www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 15 Feb 2020 10:02:48 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/02/15 10:02:47

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.es.po malware-cars.fr.po 
                         malware-cars.pot malware-cars.ru.po 
                         malware-games.de-diff.html malware-games.de.po 
                         malware-games.es.po malware-games.fr.po 
                         malware-games.ja-diff.html malware-games.ja.po 
                         malware-games.pot malware-games.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-addictions.es.po 
                         proprietary-addictions.fr.po 
                         proprietary-addictions.pot 
                         proprietary-addictions.ru.po 
                         proprietary-deception.de-diff.html 
                         proprietary-deception.de.po 
                         proprietary-deception.es.po 
                         proprietary-deception.fr.po 
                         proprietary-deception.ja-diff.html 
                         proprietary-deception.ja.po 
                         proprietary-deception.pot 
                         proprietary-deception.ru.po 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.es.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.490&r2=1.491
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.584&r2=1.585
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.371&r2=1.372
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.168&r2=1.169

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- de.po       6 Feb 2020 16:32:24 -0000       1.168
+++ de.po       15 Feb 2020 15:02:45 -0000      1.169
@@ -4487,6 +4487,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -5001,11 +5010,11 @@
 "\">Automotive Security And Privacy Center</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019+} Free Software
-# | Foundation, Inc.
+# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019, 2020+} Free
+# | Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5102,6 +5111,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -5114,8 +5131,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -5566,6 +5584,15 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -6352,14 +6379,6 @@
 "‚cracken‘</i>). Glücklicherweise sind die meisten Android-Geräte keine "
 "Tyrannen."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019, 2020+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -7784,6 +7803,10 @@
 msgid "Types of malware in mobiles"
 msgstr "Art der Schadsoftware"
 
+#. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
 #. type: Content of: <div><ul><li><p>
 # | See above for the <a [-href=\"#universal-back-door\">general-]
 # | {+href=\"#universal-back-door-phone-modem\">general+} universal back
@@ -7948,6 +7971,26 @@
 "Varianten des proprietären Betriebssystems Android enthalten eine 
Hintertür</"
 "a>, die den Fernzugriff auf die im Gerät gespeicherten Daten ermöglicht."
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -8304,6 +8347,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -9885,6 +9938,14 @@
 "Privacy Killer, unter: imasuper.com 2008.\">Besucher von Internetpräsenzen "
 "mittels Flash-Cookie zu verfolgen</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Potential Malware - GNU Project - Free Software Foundation"
 msgstr "Potenzielle Schadsoftware - GNU-Projekt - Free Software Foundation"
@@ -10171,11 +10232,12 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-6-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2018-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
 #, fuzzy
-#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 201<ins>3</ins>-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -10811,6 +10873,17 @@
 "sie im Klartext an einen Dritt-Server</a>, bewarb sich selbst auf deren Feed "
 "und veröffentlichte Bilder ohne deren Zustimmung."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11027,6 +11100,13 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 201[-6-]{+9+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Insecurity-] {+Incompatibility+} - GNU Project - Free
 # | Software Foundation
@@ -12280,6 +12360,18 @@
 "computerworld.com 2013.\">bestand Oracle darauf, diese Praxis fortzusetzen</"
 "a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2015-2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Abonnements - GNU-Projekt - Free Software Foundation"
@@ -13383,17 +13475,6 @@
 "Insbesondere können so E-Mails von Parlamentarier gesammelt werden, da diese 
"
 "sie über Microsoft durchschleusen."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Haltestricke - GNU-Projekt - Free Software Foundation"
@@ -15032,9 +15113,6 @@
 #~ "Vorschläge können an <a href=\"mailto:address@hidden\";>&lt;"
 #~ "address@hidden&gt;</a> gesendet werden."
 
