 11===&lt;br /&gt;
&lt;br /&gt;
====Increasing the difficulty to switch default browsers: 2021 - Present====&lt;br /&gt;
After an update in 2021, computers running &#039;&#039;[[Windows 11]]&#039;&#039; had the systems that handled modifying the web browser defaults.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite news |last=Warren |first=Tom |date=Aug 18, 2021 |title=Microsoft is making it harder to switch default browsers in Windows 11 |url=https://www.theverge.com/22630319/microsoft-windows-11-default-browser-changes |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt; Rather than allow the user to simply switch the default web browser, file types typically accessed via web browsers, such as HTM, HTML, SVG, and more have to be individually modified to have the default opening application changed. This has angered companies maintaining competing web browsers&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;!-- If we can get the notes feature added, this should be a useful note to include:&lt;br /&gt;
&lt;br /&gt;
“We have been increasingly worried about the trend on Windows,” says Selena Deckelmann, senior vice president of Firefox, in a statement to The Verge. “Since Windows 10, users have had to take additional and unnecessary steps to set and retain their default browser settings. These barriers are confusing at best and seem designed to undermine a user’s choice for a non-Microsoft browser.” --&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Lockheimer |first=Hiroshi |date=Aug 18, 2021 |title=Tweet from Hiroshi Lockheimer |url=https://x.com/lockheimer/status/1428047760620621831?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1428047760620621831%7Ctwgr%5E9ac6cc57ee0013acb388128e04c3a43f4cd79c94%7Ctwcon%5Es1_c10&amp;amp;ref_url=https%3A%2F%2Fwww.theverge.com%2F22630319%2Fmicrosoft-windows-11-default-browser-changes |access-date=Jun 21, 2025 |website=X, formerly [[Twitter]]}}&amp;lt;/ref&amp;gt; and consumers alike over this change.&lt;br /&gt;
&lt;br /&gt;
Even if users modify all of these default settings, other features on the device, such as the taskbar&#039;s weather widget, which if opened, will create a new tab specifically in &#039;&#039;[[Microsoft Edge|Edge]]&#039;&#039;.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref&amp;gt;{{Cite news |last=Warren |first=Tom |date=Apr 22, 2021 |title=Microsoft’s new Windows 10 taskbar widget starts rolling out today |url=https://www.theverge.com/2021/4/22/22397237/microsoft-windows-10-taskbar-weather-news-widget-feature-available-now |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt;&amp;lt;!-- Another note to add under [9]&lt;br /&gt;
&lt;br /&gt;
Windows 11 continues this trend, with search still forcing users into Edge, and now a new dedicated widgets area that also ignores the default browser setting. “It appears that Windows 11 widgets will ignore a user’s default browser choice and open Microsoft Edge for the content instead,” says a Brave spokesperson in a statement to The Verge. “Brave puts users first and we condemn this Windows 11 approach, because the choice of a default browser has many implications for individuals and their privacy. Users should be free to choose.” --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Microsoft attempts to justify this by stating:&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;blockquote&amp;gt;“With Windows 11, we are implementing customer feedback to customize and control defaults at a more granular level, eliminating app categories and elevating all apps to the forefront of the defaults experience,”&lt;br /&gt;
&lt;br /&gt;
“As evidenced by this change, we’re constantly listening and learning, and welcome customer feedback that helps shape Windows. Windows 11 will continue to evolve over time; if we learn from user experience that there are ways to make improvements, we will do so.”&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Bing web search===&lt;br /&gt;
&lt;br /&gt;
====Attempting to harm competing web browsers: 2023 - Unknown====&lt;br /&gt;
[[File:Bing search comparison.png|thumb|A side-by-side comparison between the [[Brave browser]] and [[Microsoft Edge]], where [[Microsoft Bing|Bing]] attempts to sway the user away from switching the browser.]]&lt;br /&gt;
When doing a web search for an alternative web browser through &#039;&#039;[[Microsoft Bing|Bing]]&#039;&#039;, &#039;&#039;[[Microsoft]]&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s in-house developed [[wikipedia:Search_engine|search engine]] that is also used as the default for &#039;&#039;[[Microsoft Edge|Edge]]&#039;&#039;, the [[wikipedia:Search_engine|search engine]]&#039;s AI will attempt to bury the search results for the web browser from the user.&amp;lt;ref&amp;gt;{{Cite news |last=Hollister |first=Sean |date=Jun 6, 2023 |title=Microsoft has no shame: Bing spit on my ‘Chrome’ search with a fake AI answer |url=https://www.theverge.com/2023/6/6/23736289/microsoft-bing-chrome-search-fake-ai-chatbot |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Beyond this, users specifically using both &#039;&#039;[[Microsoft Edge|Edge]]&#039;&#039; and its [[Microsoft Bing|default search engine]] will continue to see harassment at the top of the search, attempting to keep the user on the browser.&lt;br /&gt;
&lt;br /&gt;
====Disguising itself as another search engine: 2025 - Present&amp;lt;!-- I want to see more elaboration here - JamesTDG --&amp;gt;====&lt;br /&gt;
Currently, when a user does a web search for &amp;quot;[[Google]]&amp;quot;, the search engine will disguise itself as a generic search engine that would appear to look like Google in the eyes of the average user.&amp;lt;ref&amp;gt;{{Cite news |last=Warren |first=Tom |date=Jan 6, 2025 |title=Microsoft is using Bing to trick people into thinking they’re on Google |url=https://www.theverge.com/2025/1/6/24337117/microsoft-bing-search-results-google-design-trick |access-date=Jun 21, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Family Safety===&lt;br /&gt;
&lt;br /&gt;
====Blocking Chrome from launching: 2025 - Present&amp;lt;!-- Want to expand this one later... - JamesTDG --&amp;gt;====&lt;br /&gt;
A feature seen within &#039;&#039;[[Windows|Windows 11]]&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;s parental controls is Family Safety. A key problem shown from this feature is that it can questionably ban certain applications from properly running on the device, with no notice to the administrator in charge of the device. In &#039;&#039;&#039;June 2025&#039;&#039;&#039;, this feature banned the string &amp;quot;Chrome&amp;quot;,&amp;lt;ref name=&amp;quot;:3&amp;quot;&amp;gt;{{Cite web |last=u/Witty-Discount-2906 |date=Jun 3, 2025 |title=Chrome won’t open (Windows 11) |url=https://www.reddit.com/r/chrome/comments/1l2c552/comment/mvt1w2a/ |access-date=Jun 20, 2025 |website=[[Reddit]]}}&amp;lt;/ref&amp;gt; which blocked the web browser [[Google Chrome|&#039;&#039;Chrome&#039;&#039;]] from functioning.&amp;lt;ref&amp;gt;{{Cite news |last=Warren |first=Tom |date=Jun 20, 2025 |title=Microsoft is blocking Google Chrome through its family safety feature |url=https://www.theverge.com/news/690179/microsoft-block-google-chrome-family-safety-feature |access-date=Jun 20, 2025 |work=The Verge}}&amp;lt;/ref&amp;gt; Schools in particular use this feature on devices given out for students to complete classwork remotely, and as [[Google Chrome|&#039;&#039;Chrome&#039;&#039;]] holds the majority market share of web browser usage, (65-70%)&amp;lt;ref&amp;gt;{{Cite web |date=May 1, 2025 |title=Browser Market Share Worldwide |url=https://gs.statcounter.com/browser-market-share/ |access-date=Jun 20, 2025 |website=Statcounter}}&amp;lt;/ref&amp;gt; there has been mass reports of students being unable to complete their classwork strictly due to this flaw.&amp;lt;ref name=&amp;quot;:4&amp;quot;&amp;gt;{{Cite news |last=Priestley |first=Peter |date=Jun 4, 2025 |title=Microsoft Family Safety Blocking Chrome Browser |url=https://answers.microsoft.com/en-us/windows/forum/windows_11-wintop_famsafety/microsoft-family-safety-blocking-chrome-browser/40023ef5-177b-4eed-a857-80ed15afa3a5?rtAction=1749008739548&amp;amp;page=1 |access-date=Jun 20, 2025 |work=Microsoft Answers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Currently, &#039;&#039;Microsoft&#039;&#039; has neglected to inform users on rolling out a fix in the future,&amp;lt;ref&amp;gt;{{Cite web |date=Jun 3, 2025 |title=[User Feedback - Stable] M137 Windows - Increase in feedback about crashing |url=https://issues.chromium.org/issues/422222571 |access-date=Jun 20, 2025 |website=Chromium issues}}&amp;lt;/ref&amp;gt; and the only solutions available to users is to either rename the executable on the affected device&amp;lt;ref name=&amp;quot;:3&amp;quot; /&amp;gt; or disable &amp;quot;Block inappropriate browsing&amp;quot; inside the &#039;&#039;Family Safety&#039;&#039; settings.&amp;lt;ref name=&amp;quot;:4&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
