Software locks: Difference between revisions
m Added a relevant category. |
Added archive URLs for 2 citation(s) using CRWCitationBot |
||
| Line 1: | Line 1: | ||
{{StubNotice}} | {{StubNotice}} | ||
Software locks are security measures used to control access and features in consumer electronic hardware and software.<ref>https://en.wikipedia.org/wiki/Lock_(computer_science)</ref><ref>https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software</ref><sup>These are Wikipedia citations!</sup> Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused. | Software locks are security measures used to control access and features in consumer electronic hardware and software.<ref>https://en.wikipedia.org/wiki/Lock_(computer_science) ([http://web.archive.org/web/20260131030629/https://en.wikipedia.org/wiki/Lock_(computer_science) Archived])</ref><ref>https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software ([http://web.archive.org/web/20260116162909/https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software Archived])</ref><sup>These are Wikipedia citations!</sup> Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused. | ||
==Noteworthy bad practice examples== | ==Noteworthy bad practice examples== | ||
Revision as of 07:44, 23 February 2026
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
Software locks are security measures used to control access and features in consumer electronic hardware and software.[1][2]These are Wikipedia citations! Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused.
Noteworthy bad practice examples
Anti Interoperability
See also: Proprietary protocols wip stub example you can't use our competitors Bluetooth headset with our XYZ operating system because we invented a our own new proprietary XYZ Bluetooth audio codec and that product doesn't support it.
real example apple mfi certifications on charging and data transfer accessories
apple's history of anti-Interoperability
Account-required products
Mobile phones
ref Small preamble focused on how mobile phones require an account in order to be used, reference Google Pixels and specific Android devices requiring a Google account, and iPhones needing an Apple account.
In appliances
HVAC app activation of furnace control boards (also an example of forced app download (editors note hard to find credible ref this is a thing with ruud furnace control boards) )
Binding hardware features to non-transferable user accounts / activation & licensing locks
-wip
Server connectivity reliance
Also see: Subscription service, Digital rights management
-wip
Further reading
Walled garden / Software Ecosystem