-#~ msgid "<a href=\"#deception\">Deception</a>"
-#~ msgstr "<a href=\"#deception\">Täuschung</a>"
-
 #~ msgid "Apple Deception"
 #~ msgstr "Täuschung"
 

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- es.po       6 Feb 2020 16:32:24 -0000       1.239
+++ es.po       15 Feb 2020 15:02:45 -0000      1.240
@@ -4029,6 +4029,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -4474,13 +4483,12 @@
 "Center</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016,-] 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
 #, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Malware in [-Mobile Devices-] {+Games+} - GNU Project - Free Software
@@ -4646,6 +4654,14 @@
 "varias de estas técnicas."
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 # | The {+developers of gratis mobile games apply the techniques described
 # | above to <a
 # | href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\";>
@@ -4679,19 +4695,22 @@
 "incrementar la adictividad de sus juegos."
 
 #. type: Content of: <div><ul><li><p>
-# | [-Unfortunately, the-]{+<small>(Unfortunately, this+} article uses
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
 # | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
-# | &ldquo;gratis&rdquo; [-instead.-] {+instead.)</small>+}
+# | &ldquo;gratis&rdquo; instead.)</small>
 #, fuzzy
 #| msgid ""
-#| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
-#| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
-"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
-"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+"<small>(Desafortunadamente, el artículo utiliza el término «<cite>free</"
+"cite>» para significar «precio cero». Recomendamos en su lugar decir "
+"«gratis».)</small>"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -5231,6 +5250,16 @@
 "buena parte de los datos personales</a>, incluso muchas actividades que no "
 "tienen nada que ver con las trampas."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -6106,14 +6135,6 @@
 "restricción). Afortunadamente, la mayoría de los dispositivos Android no 
son "
 "tiranos."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2017, 2018, [-2019-] {+2019, 2020+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -7397,6 +7418,10 @@
 msgid "Types of malware in mobiles"
 msgstr "Tipo de <cite>malware</cite>"
 
+#. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
 #. type: Content of: <div><ul><li><p>
 # | See above for the <a [-href=\"#universal-back-door\">general-]
 # | {+href=\"#universal-back-door-phone-modem\">general+} universal back
@@ -7569,6 +7594,26 @@
 "ejecutan versiones privativas de Android cuentan con una puerta trasera</a> "
 "que permite el acceso remoto a los archivos almacenados en el dispositivo."
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -7931,6 +7976,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -9514,6 +9569,15 @@
 "privacy-killer/\"><cite>cookies</cite> de Flash Player ayudan a los sitios "
 "web a rastrear a los visitantes</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016,-] 2017, [-2018-] {+2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Potential Malware+} - GNU Project - Free
 # | Software Foundation
@@ -9908,11 +9972,12 @@
 msgstr "Ejemplos de software adictivo"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2011, 2012-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
 #, fuzzy
-#| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Proprietary [-Jails-] {+Back Doors+} - GNU Project - Free Software
@@ -10584,6 +10649,19 @@
 "para hacerse publicidad en la fuente de noticias y publicar imágenes de los "
 "usuarios sin su consentimiento."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Jails-] {+DRM+} - GNU Project - Free Software Foundation
 #, fuzzy
@@ -10803,6 +10881,13 @@
 "what/\">tenía como objetivo hacer que los niños gastaran</a> grandes "
 "cantidades del dinero de sus padres sin su conocimiento."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 201[-4-]{+9+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Jails-] {+Incompatibility+} - GNU Project - Free Software
 # | Foundation
@@ -11943,6 +12028,20 @@
 "continue-to-bundle--crapware--with-java.html\">Oracle insistió en continuar "
 "con esta práctica</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -13045,19 +13144,6 @@
 "Específicamente, eso le permite recoger los correos de los miembros del "
 "Parlamento, porque pasan a través de Microsoft."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -13503,6 +13589,18 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero "
+#~| "price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
+#~ msgid ""
+#~ "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#~ "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#~ "instead.)</small>"
+#~ msgstr ""
+#~ "Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
"
+#~ "para significar «precio cero». Recomendamos en su lugar decir: 
«gratis»."
+
 #~ msgid ""
 #~ "Motorola, then owned by Google, made <a href=\"http://blog.";
 #~ "azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html\"> Android "
@@ -15078,9 +15176,6 @@
 #~ "y proponer otras correcciones o sugerencias, diríjase a <a href=\"mailto:";
 #~ "address@hidden\">&lt;address@hidden&gt;</a>."
 
