Proprietary
Proprietary software is computer programs that are owned by an individual or a company. This means that the creators control how the software is used, distributed, and modified.
Proprietary software is extremely widespread. Enterprise software alone has generated $785bn in revenue in 20231.
As proprietary software is built into the hardware we buy and the services we subscribe to, most people end up using proprietary software for work, communication, entertainment, and everyday tasks.
What does "proprietary" mean in itself?
- The source code is kept secret and protected by copyright. Without the actual instructions that tell you how the software works, it boils down to a black box and trusting the developer.
- The license agreement (that long thing you click "I agree" to) dictates what you can do. You're usually granted a right to use the software, not ownership.
- You never "own" the software.
Why can it be a problem?
The way proprietary software is structured create issues:2
- Other developers can't build on top of the source code. They can't fix bugs, add new features, or create alternative solutions.
- It gives you a false sense of security: a developer can claim to use encryption or hashing functions, even if it is not really the case.
Frustration
It is so frustrating for users to be dependent on a single company or developer for their software needs. If something goes wrong, there is no one else you can turn to. If a feature is missing, you can at best report to their "feedback" section and hope for the best. Meanwhile, free software can be forked freely, redistributed and improved by other developers. If a feature is missing, you can add it yourself, or even hire someone if you lack the skills (which is better than throwing money at a company).
But also:
📄️ Data collection
Data collection is the process by which companies gather information about individuals, often without their full knowledge or explicit consent. This information can range from basic demographics to browsing history or even biometric data.
📄️ Backdoor
A backdoor in software is a hidden entry point that allows unauthorized access to a system or program. It's essentially a secret way to bypass normal security measures and gain control.
📄️ Bloat
Software bloat refers to the inclusion of unnecessary features, applications, or advertisements in a software program or operating system, which can make it larger and more complex than needed. This often happens with preinstalled apps that come with devices, many of which users may never use. Additionally, ads embedded within the operating system can take up valuable space and resources.
📄️ Dark pattern
A dark pattern is a design technique used in websites or apps that tricks users into doing things they might not want to do. These patterns are often sneaky and manipulative, making it difficult for users to make informed choices.
📄️ DRM
Digital Rights Management (DRM) systems use a combination of encryption, digital signatures, and access control mechanisms to "protect" copyrighted content.
📄️ Obfuscation
Obfuscation refers to the practice of making something unclear or difficult to understand. In the context of software, it usually means taking code and transforming it in such a way that it becomes hard for people to read or understand, even though it still works the same way.
📄️ Obscurity
Security by obscurity is a defensive strategy that relies on keeping a system's inner workings secret rather than hard-to-break cryptography or robust architecture. The idea is that if an attacker doesn't know how the system works, they won't be able to compromise it.
📄️ Planned obsolescence
Planned obsolescence is when a company designs a product so it becomes outdated, less useful, or stops working after a limited time, encouraging people to buy a replacement sooner than necessary. This can happen through using cheaper parts that wear out faster, making repairs difficult or impossible, or limiting software updates so older devices lose features. The result is higher costs for consumers and more waste for the environment. Alternatives include making products more durable, designing them for easy repair, and providing longer software support.
📄️ Vendor lock-in
Vendor lock-in (also known as walled gardens) refers to a situation where a customer becomes dependent on a specific vendor for products and services, making it difficult to switch to another vendor without incurring significant costs or inconvenience.
Most people and companies alike rely on proprietary software because myths about the benefits of closed-source development have become widespread, leading many to believe that only proprietary solutions can provide better services.
All the lies they tell are better to swallow with excessive marketing.