[[Category:Microsoft]]&lt;br /&gt;
[[Category:Anti-Consumer Practices]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=User_talk:JP&amp;diff=15415</id>
		<title>User talk:JP</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=User_talk:JP&amp;diff=15415"/>
		<updated>2025-06-14T20:52:09Z</updated>

		<summary type="html">&lt;p&gt;JP: Create talk page for me (empty for now)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=List_of_phones_that_do_not_allow_bootloader_unlock&amp;diff=15406</id>
		<title>List of phones that do not allow bootloader unlock</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=List_of_phones_that_do_not_allow_bootloader_unlock&amp;diff=15406"/>
		<updated>2025-06-14T12:15:06Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Examples[3] */ Added Google Pixel using Verizon to the list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A bootloader is a program that runs when the phone turns on and loads the operating system. &amp;lt;ref&amp;gt;{{Cite web |title=GNU Grub website |url=https://www.gnu.org/software/grub/index.html}}&amp;lt;/ref&amp;gt; Most phones lock the bootloader by default, which means that a new bootloader or operating system can&#039;t be installed on the phone. &amp;lt;ref&amp;gt;{{Cite web |title=Lock and unlock the bootloader |url=https://source.android.com/docs/core/architecture/bootloader/locking_unlocking |website=Android Open Source project}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Some manufacturers do not allow unlocking the bootloader even if the phone is not under a contract. Some manufacturers allow to unlock the bootloader on some regions, or require a payment or an online connection to unlock the phone. Some manufacturers may void the warranty or block certain features permanently if the bootloader is unlocked&lt;br /&gt;
&lt;br /&gt;
==Why it is a problem==&lt;br /&gt;
If the bootloader cannot be unlocked the operating system can&#039;t be modified in any way which is not allowed by the manufacturer.&lt;br /&gt;
&lt;br /&gt;
==Examples&amp;lt;ref&amp;gt;{{Cite web |last= |first= |title=Bootloader wall of shame |url=https://github.com/melontini/bootloader-unlock-wall-of-shame |website=GitHub}}&amp;lt;/ref&amp;gt;==&lt;br /&gt;
&lt;br /&gt;
*Huawei&lt;br /&gt;
*HMD Global/Nokia&lt;br /&gt;
*Vivo/IQOO&lt;br /&gt;
*ZTE&lt;br /&gt;
*Meizu&lt;br /&gt;
*Asus&lt;br /&gt;
*Alcatel&lt;br /&gt;
*Apple&lt;br /&gt;
*Energizer&lt;br /&gt;
*Cat&lt;br /&gt;
*Sharp&lt;br /&gt;
*Doogee&lt;br /&gt;
*TCL&lt;br /&gt;
*Coolpad&lt;br /&gt;
*Realme (on some regions)&lt;br /&gt;
*OPPO (outside China)&lt;br /&gt;
*Xiaomi (China only)&lt;br /&gt;
*Samsung (USA only)&lt;br /&gt;
*HTC&lt;br /&gt;
*Motorola (on some devices)&lt;br /&gt;
*Google Pixel (Verizon)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15259</id>
		<title>Google Play Integrity API</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15259"/>
		<updated>2025-06-11T05:31:04Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Consumer impact summary */Fixed typo (on -&amp;gt; of)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Play Integrity API is an API provided by [[Google]] for the [[Android]] Operating System that allows applications to verify the genuineness of the app&#039;s binary and Android version.&amp;lt;ref&amp;gt;{{Cite web |title=Overview of the Play Integrity API |url=https://developer.android.com/google/play/integrity/overview |archive-url=https://web.archive.org/web/20250607124755/https://developer.android.com/google/play/integrity/overview |archive-date=2025-06-07 |access-date=2025-06-10 |website=Android Developers}}&amp;lt;/ref&amp;gt; It is the successor of the now deprecated SafetyNet Attestation API.&amp;lt;ref&amp;gt;{{Cite web |title=About the SafetyNet Attestation API deprecation |url=https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline |website=Android Developers}}&amp;lt;/ref&amp;gt; The API offers 4 device integrity labels, which are detailed in the table below.&amp;lt;ref&amp;gt;{{Cite web |title=Integrity verdicts |url=https://developer.android.com/google/play/integrity/verdicts#device-integrity-field |website=Android Developers}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Integrity Level&lt;br /&gt;
!Bootloader Can Be Unlocked&lt;br /&gt;
!Customized OSes Allowed&lt;br /&gt;
!Description&lt;br /&gt;
!Requirement(s)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_BASIC_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|The app is running on a device that passes basic system integrity checks. The device may not be Play Protect certified.&lt;br /&gt;
|Attestation root of trust provided by Google&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_VIRTUAL_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
|The app is running on an Android-powered emulator with Google Play services.&lt;br /&gt;
|The emulator passes system integrity checks and meets core Android compatibility requirements.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device.&lt;br /&gt;
|Hardware-backed proof that the device bootloader is locked and the loaded Android OS is a certified device manufacturer image.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device with a recent security update.&lt;br /&gt;
|Android 13+: &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; and security updates in the last year for all partitions of the device, including an Android OS partition patch and a vendor partition patch.&lt;br /&gt;
Android 12 and lower: Only hardware-backed proof of boot integrity&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Since the Play Integrity API relies on Google to certify devices, any apps requiring &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt; are only allowed on operating systems that Google allows. This allows Google to exert [[Monopoly|monopolistic]] power by not certifying competitors&#039; operating systems, since many apps choose to use the Play Integrity API instead of the Key Attestation API that is built into Android.&amp;lt;ref&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Verify hardware-backed key pairs with key attestation |url=https://developer.android.com/privacy-and-security/security-key-attestation |website=Android Developers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notable examples include of apps requiring Google-certified operating systems:&lt;br /&gt;
&lt;br /&gt;
* Google Wallet&lt;br /&gt;
* VPN by Google&lt;br /&gt;
* Netflix&lt;br /&gt;
* McDonald&#039;s&lt;br /&gt;
* Uber Driver&lt;br /&gt;
* Twitter/X&lt;br /&gt;
* Twilio Authy Authenticator&lt;br /&gt;
* ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The has led to users being unable to use apps on privacy-focused forks of Android, like [[GrapheneOS]].&amp;lt;ref&amp;gt;{{Cite web |title=Wallet - Google Pay |url=https://discuss.grapheneos.org/d/475/ |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