-#~ msgid "<a href=\"#deception\">Deception</a>"
-#~ msgstr "<a href=\"#deception\">Trampas</a>"
-
 #~ msgid "Apple Deception"
 #~ msgstr "Trampas de Apple"
 

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- fr.po       7 Feb 2020 09:02:31 -0000       1.293
+++ fr.po       15 Feb 2020 15:02:45 -0000      1.294
@@ -3609,6 +3609,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -4048,8 +4057,8 @@
 "Privacy Center</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -4163,6 +4172,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -4182,9 +4199,18 @@
 "d'utilisateurs pour augmenter le pouvoir addictif de leurs jeux."
 
 #. type: Content of: <div><ul><li><p>
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Malheureusement, cet article utilise le mot <cite>free</cite> dans "
 "le sens de « gratuit ». Nous vous recommandons de dire plutôt 
<cite>gratis</"
@@ -4647,6 +4673,16 @@
 "grand nombre correspondent à des activités n'ayant rien à voir avec la "
 "triche."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -5346,10 +5382,6 @@
 "\">des téléphones Android qui sont des tyrans</a> (bien que quelqu'un ait "
 "trouvé moyen de briser ces restrictions)."
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -6475,6 +6507,14 @@
 msgid "Types of malware in mobiles"
 msgstr "Types de malveillance dans les mobiles"
 
+#. type: Content of: <div><div><ul><li>
+# | <a [-href=\"#manipulation\">Manipulation</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#manipulation\">Manipulation</a>"
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "See above for the <a href=\"#universal-back-door-phone-modem\">general "
@@ -6614,6 +6654,26 @@
 "versions privatrices d'Android sont livrés avec une porte dérobée</a> qui "
 "permet l'accès à distance aux fichiers stockés dans l'appareil."
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -6948,6 +7008,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -8404,6 +8474,10 @@
 "privacy-killer/\">Un cookie du lecteur Flash aide les sites web à suivre les 
"
 "visiteurs à la trace</a>)."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Potential Malware - GNU Project - Free Software Foundation"
 msgstr "Malveillance potentielle - Projet GNU - Free Software Foundation"
@@ -8748,8 +8822,12 @@
 msgstr "Exemples de logiciels addictifs"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2011, 2012-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -9313,6 +9391,12 @@
 "servait pour faire sa propre publicité sur leur flux et mettre des photos en 
"
 "ligne sans leur consentement."
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
 msgstr "DRM du logiciel privateur - Projet GNU - Free Software Foundation"
@@ -9485,6 +9569,10 @@
 "what/\">avait pour but d'inciter les enfants à dépenser</a> de grosses "
 "sommes sur le compte de leurs parents sans leur donner d'explication."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Incompatibility - GNU Project - Free Software Foundation"
 msgstr ""
@@ -10434,6 +10522,18 @@
 "continue-to-bundle--crapware--with-java.html\">Oracle a perpétué cette "
 "pratique</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2015-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr "Abonnements privateurs - Projet GNU - Free Software Foundation"
@@ -11381,12 +11481,6 @@
 "En particulier, il peut récupérer les courriels des membres du Parlement 
par "
 "ce moyen, car ils l'envoient par l'intermédiaire de Microsoft."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr "Ancrage privateur - Projet GNU - Free Software Foundation"
@@ -11663,3 +11757,12 @@
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid ""
+#~ "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#~ "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#~ "instead.)</small>"
+#~ msgstr ""
+#~ "<small>(Malheureusement, cet article utilise le mot <cite>free</cite> "
+#~ "dans le sens de « gratuit ». Nous vous recommandons de dire plutôt "
+#~ "<cite>gratis</cite>.)</small>"

