Jump to content

Software locks: Difference between revisions

From Consumer Rights Wiki
HeavenPiercerYama (talk | contribs)
m Fixed a grammar error and reworded a bit
JP (talk | contribs)
m Improve summary
 
Line 1: Line 1:
{{StubNotice}}
{{StubNotice}}


Software locks are security measures used to control access & features in consumer electronic hardware & software. <ref>https://en.wikipedia.org/wiki/Lock_(computer_science)</ref> <ref>https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software</ref> Software locks by themselves are not considered bad practice and are necessary for basic cyber security and operation of most hardware, however, abuse of them will be recorded in the following sections.       
Software locks are security measures used to control access and features in consumer electronic hardware and software. <ref>https://en.wikipedia.org/wiki/Lock_(computer_science)</ref><ref>https://en.wikipedia.org/wiki/Comparison_of_open-source_and_closed-source_software</ref> Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused.       


==Noteworthy bad practice examples==
==Noteworthy bad practice examples==

Latest revision as of 17:10, 21 June 2025

Article Status Notice: This Article is a stub


This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼

Software locks are security measures used to control access and features in consumer electronic hardware and software. [1][2] Software locks are not considered bad practice and are necessary for basic cybersecurity and operation of most hardware, though they can be abused.

Noteworthy bad practice examples[edit | edit source]

Anti Interoperability[edit | edit source]

Also see: Proprietary protocols, Anti Interoperability, Hardware Anti Interoperability[3]

wip stub example you can't use our competitors Bluetooth headset with our XYZ operating system because we invented a our own new proprietary XYZ Bluetooth audio codec and that product doesn't support it.

real example apple mfi certifications on charging and data transfer accessories

apple's history of anti-Interoperability

Account-required products[edit | edit source]

Mobile phones[edit | edit source]

ref Small preamble focused on how mobile phones require an account in order to be used, reference Google Pixels and specific Android devices requiring a Google account, and iPhones needing an Apple account.

in appliances[edit | edit source]

hvac app activation of furnace control boards (also an example of Forced app download (editors note hard to find credible ref this is a thing with ruud furnace control boards) )

Binding hardware features to non-transferable user accounts / activation & licensing locks[edit | edit source]

-wip

Server connectivity reliance[edit | edit source]

Also see: Subscription service, Digital rights management

-wip

Further reading / also see[edit | edit source]

DRM (digital right managment)

Proprietary Software

Walled garden / Software Ecosystem

Bootloader unlocking

Proprietary firmware