[https://mayrhofer.eu.org/courses/android-security/selected-paper/2024/Comparing_key_attestation_and_Play_Integrity_API.pdf Android System Integrity: Comparing Key Attestation and the Play Integrity API]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Android]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=User:JP&amp;diff=15230</id>
		<title>User:JP</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=User:JP&amp;diff=15230"/>
		<updated>2025-06-10T20:46:38Z</updated>

		<summary type="html">&lt;p&gt;JP: Added my user page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi, I&#039;m James, a FOSS Programmer and Game Developer. I started taking my privacy and consumer rights seriously after finding Louis Rossman&#039;s YouTube channel in late 2024. I daily drive Fedora and Android, though I plan on moving to GrapheneOS as soon as I can. You can find me on [https://github.com/james-pre GitHub] or reach out to [mailto:cr-wiki@jamespre.dev cr-wiki@jamespre.dev].&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Talk:Unjust_and_extraterritorial_law:_DMCA&amp;diff=15228</id>
		<title>Talk:Unjust and extraterritorial law: DMCA</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Talk:Unjust_and_extraterritorial_law:_DMCA&amp;diff=15228"/>
		<updated>2025-06-10T19:44:14Z</updated>

		<summary type="html">&lt;p&gt;JP: /* Merge with existing article */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Merge with existing article ==&lt;br /&gt;
&lt;br /&gt;
The [[Digital Millennium Copyright Act]] article already exists. I think we should merge this one into it. [[User:JP|JP]] ([[User talk:JP|talk]]) 19:44, 10 June 2025 (UTC)&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15219</id>
		<title>Google Play Integrity API</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15219"/>
		<updated>2025-06-10T18:36:00Z</updated>

		<summary type="html">&lt;p&gt;JP: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Play Integrity API is an API provided by [[Google]] for the [[Android]] Operating System that allows applications to verify the genuineness of the app&#039;s binary and Android version.&amp;lt;ref&amp;gt;{{Cite web |title=Overview of the Play Integrity API |url=https://developer.android.com/google/play/integrity/overview |archive-url=https://web.archive.org/web/20250607124755/https://developer.android.com/google/play/integrity/overview |archive-date=2025-06-07 |access-date=2025-06-10 |website=Android Developers}}&amp;lt;/ref&amp;gt; It is the successor of the now deprecated SafetyNet Attestation API.&amp;lt;ref&amp;gt;{{Cite web |title=About the SafetyNet Attestation API deprecation |url=https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline |website=Android Developers}}&amp;lt;/ref&amp;gt; The API offers 4 device integrity labels, which are detailed in the table below.&amp;lt;ref&amp;gt;{{Cite web |title=Integrity verdicts |url=https://developer.android.com/google/play/integrity/verdicts#device-integrity-field |website=Android Developers}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Integrity Level&lt;br /&gt;
!Bootloader Can Be Unlocked&lt;br /&gt;
!Customized OSes Allowed&lt;br /&gt;
!Description&lt;br /&gt;
!Requirement(s)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_BASIC_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|The app is running on a device that passes basic system integrity checks. The device may not be Play Protect certified.&lt;br /&gt;
|Attestation root of trust provided by Google&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_VIRTUAL_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
|The app is running on an Android-powered emulator with Google Play services.&lt;br /&gt;
|The emulator passes system integrity checks and meets core Android compatibility requirements.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device.&lt;br /&gt;
|Hardware-backed proof that the device bootloader is locked and the loaded Android OS is a certified device manufacturer image.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device with a recent security update.&lt;br /&gt;
|Android 13+: &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; and security updates in the last year for all partitions of the device, including an Android OS partition patch and a vendor partition patch.&lt;br /&gt;
Android 12 and lower: Only hardware-backed proof of boot integrity&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Since the Play Integrity API relies on Google to certify devices, any apps requiring &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt; are only allowed on operating systems that Google allows. This allows Google to exert [[Monopoly|monopolistic]] power by not certifying competitors&#039; operating systems, since many apps choose to use the Play Integrity API instead of the Key Attestation API that is built into Android.&amp;lt;ref&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Verify hardware-backed key pairs with key attestation |url=https://developer.android.com/privacy-and-security/security-key-attestation |website=Android Developers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notable examples include of apps requiring Google-certified operating systems:&lt;br /&gt;
&lt;br /&gt;
* Google Wallet&lt;br /&gt;
* VPN by Google&lt;br /&gt;
* Netflix&lt;br /&gt;
* McDonald&#039;s&lt;br /&gt;
* Uber Driver&lt;br /&gt;
* Twitter/X&lt;br /&gt;
* Twilio Authy Authenticator&lt;br /&gt;
* ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The has led to users being unable to use apps on privacy-focused forks on Android, like [[GrapheneOS]].&amp;lt;ref&amp;gt;{{Cite web |title=Wallet - Google Pay |url=https://discuss.grapheneos.org/d/475/ |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
[https://mayrhofer.eu.org/courses/android-security/selected-paper/2024/Comparing_key_attestation_and_Play_Integrity_API.pdf Android System Integrity: Comparing Key Attestation and the Play Integrity API]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Android]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15218</id>
		<title>Google Play Integrity API</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15218"/>
		<updated>2025-06-10T18:33:34Z</updated>

		<summary type="html">&lt;p&gt;JP: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Play Integrity API is an API provided by [[Google]] for the [[Android]] Operating System that allows applications to verify the genuineness of the apps binary and Android version.&amp;lt;ref&amp;gt;{{Cite web |title=Overview of the Play Integrity API |url=https://developer.android.com/google/play/integrity/overview |archive-url=https://web.archive.org/web/20250607124755/https://developer.android.com/google/play/integrity/overview |archive-date=2025-06-07 |access-date=2025-06-10 |website=Android Developers}}&amp;lt;/ref&amp;gt; It is the successor of the now deprecated SafetyNet Attestation API.&amp;lt;ref&amp;gt;{{Cite web |title=About the SafetyNet Attestation API deprecation |url=https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline |website=Android Developers}}&amp;lt;/ref&amp;gt; The API offers 4 device integrity labels, which are detailed in the table below.&amp;lt;ref&amp;gt;{{Cite web |title=Integrity verdicts |url=https://developer.android.com/google/play/integrity/verdicts#device-integrity-field |website=Android Developers}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Integrity Level&lt;br /&gt;
!Bootloader Can Be Unlocked&lt;br /&gt;
!Customized OSes Allowed&lt;br /&gt;
!Description&lt;br /&gt;
!Requirement(s)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_BASIC_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|The app is running on a device that passes basic system integrity checks. The device may not be Play Protect certified.&lt;br /&gt;
|Attestation root of trust provided by Google&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_VIRTUAL_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
|The app is running on an Android-powered emulator with Google Play services.&lt;br /&gt;
|The emulator passes system integrity checks and meets core Android compatibility requirements.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device.&lt;br /&gt;