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- it.po       6 Feb 2020 16:32:25 -0000       1.168
+++ it.po       15 Feb 2020 15:02:45 -0000      1.169
@@ -4246,6 +4246,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -4703,12 +4712,12 @@
 "faq.html\">Ulteriori informazioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4814,6 +4823,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -4826,8 +4843,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -5252,6 +5270,16 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -6011,15 +6039,6 @@
 "qualcuno ha trovato un modo per aggirare la limitazione). Fortunatamente, la "
 "maggior parte dei dispositivi Android non sono tiranni."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -7367,6 +7386,10 @@
 msgid "Types of malware in mobiles"
 msgstr "Tipo&nbsp;di malware"
 
+#. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
 #. type: Content of: <div><ul><li><p>
 # | [-This is separate from-]{+See above for the+} <a
 # | [-href=\"#universal-back-door-phone-modem\">the-]
@@ -7535,6 +7558,26 @@
 "Galaxy che eseguono versioni proprietarie di Android hanno annessa una "
 "backdoor</a> che fornisce accesso remoto ai file contenuti nel dispositivo."
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -7868,6 +7911,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -9295,6 +9348,15 @@
 "privacy-killer/\">I cookie del Flash Player permettono ai siti web di "
 "tracciare i visitatori</a>."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Potential Malware+} - GNU Project - Free
 # | Software Foundation
@@ -9551,11 +9613,12 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-5-]{+9+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2017-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
 #, fuzzy
-#| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -10175,6 +10238,17 @@
 "posting images without their consent."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
 msgstr "DRM Proprietario - Progetto GNU - Free Software Foundation"
@@ -10370,6 +10444,13 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 201[-5-]{+9+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Insecurity-] {+Incompatibility+} - GNU Project - Free
 # | Software Foundation
@@ -11555,6 +11636,19 @@
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 "\">ha continuato a perpetrare questa pratica.</a>"
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Insecurity-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -12663,17 +12757,6 @@
 "Nello specifico può raccogliere i messaggi di posta elettronica dei membri "
 "del Parlamento, dato che passano attraverso Microsoft."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -13937,9 +14020,6 @@
 #~ "pagine web a <a href=\"mailto:address@hidden\";>&lt;webmasters@gnu."
 #~ "org&gt;</a>."
 
-#~ msgid "<a href=\"#deception\">Deception</a>"
-#~ msgstr "<a href=\"#deception\">Inganni</a>"
-
 #~ msgid "Apple Deception"
 #~ msgstr "Inganni di Apple"
 

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- ja.po       6 Feb 2020 16:32:26 -0000       1.176
+++ ja.po       15 Feb 2020 15:02:45 -0000      1.177
@@ -3177,6 +3177,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -3548,7 +3557,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3644,6 +3653,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -3656,8 +3673,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -4017,6 +4035,13 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -4602,12 +4627,6 @@
 "制限を破壊する方法をみつけだ
しましたが)。幸いなことに、多くのアンドロイドのデ"
 "バイスは暴君ではありません。"
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -5648,6 +5667,12 @@
 msgid "Types of malware in mobiles"
 msgstr "マルウェアのタイプ"
 
+#. type: Content of: <div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#back-doors\">Back doors</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#back-doors\">バックドア</a>"
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "See above for the <a href=\"#universal-back-door-phone-modem\">general "
@@ -5767,6 +5792,26 @@
 
"アンドロイドのバージョンを実行し、バックドアが付いており</a>、デバイスに保存"
 "されたデータの遠隔からのアクセスを提供します。"
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -6016,6 +6061,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -7108,6 +7163,12 @@
 "flash-cookies-the-silent-privacy-killer/\">クッキーの機能は訪問者
をウェブサイ"
 "トが追跡するのを手助けします</a>。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Potential Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7349,9 +7410,9 @@
 
 #. type: Content of: <div><p>
 #, fuzzy
-#| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -7860,6 +7921,15 @@
 "stole-instagram-passwords\">ユーザの資æ 
¼(パスワード)を盗用し</a>、アプリ自身"
 
"をユーザのフィードに広告し、同意なしに画像を投稿するのです。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
 msgstr ""
@@ -8026,6 +8096,12 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Incompatibility - GNU Project - Free Software Foundation"
 msgstr ""
@@ -8928,6 +9004,15 @@
 "continue-to-bundle--crapware--with-java.html\">オラクルはこのæ…
£ç¿’を続けること"
 "を主張しています。</a>"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9885,15 +9970,6 @@
 "å…
·ä½“的には、メールがマイクロソフトを経由するので、この方法で議員のメンバの"
 "メールを集められます。"
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr ""

