Deceptive language frequently used against consumers: Difference between revisions

JodyBruchonFan (talk | contribs)
Created page with "'''False benevolence''', also known as '''the "we're just protecting you" excuse''', '''the "it's for your best" excuse''', etc., is a tactic corporations often use to excuse eroding freedoms. This is done using pleasent-sounding words such as "protection" and "safety". It is the same kind of "protection" one gets from disconnecting the Internet. It indeed is safer never to connect to the Internet, but it comes with losing access to a highly useful resource. These "prot..."
 
Rudxain (talk | contribs)
m add Main for APK restrictions
 
(35 intermediate revisions by 12 users not shown)
Line 1: Line 1:
'''False benevolence''', also known as '''the "we're just protecting you" excuse''', '''the "it's for your best" excuse''', etc., is a tactic corporations often use to excuse eroding freedoms.
{{Incomplete|Issue 1=Tone issues}}
Deceptive language used by companies to impede the rights of consumers while appearing benevolent comes in many forms. Many of them can be boiled down to a few principles.


This is done using pleasent-sounding words such as "protection" and "safety". It is the same kind of "protection" one gets from disconnecting the Internet. It indeed is safer never to connect to the Internet, but it comes with losing access to a highly useful resource. These "protections" resemble a muzzle, not a shield.
=="For the safety of the consumer"==
This is one of the most cited reasons to restrict what a consumer is allowed to do with their property. It is used to fight against right-to-repair legislation, restrict downloading of apps unless provided by Google or Apple, etc. Some notable incidents include:


== Examples ==
===Google comparing APK restrictions to airport security===
=== Google restricting APK installation ===
{{Main|Google Android restrict app sideloading}}
For many years, one of the primary selling points of Android smartphones was that no big corporation could gatekeep what the user can run on their phones. But starting with Android 17 in 2026, only developers manually approved by Google can create APKs that install on Android.
For many years, one of the primary selling points of Android smartphones was that no big corporation could gatekeep what the user can run on their phones. But starting with Android 17 in 2026, only developers manually approved by Google can create APKs that install on Android.


Developers applying for approval are required to violate their privacy by disclosing their real-life identity to Google.
Developers applying for approval are required to disclose their real-life identity to Google.


Google used false benevolence to excuse this change:
Google justified this restriction by stating:<ref>{{Cite web |last=Temelkov |first=Ilia |date=2025-08-25 |title=Google will make sideloading apps way more difficult from next year |url=https://www.phonearena.com/news/Google-will-make-sideloading-apps-way-more-difficult-from-next-year_id173542 |access-date=2025-10-01 |website=PhoneArea |url-status=live |archive-url=http://web.archive.org/web/20251115170744/https://www.phonearena.com/news/Google-will-make-sideloading-apps-way-more-difficult-from-next-year_id173542 |archive-date=15 Nov 2025}}</ref>


<blockquote>
<blockquote>
Google says you should think of the new requirements like checking IDs at the airport.
Google says you should think of the new requirements like checking IDs at the airport.
</blockquote>Critics argued the comparison was misleading, noting that airlines own their aircraft, while consumers own their smartphones. <ref>{{Cite web |last=Sohn |first=Jiyoung |date=2026-03-23 |title=Ads Are Popping Up on the Fridge and It Isn’t Going Over Well |url=https://www.wsj.com/lifestyle/samsung-refrigerator-ads-lg-whirlpool-ge-10ea7bcc |url-status=live |archive-url=https://web.archive.org/web/20260326132248/https://www.wsj.com/lifestyle/samsung-refrigerator-ads-lg-whirlpool-ge-10ea7bcc |archive-date=2026-03-23 |access-date=2026-04-09 |website=The Wall Street Journal}}</ref>
===Storage access restrictions in Android===
From [https://archive.today/2025.08.08-192814/http://web.archive.org/web/20250621212750/https://source.android.com/docs/core/storage/traditional source.android.com]:
<blockquote>
Third-party apps must go through the Storage Access Framework to interact with files on portable storage; direct access is explicitly blocked for privacy and security reasons.
</blockquote>
</blockquote>
<ref>[https://www.phonearena.com/news/Google-will-make-sideloading-apps-way-more-difficult-from-next-year_id173542 Google will make sideloading apps way more difficult from next year - PhoneArena]</ref>


This is a poor comparison because the airplane is the property of the airline while your smartphone is your property as the person who paid for it. What Google is doing is closer to them putting an airport security station at your doorstep.
In practice, Storage Access Framework's main restriction is preventing apps from accessing the root directory of external storage.