|Hardware-backed proof that the device bootloader is locked and the loaded Android OS is a certified device manufacturer image.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device with a recent security update.&lt;br /&gt;
|Android 13+: &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; and security updates in the last year for all partitions of the device, including an Android OS partition patch and a vendor partition patch.&lt;br /&gt;
Android 12 and lower: Only hardware-backed proof of boot integrity&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Since the Play Integrity API relies on Google to certify devices, any apps requiring &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt; are only allowed on operating systems that Google allows. This allows Google to exert [[Monopoly|monopolistic]] power by not certifying competitors&#039; operating systems, since many apps choose to use the Play Integrity API instead of the Key Attestation API that is built into Android.&amp;lt;ref&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Verify hardware-backed key pairs with key attestation |url=https://developer.android.com/privacy-and-security/security-key-attestation |website=Android Developers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notable examples include of apps requiring Google-certified operating systems:&lt;br /&gt;
&lt;br /&gt;
* Google Wallet&lt;br /&gt;
* VPN by Google&lt;br /&gt;
* Netflix&lt;br /&gt;
* McDonald&#039;s&lt;br /&gt;
* Uber Driver&lt;br /&gt;
* Twitter/X&lt;br /&gt;
* Twilio Authy Authenticator&lt;br /&gt;
* ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The has led to users being unable to use apps on privacy-focused forks on Android, like [[GrapheneOS]].&amp;lt;ref&amp;gt;{{Cite web |title=Wallet - Google Pay |url=https://discuss.grapheneos.org/d/475/ |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
[https://mayrhofer.eu.org/courses/android-security/selected-paper/2024/Comparing_key_attestation_and_Play_Integrity_API.pdf Android System Integrity: Comparing Key Attestation and the Play Integrity API]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Android]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15217</id>
		<title>Google Play Integrity API</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Google_Play_Integrity_API&amp;diff=15217"/>
		<updated>2025-06-10T18:30:47Z</updated>

		<summary type="html">&lt;p&gt;JP: Added an article for the Play Integrity API&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Play Integrity API is an API provided by [[Google]] for the [[Android]] Operating System that allows applications to verify the genuineness of the apps binary and Android version.&amp;lt;ref&amp;gt;{{Cite web |title=Overview of the Play Integrity API |url=https://developer.android.com/google/play/integrity/overview |archive-url=https://web.archive.org/web/20250607124755/https://developer.android.com/google/play/integrity/overview |archive-date=2025-06-07 |access-date=2025-06-10 |website=Android Developers}}&amp;lt;/ref&amp;gt; It is the successor of the now deprecated SafetyNet Attestation API.&amp;lt;ref&amp;gt;{{Cite web |title=About the SafetyNet Attestation API deprecation |url=https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline |website=Android Developers}}&amp;lt;/ref&amp;gt; The API offers 4 device integrity labels, which are detailed in the table below.&amp;lt;ref&amp;gt;{{Cite web |title=Integrity verdicts |url=https://developer.android.com/google/play/integrity/verdicts#device-integrity-field |website=Android Developers}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Integrity Level&lt;br /&gt;
!Bootloader Can Be Unlocked&lt;br /&gt;
!Customized OSes Allowed&lt;br /&gt;
!Description&lt;br /&gt;
!Requirement(s)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_BASIC_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|{{Yes}}&lt;br /&gt;
|The app is running on a device that passes basic system integrity checks. The device may not be Play Protect certified.&lt;br /&gt;
|Attestation root of trust provided by Google&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_VIRTUAL_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:center;&amp;quot; |Unknown&lt;br /&gt;
|The app is running on an Android-powered emulator with Google Play services.&lt;br /&gt;
|The emulator passes system integrity checks and meets core Android compatibility requirements.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device.&lt;br /&gt;
|Hardware-backed proof that the device bootloader is locked and the loaded Android OS is a certified device manufacturer image.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt;&lt;br /&gt;
|{{No}}&lt;br /&gt;
|{{No}}&lt;br /&gt;
|The app is running on a genuine Play Protect certified Android-powered device with a recent security update.&lt;br /&gt;
|Android 13+: &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; and security updates in the last year for all partitions of the device, including an Android OS partition patch and a vendor partition patch.&lt;br /&gt;
Android 12 and lower: Only hardware-backed proof of boot integrity&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Since the Play Integrity API relies on Google to certify devices, any apps requiring &amp;lt;code&amp;gt;MEETS_DEVICE_INTEGRITY&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;MEETS_STRONG_INTEGRITY&amp;lt;/code&amp;gt; are only allowed on operating systems that Google allows. This allows Google to exert [[Monopoly|monopolistic]] power by not certifying competitors&#039; operating systems, since many apps choose to use the Play Integrity API instead of the Key Attestation API that is built into Android.&amp;lt;ref&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Verify hardware-backed key pairs with key attestation |url=https://developer.android.com/privacy-and-security/security-key-attestation |website=Android Developers}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notable examples include of apps requiring Google-certified operating systems:&lt;br /&gt;
&lt;br /&gt;
* Google Wallet&lt;br /&gt;
* VPN by Google&lt;br /&gt;
* Netflix&lt;br /&gt;
* McDonald&#039;s&lt;br /&gt;
* Uber Driver&lt;br /&gt;
* Twitter/X&lt;br /&gt;
* Twilio Authy Authenticator&lt;br /&gt;
* ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The has led to users being unable to use apps on privacy-focused forks on Android, like [[GrapheneOS]].&amp;lt;ref&amp;gt;{{Cite web |title=Wallet - Google Pay |url=https://discuss.grapheneos.org/d/475/ |website=GrapheneOS Discussion Forum}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
[https://mayrhofer.eu.org/courses/android-security/selected-paper/2024/Comparing_key_attestation_and_Play_Integrity_API.pdf Android System Integrity: Comparing Key Attestation and the Play Integrity API]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15211</id>
		<title>Apps deliberately refusing to work on modded devices</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15211"/>
		<updated>2025-06-10T18:11:07Z</updated>

		<summary type="html">&lt;p&gt;JP: Shorten URL for reference to discourse forum thread&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}} &lt;br /&gt;
Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Phones and PCs include a Trusted Platform Module &amp;lt;ref&amp;gt;{{Cite web |title=Trusted Platform Module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-date=2016-08-03}}&amp;lt;/ref&amp;gt;: a chip independent from the device&#039;s CPU and can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device. &lt;br /&gt;
==Why it is a problem==&lt;br /&gt;
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)&lt;br /&gt;
&lt;br /&gt;
*update the device operating system once it is no longer supported by the device manufacturer&lt;br /&gt;
*use alternative operating systems such as Linux or other Android-based operating systems that add new features&lt;br /&gt;
*remove all bloatware&lt;br /&gt;
*access all data stored on the device&lt;br /&gt;