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-cars.de-diff.html   18 Nov 2019 15:05:16 -0000      1.33
+++ malware-cars.de-diff.html   15 Feb 2020 15:02:45 -0000      1.34
@@ -59,13 +59,22 @@
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL</em></ins></span> of <span 
class="inserted"><ins><em>a trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912171"&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds</em></ins></span> of <span 
class="inserted"><ins><em>data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909160"&gt;
     &lt;p&gt;Tesla users claim Tesla &lt;a
     
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
@@ -418,7 +427,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -429,7 +438,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/18 15:05:16 $
+$Date: 2020/02/15 15:02:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-cars.de.po  18 Nov 2019 15:05:16 -0000      1.23
+++ malware-cars.de.po  15 Feb 2020 15:02:45 -0000      1.24
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -100,6 +100,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -661,11 +670,11 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019+} Free Software
-# | Foundation, Inc.
+# | Copyright &copy; [-2014, 2015, 2016-] {+2017, 2018, 2019, 2020+} Free
+# | Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-cars.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-cars.es.po  23 Nov 2019 11:09:59 -0000      1.4
+++ malware-cars.es.po  15 Feb 2020 15:02:45 -0000      1.5
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-22 11:05+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -68,6 +69,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -549,7 +559,11 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-cars.fr.po  18 Nov 2019 17:15:32 -0000      1.38
+++ malware-cars.fr.po  15 Feb 2020 15:02:45 -0000      1.39
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -65,6 +66,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -549,8 +559,8 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-cars.pot    18 Nov 2019 11:26:47 -0000      1.18
+++ malware-cars.pot    15 Feb 2020 15:02:45 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -55,6 +55,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a "
+"href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\";> "
+"record and send various kinds of data to the manufacturer</a>. For the user, "
+"access to the data is nearly impossible, as it involves cracking the car's "
+"computer, which is always hidden and running with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a "
 
"href=\"https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW\";>force-installed
 "
 "software to cut down on battery range</a>, rather than replace the defective "
@@ -375,7 +384,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-cars.ru.po  19 Nov 2019 07:01:50 -0000      1.44
+++ malware-cars.ru.po  15 Feb 2020 15:02:45 -0000      1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-09-27 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -67,6 +68,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -538,8 +548,8 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-games.de-diff.html  18 Nov 2019 15:05:16 -0000      1.37
+++ malware-games.de-diff.html  15 Feb 2020 15:02:45 -0000      1.38
@@ -77,9 +77,9 @@
     techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment</em></ins></span> in <span 
class="removed"><del><strong>ways</strong></del></span> <span 
class="inserted"><ins><em>which the user is trained
+      &lt;dd&gt;An environment in which the user is trained
       to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
+      over again</em></ins></span> in <span 
class="removed"><del><strong>ways</strong></del></span> <span 
class="inserted"><ins><em>order to get a reward.&lt;/dd&gt;
 
       &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
       &lt;dd&gt;Items</em></ins></span> that
@@ -108,22 +108,28 @@
     &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
     use several of these techniques.&lt;/p&gt;
 
-    &lt;p style="margin-top: 1em"&gt;The developers of gratis
-    mobile games apply</em></ins></span> the <span 
class="removed"><del><strong>user.  (This does not include accidental errors.)
+    &lt;p style="margin-top: 1em"&gt;&ldquo;Loot boxes&ldquo; are a direct
+    application of</em></ins></span> the <span 
class="removed"><del><strong>user.  (This does not include accidental errors.)
 &lt;/p&gt;
 