=== Storage access restrictions in Android ===
Storage Access Framework is no replacement for legacy storage access given its slowness from its large processing overhead. The performance loss may be concealed to some extent from the fast hardware smartphones have nowadays, but even then, it increases battery usage. In addition, it breached compatibility with all apps previously developed over the span of several years.<ref name="SAF">[https://www.xda-developers.com/android-q-storage-access-framework-scoped-storage/ The Storage Access Framework is the only way for apps to work with all your files in Android Q. And it's terrible.] - XDA developers ([https://web.archive.org/web/20260222042955/https://www.xda-developers.com/android-q-storage-access-framework-scoped-storage/ Archived])</ref><ref name=":0">{{Cite web |date=14 Apr 2017 |title=Horrible access storage framework performance |url=https://old.reddit.com/r/androiddev/comments/65dn8x/horrible_access_storage_framework_performance/ |archive-url=https://web.archive.org/web/20250823190730/https://old.reddit.com/r/androiddev/comments/65dn8x/horrible_access_storage_framework_performance/ |archive-date=23 Aug 2025 |website=[[Reddit]] - r/androiddev}}</ref>
From [https://archive.today/2025.08.08-192814/http://web.archive.org/web/20250621212750/https://source.android.com/docs/core/storage/traditional source.android.com]:
 
===Non-replaceable batteries since the Samsung Galaxy S6===
Justin Denison, Samsung's public relations person, said:<ref name=":1">[https://www.youtube.com/watch?v=U8mfEud8n4c&t=1650s Samsung Galaxy Unpacked 2015 - Livestream (Replay] ([https://preservetube.com/watch?v=U8mfEud8n4c Archived])</ref>
 
<blockquote>We refused to do this for some time. That's because we didn't want to have a built-in battery, until we were absolutely sure that users would feel confident about charging their phones. </blockquote>
===OnePlus "encrypted" batteries===
The OnePlus Pad has a serialized battery, meaning the device detects repairs not approved by OnePlus, which can result in functionality being disabled. This is an anti-repair practice first seen on Apple iPhone 11.
 
OnePlus used the term "encryption" to describe this battery serialization. Critics noted that "encryption" carries positive associations unrelated to its use here, and that the term obscures the restriction's effect on independent repair.<ref>{{Cite web |last=Rossmann |first=Louis |date=2023-02-08 |title=Oneplus' tablet uses an encrypted battery; how's that for repairability? |url=https://www.youtube.com/watch?v=UgtFSHCGNIk |access-date=2025-10-01 |website=YouTube |type=Video |url-status=live |archive-url=https://preservetube.com/watch?v=UgtFSHCGNIk |archive-date=16 Feb 2026}}</ref><ref>{{Cite news |last=Amadeo |first=Ron |date=2023-02-07 |title=OnePlus takes on the iPad with the OnePlus Pad |url=https://arstechnica.com/gadgets/2023/02/oneplus-takes-on-the-ipad-with-the-oneplus-pad/ |access-date=2025-10-01 |work=Ars Technica |url-status=live |archive-url=http://web.archive.org/web/20251118200050/https://arstechnica.com/gadgets/2023/02/oneplus-takes-on-the-ipad-with-the-oneplus-pad/ |archive-date=18 Nov 2025}}</ref>
 
==="Web Environment Integrity API" by Google===
Google proposed the Web Environment Integrity API, which critics described as a form of [[Digital rights management|DRM]] for the web.<ref>[https://www.youtube.com/watch?v=0i0Ho-x7s_U Google's trying to DRM the internet, and we have to make sure they fail] - Louis Rossmann ([https://www.brighteon.com/1f4125e9-f0cd-46a3-bf38-0ff22881c0f9 Brighteon mirror], [https://old.bitchute.com/video/Jl7ze8KjhWvK/ BitChute mirror]) ([https://preservetube.com/watch?v=0i0Ho-x7s_U Archived])</ref><ref>{{Cite web |last=Bruchon |first=Jody |date=2023-07-22 |title=Web Environment Integrity Must Be Stopped: Enslavement By "Remote Attestation" |url=https://www.jodybruchon.com/2023/07/22/web-environment-integrity-must-be-stopped-enslavement-by-remote-attestation/ |access-date=2025-10-01 |website=jodybruchon.com |url-status=live |archive-url=http://web.archive.org/web/20251201031758/https://www.jodybruchon.com/2023/07/22/web-environment-integrity-must-be-stopped-enslavement-by-remote-attestation/ |archive-date=1 Dec 2025}}</ref>
 
=="Think of the children"==
This is typically used as an excuse for mass-surveilance.
 