&lt;br /&gt;
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services (see [[Forced app download]]), and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn&#039;t be able to interact with those businesses that require or heavily encourage their app.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Android&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;===&lt;br /&gt;
{{Main|Google Play Integrity API}}&lt;br /&gt;
*Google Wallet&lt;br /&gt;
*VPN by Google for Pixel&lt;br /&gt;
*Netflix&lt;br /&gt;
*McDonald&#039;s App&lt;br /&gt;
*Google Messages (RCS does not work when device is modded)&lt;br /&gt;
*Uber Driver&lt;br /&gt;
*Twitter/X&lt;br /&gt;
*Twilio Authy Authenticator&lt;br /&gt;
*ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15210</id>
		<title>Apps deliberately refusing to work on modded devices</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15210"/>
		<updated>2025-06-10T18:09:38Z</updated>

		<summary type="html">&lt;p&gt;JP: Format examples section for different operating systems and add a &amp;quot;Main article&amp;quot; link (WIP)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}} &lt;br /&gt;
Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/apps-games-need-pi-list.4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Phones and PCs include a Trusted Platform Module &amp;lt;ref&amp;gt;{{Cite web |title=Trusted Platform Module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-date=2016-08-03}}&amp;lt;/ref&amp;gt;: a chip independent from the device&#039;s CPU and can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device. &lt;br /&gt;
==Why it is a problem==&lt;br /&gt;
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)&lt;br /&gt;
&lt;br /&gt;
*update the device operating system once it is no longer supported by the device manufacturer&lt;br /&gt;
*use alternative operating systems such as Linux or other Android-based operating systems that add new features&lt;br /&gt;
*remove all bloatware&lt;br /&gt;
*access all data stored on the device&lt;br /&gt;
&lt;br /&gt;
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services (see [[Forced app download]]), and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn&#039;t be able to interact with those businesses that require or heavily encourage their app.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Android&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;===&lt;br /&gt;
{{Main|Google Play Integrity API}}&lt;br /&gt;
*Google Wallet&lt;br /&gt;
*VPN by Google for Pixel&lt;br /&gt;
*Netflix&lt;br /&gt;
*McDonald&#039;s App&lt;br /&gt;
*Google Messages (RCS does not work when device is modded)&lt;br /&gt;
*Uber Driver&lt;br /&gt;
*Twitter/X&lt;br /&gt;
*Twilio Authy Authenticator&lt;br /&gt;
*ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Template:No&amp;diff=15208</id>
		<title>Template:No</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Template:No&amp;diff=15208"/>
		<updated>2025-06-10T17:30:30Z</updated>

		<summary type="html">&lt;p&gt;JP: Created page with &amp;quot;&amp;lt;noinclude&amp;gt;{| class=&amp;quot;wikitable&amp;quot; |- |&amp;lt;/noinclude&amp;gt;style=&amp;quot;background:#FFC4C4;color:black;vertical-align:middle;text-align:{{{align|center}}};{{{style|}}}&amp;quot; class=&amp;quot;table-no&amp;quot;|{{{1|No}}}&amp;lt;noinclude&amp;gt; |} {{documentation}} &amp;lt;/noinclude&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;/noinclude&amp;gt;style=&amp;quot;background:#FFC4C4;color:black;vertical-align:middle;text-align:{{{align|center}}};{{{style|}}}&amp;quot; class=&amp;quot;table-no&amp;quot;|{{{1|No}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
{{documentation}}&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Template:Yes&amp;diff=15207</id>
		<title>Template:Yes</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Template:Yes&amp;diff=15207"/>
		<updated>2025-06-10T17:27:12Z</updated>

		<summary type="html">&lt;p&gt;JP: Added &amp;quot;Yes&amp;quot; template for use in tables&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;/noinclude&amp;gt;style=&amp;quot;background:#8FFF8F;color:black;vertical-align:middle;text-align:{{{align|center}}};{{{style|}}}&amp;quot; class=&amp;quot;table-yes&amp;quot;|{{{1|Yes}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
{{documentation}}&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15186</id>
		<title>Apps deliberately refusing to work on modded devices</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apps_deliberately_refusing_to_work_on_modded_devices&amp;diff=15186"/>
		<updated>2025-06-10T13:54:00Z</updated>

		<summary type="html">&lt;p&gt;JP: Added ChatGPT to the list of apps&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Apps &amp;amp; Games need PI |url=https://xdaforums.com/t/apps-games-need-pi-list.4677050/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Phones and PCs include a Trusted Platform Module &amp;lt;ref&amp;gt;{{Cite web |title=Trusted Platform Module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;amp;aid=1 |archive-date=2016-08-03}}&amp;lt;/ref&amp;gt;: a chip independent from the device&#039;s CPU and can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device. &lt;br /&gt;
==Why it is a problem==&lt;br /&gt;
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)&lt;br /&gt;
&lt;br /&gt;
*update the device operating system once it is no longer supported by the device manufacturer&lt;br /&gt;
*use alternative operating systems such as Linux or other Android-based operating systems that add new features&lt;br /&gt;
*remove all bloatware&lt;br /&gt;
*access all data stored on the device&lt;br /&gt;
&lt;br /&gt;
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services (see [[Forced app download]]), and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn&#039;t be able to interact with those businesses that require or heavily encourage their app.&lt;br /&gt;
&lt;br /&gt;
==Examples&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;==&lt;br /&gt;
&lt;br /&gt;
*Google Wallet&lt;br /&gt;
*VPN by Google for Pixel&lt;br /&gt;
*Netflix&lt;br /&gt;
*McDonald&#039;s App&lt;br /&gt;
*Google Messages (RCS does not work when device is modded)&lt;br /&gt;
*Uber Driver&lt;br /&gt;
*Twitter/X&lt;br /&gt;
*Twilio Authy Authenticator&lt;br /&gt;
*ChatGPT&amp;lt;ref&amp;gt;{{Cite web |title=PlayIntegrity Verification failed - ChatGPT / Bugs |url=https://community.openai.com/t/1267945 |website=OpenAI Developer Community}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Question - ChatGPT error: Preauth Playintegrity verification failed |url=https://xdaforums.com/t/4737618/ |website=XDA Forums}}&amp;lt;/ref&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Hidden_EULA_language&amp;diff=1519</id>
		<title>Hidden EULA language</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Hidden_EULA_language&amp;diff=1519"/>
		<updated>2025-01-17T00:50:18Z</updated>

		<summary type="html">&lt;p&gt;JP: Changed &amp;quot;&amp;amp;&amp;quot; to &amp;quot;and&amp;quot; for formality&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;quot;EULA roofie&amp;quot; describes the practice of hiding contentious terms within an End User License Agreement (EULA). The term applies to situations where such terms, if made clear upfront, might cause a customer to second-guess their purchase. The term was coined by consumer rights advocate [[wikipedia:Louis_Rossmann|Louis Rossmann]]&amp;lt;sup&amp;gt;[source?]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This term higlights the unethical business practice of &amp;quot;manufacturing consent&amp;quot; for terms which a reasonable and informed customer might reject. It also emphasizes the erosion of informed consent through shaming and conformity.&lt;br /&gt;
&lt;br /&gt;
By hiding contentious or unconscionable terms in dense legal documents, manufacturers exploit:&lt;br /&gt;
&lt;br /&gt;