 &lt;p&gt;
-Malware</strong></del></span> <span class="inserted"><ins><em>techniques 
described above to &lt;a
+Malware</strong></del></span> <span class="inserted"><ins><em>random reward 
mechanism,</em></ins></span> and <span class="removed"><del><strong>nonfree 
software</strong></del></span> <span class="inserted"><ins><em>their 
addictiveness
+    is enhanced by seductive animation. They are &lt;a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/"&gt;
+    akin to gambling&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p style="margin-top: 1em"&gt;The developers of gratis
+    mobile games apply the techniques described above to &lt;a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
     turn their products into slot machines&lt;/a&gt;. This is clearly
     described in an infographic. The revenue generated by these games
     is directly related to the number of strongly addicted gamers
-    (called &ldquo;whales&rdquo;)</em></ins></span> and <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>to the amount of money they</em></ins></span> are 
<span class="removed"><del><strong>two different issues.</strong></del></span>
+    (called &ldquo;whales&rdquo;) and to the amount of money 
they</em></ins></span> are
     <span class="inserted"><ins><em>willing to spend. Thus developers 
carefully study the behavior of
     millions of users to increase the addictiveness of their games.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Unfortunately, this article uses &ldquo;free&rdquo; 
to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    &lt;p&gt;&lt;small&gt;(Unfortunately, the last</em></ins></span> two <span 
class="removed"><del><strong>different issues.</strong></del></span> <span 
class="inserted"><ins><em>articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
 
     &lt;p style="margin-top: 1em"&gt;However, the addictiveness of a game is
@@ -445,7 +451,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -456,7 +462,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/18 15:05:16 $
+$Date: 2020/02/15 15:02:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-games.de.po 18 Nov 2019 15:05:16 -0000      1.38
+++ malware-games.de.po 15 Feb 2020 15:02:45 -0000      1.39
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -171,6 +171,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -183,8 +191,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -683,11 +692,12 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright &copy; 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- malware-games.es.po 23 Nov 2019 11:09:59 -0000      1.6
+++ malware-games.es.po 15 Feb 2020 15:02:45 -0000      1.7
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-22 11:05+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -163,6 +164,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -183,9 +192,18 @@
 "incrementar la adictividad de sus juegos."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Desafortunadamente, el artículo utiliza el término «<cite>free</"
 "cite>» para significar «precio cero». Recomendamos en su lugar decir "
@@ -692,7 +710,13 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-games.fr.po 18 Nov 2019 17:15:32 -0000      1.67
+++ malware-games.fr.po 15 Feb 2020 15:02:45 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -161,6 +162,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -180,9 +189,18 @@
 "d'utilisateurs pour augmenter le pouvoir addictif de leurs jeux."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Malheureusement, cet article utilise le mot <cite>free</cite> dans "
 "le sens de « gratuit ». Nous vous recommandons de dire plutôt 
<cite>gratis</"
@@ -691,7 +709,13 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-games.ja-diff.html  31 Dec 2019 01:04:21 -0000      1.46
+++ malware-games.ja-diff.html  15 Feb 2020 15:02:45 -0000      1.47
@@ -77,9 +77,9 @@
     techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment</em></ins></span> in <span 
class="removed"><del><strong>ways</strong></del></span> <span 
class="inserted"><ins><em>which the user is trained
+      &lt;dd&gt;An environment in which the user is trained
       to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
+      over again</em></ins></span> in <span 
class="removed"><del><strong>ways</strong></del></span> <span 
class="inserted"><ins><em>order to get a reward.&lt;/dd&gt;
 
       &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
       &lt;dd&gt;Items</em></ins></span> that
@@ -108,22 +108,28 @@
     &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
     use several of these techniques.&lt;/p&gt;
 
-    &lt;p style="margin-top: 1em"&gt;The developers of gratis
-    mobile games apply</em></ins></span> the <span 
class="removed"><del><strong>user.  (This does not include accidental errors.)
+    &lt;p style="margin-top: 1em"&gt;&ldquo;Loot boxes&ldquo; are a direct
+    application of</em></ins></span> the <span 
class="removed"><del><strong>user.  (This does not include accidental errors.)
 &lt;/p&gt;
 