==="Age verification"===
{{Main|Age verification}}
 
===Chat Control===
{{Main|Chat Control}}
 
=="To enhance our services"==
 
===Samsung "offers additional content" by advertising on refrigerators===
This is an update message shown on a Samsung refrigerator:
 
[[File:Samsung-refrigerator-ads-update-changelog-scaled.jpg|center|320px]]
 
<blockquote>
To enhance our service and offer additional content to users, advertisements will be displayed [...]
</blockquote>
 
The update introduced advertisements on the refrigerator's display. Critics noted the contrast between the language used and the nature of the change.<ref name=":1" />
 
=="To streamline the experience"==
===Fewer ports on modern laptops===
In the 2000s and early 2010s, three or four USB ports built into laptops were not uncommon. Modern laptops in contrast usually feature one or two USB-A ports and might feature an USB-C port, in addition to less modular and less upgradeable parts. Critics have argued that fewer built-in ports force users to carry additional hubs and adapters, offsetting any portability gains from thinner designs.<ref>{{Cite web |author=Victor |date=2022-11-24 |title=Why are so many laptops having less ports? |url=https://www.easydongle.com/why-do-new-laptops-have-less-ports/ |url-status=dead |archive-url=http://web.archive.org/web/20251118151642/https://www.easydongle.com/why-do-new-laptops-have-less-ports/ |archive-date=18 Nov 2025|access-date=2025-10-02 |website=easydongle.com}} </ref>
 
===Google wants to help cleaning up MicroSD cards by denying normal write access===
MicroSD cards became a major selling point of Android smartphones compared to iPhones, allowing the expansion of the storage capacity by multiple times at a time where smartphone internal storage capacities were only in the double-digit gigabytes. In addition, MicroSD cards make it easy to rescue data from a broken smartphone and to get immediate free storage within minutes without hour-long file transfers.
 
In Android 4.4 KitKat, Google revoked normal write access to the MicroSD card through applications installed by the user, with the exception of folders dedicated to each app at "<code>Android/data/(package name)</code>". The write access could not be restored through a setting in the menu, only through rooting.
 
Google's argument was to ensure no app can leave files behind after uninstallation:  


<blockquote>
<blockquote>
Third-party apps must go through the Storage Access Framework to interact with files on portable storage; direct access is explicitly blocked for privacy and security reasons.  
The WRITE_EXTERNAL_STORAGE permission must only grant write access to the primary external storage on a device. Apps must not be allowed to write to secondary external storage devices, except in their package-specific directories as allowed by synthesized permissions. Restricting writes in this way ensures the system can clean up files when applications are uninstalled.  
</blockquote>
</blockquote>


The only "protection" storage access framework actually gives you is that it prevents you from granting access to the root directory of the external storage (not to be confused with "root access" which gives you superuser privileges). So an imaginary app that does "bad stuff" can still do it inside the directory you picked.


These restrictions prevent legitimate apps such as file managers from functioning properly. If the user does not trust an app with access to the entire USB stick or SD card, perhaps one should not use that app at all. At the very least, users should have been given the option to grant exceptions to apps which use this access for legitimate purposes, such as file managers.
Google restored write access in Android 5.0 through the Storage Access Framework. However, the framework introduces processing overhead that reduces speeds, particularly when handling large numbers of files.<ref name="SAF" /><ref name=":0" />


Google has a conflict of interest as a provider of cloud storage. Imagine SanDisk owned Android and blocked Google Drive. Everyone would recognize the obvious conflict of interest. And when Android restrictions break applications like file managers, end users complain to the app developers even though it is not their fault. So these restrictions also caused headaches to innocent app developers.
==References==
{{Reflist}}


== References ==
[[Category:Anti-consumer practices]]
<references />