# the consumer&#039;s lack of proficiency in understanding legal documents,&lt;br /&gt;
# the impracticality of reading long documents in order to meet one&#039;s basic human needs.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;EULA roofie&amp;quot; applies to individuals and corporations that utilize these practices to secure and manufacture consent under these false pretenses.&lt;br /&gt;
&lt;br /&gt;
According to Rossmann, just as drugging someone (&amp;quot;roofying&amp;quot;) to secure agreement is indefensible, so too is the act of concealing ethically or morally questionable terms in the fine print of a contract. The term &amp;quot;EULA roofie&amp;quot; attempts to draw a greater degree of societal scorn, scrutiny, and condemnation towards these actions, as they are seen at best as a minor legal nuisance rather than a disregard for informed consent and human rights.&lt;br /&gt;
&lt;br /&gt;
== Core Concept ==&lt;br /&gt;
The term &amp;quot;EULA roofie&amp;quot; describes three key deceptive practices:&lt;br /&gt;
&lt;br /&gt;
# Burying unattractive terms deep within an End User License Agreement (while avoiding mention of them in marketing materials and customer-facing interfaces).&lt;br /&gt;
# Making the full terms impractical or impossible for the customer to meaningfully review.&lt;br /&gt;
# Pointing to the End User License Agreement as a justification for unpopular practices.&lt;br /&gt;
&lt;br /&gt;
== Notable Examples ==&lt;br /&gt;
&lt;br /&gt;
=== Sony PlayStation Store ===&lt;br /&gt;
Sony prominently displays &#039;&#039;&amp;quot;PURCHASE&amp;quot;&#039;&#039; buttons for digital content but buries a redefinition of the word &amp;quot;purchase&amp;quot; in Section 10.1 of their Terms of Service:&amp;lt;ref&amp;gt;PLAYSTATION&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; NETWORK TERMS OF SERVICE AND USER AGREEMENT, December 30th, 2023: https://web.archive.org/web/20231230163548/https://www.playstation.com/en-us/legal/psn-terms-of-service/&amp;lt;/ref&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;Use of the terms &#039;own,&#039; &#039;ownership&#039;, &#039;purchase,&#039; &#039;sale,&#039; &#039;sold,&#039; &#039;sell,&#039; &#039;rent&#039; or &#039;buy&#039;... does not mean or imply any transfer of ownership...&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This became an issue in 2023 when Sony and Discovery removed previously &#039;&#039;&amp;quot;&#039;&#039;purchased&#039;&#039;&amp;quot;&#039;&#039; content from users&#039; libraries, citing terms hidden in their service agreement.&amp;lt;ref&amp;gt;Playstation Video Content: Legal Update Notice https://web.archive.org/web/20231203150040/https://www.playstation.com/en-us/legal/psvideocontent/&amp;lt;/ref&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
Placing disclaimers such as &#039;&#039;&amp;quot;&#039;&#039;We may take away and remove television and movies you bought &amp;amp; paid for at any time, because purchase doesn&#039;t mean purchase anymore&#039;&#039;&amp;quot;&#039;&#039; next to the &#039;&#039;&amp;quot;&#039;&#039;Add to cart&#039;&#039;&amp;quot;&#039;&#039; button would understandably negatively affect sales. Therefore, Sony buries this information on page 21 of their Terms of Service.&lt;br /&gt;
&lt;br /&gt;
=== Smart Appliance Data Collection &amp;amp; Third-Party Data Sharing ===&lt;br /&gt;
[[File:LG ThinQ app terms of service part 1.webp|alt=LG ThinQ app terms of service from July 2024, for use of an LG smart washing machine|thumb|LG ThinQ app terms of service from July 2024, for use of an LG smart washing machine]]&lt;br /&gt;
[[File:LG ThinQ app TOS.webp|alt=LG ThinQ app terms of service from July 2024, for use of an LG smart washing machine: part 2 of 3.|thumb|LG ThinQ app terms of service from July 2024, for use of an LG smart washing machine: part 2 of 3.]]&lt;br /&gt;
[[File:LG ThinQ app terms of service from July 2024, for use of an LG smart washing machine- part 3 of 3..webp|thumb]]&lt;br /&gt;
&lt;br /&gt;
LG Electronics (among others) require users to accept extensive terms of service and privacy policies to use the &amp;quot;smart&amp;quot; features on home appliances, such as washing machines.   &lt;br /&gt;
&lt;br /&gt;
While the &amp;quot;smart&amp;quot; features may have time-saving benefits, the time required to actually read and decipher these documents (&#039;&#039;often 3+ hours, especially for non-tech-savvy users&#039;&#039;) negates any time-saving benefits of the smart features themselves. This makes meaningful informed consent impractical.  &lt;br /&gt;
&lt;br /&gt;
A consumer has to read the complete Privacy Policy (&#039;&#039;see attached images below&#039;&#039;) to learn that LG collects their personal data and shares it with their advertising partners. Futhermore, this Privacy Policy is only shown to the customer once they have bought the LG product. &lt;br /&gt;
&lt;br /&gt;
== Consumer Impact ==&lt;br /&gt;
The practice undermines informed consent in digital transactions by:&lt;br /&gt;
&lt;br /&gt;
* Using lengthy documents (often 50+ pages) to hide terms that deprive the consumer of their privacy and their rights&lt;br /&gt;
* Employing complex legal language to obscure the real meaning of agreements.&lt;br /&gt;
* Placing important information deep within documents where it is unlikely to be found.&lt;br /&gt;
* Presenting one meaning of terms (like &amp;quot;purchase&amp;quot;) in the user interface while legally defining them differently in hidden terms.&lt;br /&gt;
&lt;br /&gt;
== Legal Context ==&lt;br /&gt;
While EULAs and Terms of Service are legally binding documents, the &amp;quot;&#039;&#039;EULA roofie&#039;&#039;&amp;quot; concept challenges their legitimacy by highlighting how they may violate principles of contract law such as:&lt;br /&gt;
&lt;br /&gt;
* Meeting of the minds (mutual understanding between parties).&lt;br /&gt;
* Good faith dealing.&lt;br /&gt;
* Reasonable notice of terms.&lt;br /&gt;
* Unconscionability (terms so unfair they shock the conscience).&lt;br /&gt;
&lt;br /&gt;
== Consumer Protection Response ==&lt;br /&gt;
The concept has been used in advocacy for:&lt;br /&gt;
&lt;br /&gt;
* Plain language requirements in consumer agreements.&lt;br /&gt;
* Prominent disclosure of significant terms.&lt;br /&gt;
* Reform of digital ownership rights.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
[[Category:Common Term]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Roku&amp;diff=1518</id>
		<title>Roku</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Roku&amp;diff=1518"/>
		<updated>2025-01-17T00:46:42Z</updated>

		<summary type="html">&lt;p&gt;JP: Fixed grammer (A, B -&amp;gt; A and B)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Roku Inc. is an American technology company, founded in October of 2002, known for their &amp;quot;Roku&amp;quot; line of products, which consist of Smart TVs &amp;amp; streaming players.&lt;br /&gt;
=== [https://wiki.rossmanngroup.com/index.php/Post-purchase_EULA_modification Post-purchase EULA modification] ===&lt;br /&gt;
In early March of 2024, Roku Inc. changed their EULA, which was after the company disclosed a data breach that affected over 15,000 accounts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This new EULA was enforced onto pre-existing users in the form of a message on their Smart TV/streaming player, which only allowed the user to accept the new terms, and not decline. The only option Roku Inc. offered to opt-out of the new EULA was for the user to mail the company their contact information and email used to register the Roku account (if applicable), and the product model, software, or service &amp;quot;at issue&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this new EULA, Roku Inc. included a [https://wiki.rossmanngroup.com/index.php/Forced_Arbitration Forced Arbitration] agreement to not allow users to sue, or to take part in lawsuits against Roku Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Roku Inc. clarified a week later that the new EULA was not in relation to the aforementioned data breach.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[https://www.bleepingcomputer.com/news/security/over-15-000-hacked-roku-accounts-sold-for-50-each-to-buy-hardware/ Over 15,000 hacked Roku accounts sold for 50¢ each to buy hardware] [https://web.archive.org/web/20240402093803/https://www.bleepingcomputer.com/news/security/over-15-000-hacked-roku-accounts-sold-for-50-each-to-buy-hardware/ &amp;lt;nowiki&amp;gt;[Archived]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
[https://www.claimdepot.com/data-breach/roku Roku Data Breach: Over 15,000 Accounts Affected]&lt;br /&gt;
&lt;br /&gt;
[https://gizmodo.com/roku-smart-tv-streaming-arbitration-agreement-class-act-1851314150 Roku Will Bork Your TV Unless You Promise Not to Sue]  [https://web.archive.org/web/20240307005654/https://gizmodo.com/roku-smart-tv-streaming-arbitration-agreement-class-act-1851314150 &amp;lt;nowiki&amp;gt;[Archived]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
[https://techcrunch.com/2024/03/05/roku-disables-tvs-and-streaming-devices-until-users-consent-to-forced-arbitration/ Roku disables TVs and streaming devices until users consent to new terms]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Arity%27s_alleged_unauthorized_driver_data_collection_through_mobile_apps&amp;diff=1516</id>
		<title>Arity&#039;s alleged unauthorized driver data collection through mobile apps</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Arity%27s_alleged_unauthorized_driver_data_collection_through_mobile_apps&amp;diff=1516"/>
		<updated>2025-01-17T00:39:59Z</updated>

		<summary type="html">&lt;p&gt;JP: Fixed missing newline messing up formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ToneWarning}}&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
Arity is a subsidiary of Allstate founded in 2016. As part of their mission, Arity states they do the following:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&#039;&#039;...collect{s} and analyze{s} trillions of miles of driving data to create a greater understanding of how people move. With the world&#039;s largest driving dataset tied to insurance claims collected through mobile devices, in-car devices, and vehicles themselves&#039;&#039;&amp;lt;ref&amp;gt;https://web.archive.org/web/20250114015047/https://arity.com/solutions/vehicle-miles-traveled/&amp;lt;/ref&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Screenshot of arity.com as of January 15, 2025.png|alt=screenshot of arity.com as of January 15, 2025|thumb|screenshot of arity.com demonstrating their claim of having 40 million active mobile connections]]&lt;br /&gt;
&lt;br /&gt;
Their website touts over 40m active mobile connections, with data captured every 15 seconds or less.&amp;lt;ref&amp;gt;https://web.archive.org/web/20241217184520/https://arity.com/solutions/real-time-insights/&amp;lt;/ref&amp;gt; The state of Texas Attorney General&#039;s office claims this occurred without the consent of the drivers and has filed a lawsuit against Allstate Corporation and its subsidiaries, including Arity which was founded by Allstate.&amp;lt;ref&amp;gt;https://www.texasattorneygeneral.gov/sites/default/files/images/press/Allstate%20and%20Arity%20Petition%20Filed.pdf&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The State of Texas, led by Texas Attorney Ken Paxton, has named Allstate &amp;amp; Arity, as well as their subsidiaries, as defendants in a lawsuit where they make allegations of data privacy violations.&lt;br /&gt;
&lt;br /&gt;
== Claims made by the suit ==&lt;br /&gt;
&lt;br /&gt;
=== Laws broken ===&lt;br /&gt;
The lawsuit accuses them of violating state laws such as the Texas Data Privacy and Security Act&amp;lt;ref&amp;gt;https://capitol.texas.gov/tlodocs/88R/billtext/html/HB00004F.htm&amp;lt;/ref&amp;gt;, the Data Broker Law&amp;lt;ref&amp;gt;https://statutes.capitol.texas.gov/Docs/BC/htm/BC.509.htm&amp;lt;/ref&amp;gt;, and the Texas Insurance Code&amp;lt;ref&amp;gt;https://statutes.capitol.texas.gov/Docs/IN/htm/IN.541.htm&amp;lt;/ref&amp;gt;. Allstate &amp;amp; its subsidiaries reportedly harvested this data through software integrated into mobile apps, impacting millions of Americans; not just those who are Texas residents.&lt;br /&gt;
&lt;br /&gt;
=== Claims made ===&lt;br /&gt;
This lawsuit makes claims for which &#039;&#039;&#039;there is not enough information in the source document to understand where these came from.&#039;&#039;&#039; Refer to [[Anonymity &amp;amp; Vagueness in Citations]] to learn more.  &lt;br /&gt;
&lt;br /&gt;
==== Claims with evidence ====&lt;br /&gt;
&lt;br /&gt;
===== What data Arity collects =====&lt;br /&gt;
Arity collects the following data per the lawsuit, that can be confirmed via their privacy policy&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
* Geolocation data&lt;br /&gt;
* Accelerometer data&lt;br /&gt;
* Magnetometer data&lt;br /&gt;
* Gyroscopic data&lt;br /&gt;
* Trip attributes:&lt;br /&gt;
** Start/end locations&lt;br /&gt;
** Distances&lt;br /&gt;
** Durations&lt;br /&gt;
** Times of these movements&lt;br /&gt;
* GPS points&lt;br /&gt;
* Derived events:&lt;br /&gt;
** Acceleration&lt;br /&gt;
** Speeding&lt;br /&gt;
** Distracted driving&lt;br /&gt;
** Crashes&lt;br /&gt;
&lt;br /&gt;
===== Arity&#039;s claims regarding their massive data collection =====&lt;br /&gt;
&lt;br /&gt;
====== This is technically true ======&lt;br /&gt;
The suit cites Arity&#039;s website, where they claim to:&lt;br /&gt;
&lt;br /&gt;
# Have the largest collection of driving data&lt;br /&gt;
# Collect new data on individuals every 15 seconds&lt;br /&gt;
# Have access to trillions of miles of driving data.&lt;br /&gt;
&lt;br /&gt;
====== Evidence of data collection vs. evidence of &#039;&#039;improper&#039;&#039; data collection ======&lt;br /&gt;
The lawsuit&#039;s citations are quotations from Arity&#039;s website, that in and of itself contain no evidence of malfeasance. For instance, Geico&#039;s smartphone application allows individuals to opt into driver-monitoring data collection offering a chance at decreased insurance rates, and is upfront about this before opting you in.&amp;lt;ref&amp;gt;https://www.geico.com/driveeasy/&amp;lt;/ref&amp;gt; While this may not be comforting to privacy minded people, the choice is presented to the customer. The mere mention that a company collects driving data is not an indictment that privacy violations have occurred.&lt;br /&gt;
&lt;br /&gt;
The allegations in the lawsuit hone in on the secretive collection &amp;amp; monetization of insured&#039;s private driving behavior data without proper disclosure or consent to the driver, but lack tangible evidence at this time that this has taken place. &lt;br /&gt;
&lt;br /&gt;
===== Arity&#039;s lack of easy opt-out =====&lt;br /&gt;
{{Important|Even if a consumer of an application utilizing the Arity SDK wanted to opt out, there was no way for them to do so.}}&lt;br /&gt;
Their privacy policy&amp;lt;ref&amp;gt;https://web.archive.org/web/20241217050443/https://arity.com/privacy/&amp;lt;/ref&amp;gt; makes no meaningful mention of how to opt-out of data collection. Their website only occasionally links to outside websites that will be of little help to someone looking to limit Arity&#039;s data collection, such as the Apple support center.&lt;br /&gt;
&lt;br /&gt;
===== Defendants worked to Integrate the Arity SDK into Mobile Apps =====&lt;br /&gt;
Ken Paxton&#039;s office, in this lawsuit, claim is made that Arity &amp;amp; Allstate paid partnered apps such as Routely, Life360, GasBuddy, and Fuel Rewards to integrate their SDK into the apps. The proof for this is not provided in the lawsuit documents. It can be inferred based on economic motives:&lt;br /&gt;
&lt;br /&gt;
# There is a large market for driving data that businesses are willing to pay for.&lt;br /&gt;
# App developers have an incentive to receive money from other businesses.&lt;br /&gt;
# Arity has an incentive to provide their SDK that collects driving data, given the market for driver data.&lt;br /&gt;
&lt;br /&gt;
Arity&#039;s website markets themselves to individuals &amp;amp; businesses that would want to utilize their driver data collection utilities within their applications, in a commercial tone.&amp;lt;ref&amp;gt;https://web.archive.org/web/20240716070042/https://arity.com/article/leveraging-a-telematics-sdk-for-mobile-apps/&amp;lt;/ref&amp;gt; That Arity was integrated into these mobile apps can be confirmed by case studies and PR statements made by Arity:&lt;br /&gt;
&lt;br /&gt;
# Arity has claimed that GasBuddy partnered with Arity to collect personal data from drivers.&amp;lt;ref&amp;gt;https://web.archive.org/web/20241213031839/https://www.prnewswire.com/news-releases/gasbuddy-partners-with-arity-to-bring-personalized-experiences-to-drivers-looking-to-save-even-more-money-on-fuel-301321800.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Arity has authored a case study regarding Life360&#039;s utilization of Arity&#039;s products.&amp;lt;ref&amp;gt;https://arity.com/wp-content/uploads/2023/09/arity_case-study_moapps_Life360.pdf&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[[:File:Arity case-study moapps Life360.pdf]]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Arity&#039;s claims about usage of data =====&lt;br /&gt;
The lawsuit claims that Arity&#039;s terms of service provides information on how your data will be used, which is taken below from Arity&#039;s privacy policy&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;https://web.archive.org/web/20241217050443/https://arity.com/privacy/&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Arity shares your information with its business clients as part of your purchase, or use, of services from those business clients. Those business clients include, but are not limited to, insurance companies as well as mobile app providers who track the location of members of a defined group or who provide weather related information. If you have purchased an insurance product offered by an Arity business client, then your information may also be used by that business client to calculate insurance rates or rewards provided under the product or service. Our insurance company business clients may also use your information to update their pricing and underwriting models. All such use of your personal information by our business clients is subject to their privacy policies and not this Privacy Statement.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Drivers not knowingly consenting to these terms =====&lt;br /&gt;
Arity&#039;s terms of service make the following claims, which customers have not consented to.&lt;br /&gt;
&lt;br /&gt;
====== &amp;quot;Arity shares your information with its business clients as part of your purchase, or use, of services from those business clients.&amp;quot;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; ======&lt;br /&gt;
This is troublesome as users who are having data collected by the Arity SDK might not be aware of or have consented to, such data sharing agreements. Imagine James is using an app that uses the Arity SDK:&lt;br /&gt;
&lt;br /&gt;
# James is using an application developed by an Arity business client.&lt;br /&gt;
# James does not know who Arity is.&lt;br /&gt;
# The business client has not told James how Arity uses his data.&lt;br /&gt;
# Therefore, there is no way James could have consented to Arity&#039;s privacy policy.&lt;br /&gt;
&lt;br /&gt;
====== &amp;quot;If you have purchased an insurance product offered by an Arity business client, then your information may also be used by that business client to calculate insurance rates or rewards provided under the product or service.&amp;quot;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; ======&lt;br /&gt;
{{Important|Arity&#039;s business clients are not always insurance companies. &#039;&#039;&#039;This means that Arity is claiming that your insurance rates might be raised due to data collected by someone who is not your insurance company.&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
If the application a user is running on their phone does not disclose that the information they are collecting on them may raise their insurance rates, that means they are being materially harmed by terms of a privacy policy they were never made aware of. This can be referred to as a game of [[Game of Telephone privacy policy|telephone privacy policy]].&lt;br /&gt;
&lt;br /&gt;
==== Claims without evidence ====&lt;br /&gt;
These claims are submitted without citations, or &#039;&#039;&amp;quot;on information and belief&amp;quot;&#039;&#039; - which is a way of saying that while the proof is not yet available, the attorney general expects to find it through the legal process of [[wikipedia:Discovery_(law)|discovery]].&lt;br /&gt;
&lt;br /&gt;
{{Important|[[Trust me bro|trust me bro]] cannot be trusted as a source of information when making sweeping claims about nearly all major automotive manufacturers.}}&lt;br /&gt;
&lt;br /&gt;
===== Arity purchased information from automakers to compliment their own data =====&lt;br /&gt;
[[File:Facebook screenshot of insurance app.png|alt=Facebook screenshot of insurance app|thumb|Facebook screenshot of insurance app]]&lt;br /&gt;
Arity&#039;s information collection was based on smartphone applications. Regardless of how accurate smartphone data collection is, this is an inaccurate way to judge the driving skills of an individual. For instance, if an individual is on a rollercoaster, they are not driving; but they may be judged as a poor driver for sudden turns and acceleration.&amp;lt;ref&amp;gt;https://www.cincinnati.com/story/entertainment/2024/10/08/insurance-cuts-driving-score-man-riding-the-beast-kings-island/75554987007/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.facebook.com/photo/?fbid=8578211025555918&amp;amp;set=gm.8485090164900182&amp;amp;idorvanity=121958981213384&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, no evidence is provided for sales of data from automakers to Arity.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;To potentially account for the Arity SDK Data&#039;s limitations, Defendants sought to combine the SDK Data with data collected directly from vehicles. As a result, Defendants began purchasing consumers&#039; driving-related data from car manufacturers, such as Toyota, Lexus, Mazda, Chrysler, Dodge, Fiat, Jeep, Maserati, and Ram. On information and belief, consumers did not consent, nor were otherwise aware that, Defendants purchased their driving-related data from these car manufacturers&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Arity&#039;s bonus incentives to developers for bundling data collection into their apps =====&lt;br /&gt;
The suit claims &amp;lt;blockquote&amp;gt;&amp;quot;To encourage developers to adopt Defendants&#039; software, Defendants paid app developers millions of dollars to integrate Defendants&#039; software into their apps. Defendants further incentivized developer participation by creating generous bonus incentives for increasing the size of their dataset.&amp;quot;&amp;lt;/blockquote&amp;gt;However, no citations or evidence are provided.&lt;br /&gt;
&lt;br /&gt;
{{Important| There is no evidence that Arity was paying developers to integrate their SDK into their apps present in this suit. One can infer economic incentives for Arity&#039;s alleged behavior; if driver data is in high demand, Arity could sell driver data to their partners for more money than the incentives offered to app developers to implement their data-collection-SDK. &#039;&#039;&#039;However, there is no evidence presented in the suit.&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
===== Automakers who sold data =====&lt;br /&gt;
The automakers that were accused of selling driver data to the defendant Arity were Toyota, Lexus, Mazda, Chrysler, Dodge, Fiat, Jeep, Maserati, and Ram; evidence was not presented for these. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Lawsuits]]&lt;br /&gt;
[[Category:Privacy]]&lt;br /&gt;
[[Category:Data Collection]]&lt;br /&gt;
[[Category:Allstate subsidiaries]]&lt;/div&gt;</summary>
		<author><name>JP</name></author>
	</entry>
</feed>