 &lt;p&gt;
-Malware</strong></del></span> <span class="inserted"><ins><em>techniques 
described above to &lt;a
+Malware</strong></del></span> <span class="inserted"><ins><em>random reward 
mechanism,</em></ins></span> and <span class="removed"><del><strong>nonfree 
software</strong></del></span> <span class="inserted"><ins><em>their 
addictiveness
+    is enhanced by seductive animation. They are &lt;a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/"&gt;
+    akin to gambling&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p style="margin-top: 1em"&gt;The developers of gratis
+    mobile games apply the techniques described above to &lt;a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
     turn their products into slot machines&lt;/a&gt;. This is clearly
     described in an infographic. The revenue generated by these games
     is directly related to the number of strongly addicted gamers
-    (called &ldquo;whales&rdquo;)</em></ins></span> and <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>to the amount of money they</em></ins></span> are 
<span class="removed"><del><strong>two different issues.</strong></del></span>
+    (called &ldquo;whales&rdquo;) and to the amount of money 
they</em></ins></span> are
     <span class="inserted"><ins><em>willing to spend. Thus developers 
carefully study the behavior of
     millions of users to increase the addictiveness of their games.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Unfortunately, this article uses &ldquo;free&rdquo; 
to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    &lt;p&gt;&lt;small&gt;(Unfortunately, the last</em></ins></span> two <span 
class="removed"><del><strong>different issues.</strong></del></span> <span 
class="inserted"><ins><em>articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
 
     &lt;p style="margin-top: 1em"&gt;However, the addictiveness of a game is
@@ -445,7 +451,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -456,7 +462,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/02/15 15:02:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-games.ja.po 31 Dec 2019 01:04:21 -0000      1.39
+++ malware-games.ja.po 15 Feb 2020 15:02:45 -0000      1.40
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -149,6 +149,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -161,8 +169,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -566,7 +575,8 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-games.pot   18 Nov 2019 11:26:47 -0000      1.32
+++ malware-games.pot   15 Feb 2020 15:02:45 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -125,6 +125,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a "
+"href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
 "
+"akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a "
 "href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\";> "
@@ -138,7 +147,7 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
 "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
 "instead.)</small>"
 msgstr ""
@@ -481,7 +490,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-games.ru.po 19 Nov 2019 07:01:50 -0000      1.77
+++ malware-games.ru.po 15 Feb 2020 15:02:45 -0000      1.78
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-11-09 16:08+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -159,6 +160,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -178,9 +187,18 @@
 "вырабатывали более сильную зависимость."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в "
 "значении &ldquo;нулевой цены&rdquo;. Мы 
рекомендуем вместо этого говорить "
@@ -684,7 +702,13 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright &copy; 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-mobiles.de-diff.html        20 Jan 2020 19:04:00 -0000      1.72
+++ malware-mobiles.de-diff.html        15 Feb 2020 15:02:45 -0000      1.73
@@ -160,7 +160,8 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 <span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
@@ -262,58 +263,59 @@
   &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</strong></del></span> <span class="inserted"><ins><em>when they
     run nonfree apps. They</em></ins></span> can <span 
class="inserted"><ins><em>never</em></ins></span> be
   <span class="removed"><del><strong>&lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound</strong></del></span> <span 
class="inserted"><ins><em>completely sure</em></ins></span> that <span 
class="removed"><del><strong>humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</strong></del></span> a <span class="removed"><del><strong>bug in
-       Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a nonfree
     app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung</strong></del></span>
+  &lt;p&gt;Many Android devices</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609130"&gt;
-    &lt;p&gt;Xiaomi</em></ins></span> phones <span 
class="inserted"><ins><em>come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
+    &lt;p&gt;Xiaomi phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>security hole that allows an SMS 
message to install
-ransomware&lt;/a&gt;.&lt;/p&gt;
+    a <span class="removed"><del><strong>bug</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> in
+       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Many proprietary payment apps &lt;a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
-However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+&lt;p&gt;Samsung
+phones</strong></del></span> <span class="inserted"><ins><em>the application 
processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>allows an SMS message to install
+ransomware&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's</em></ins></span> proprietary <span 
class="removed"><del><strong>payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is</strong></del></span> <span 
class="inserted"><ins><em>Android library, Moplus, has a back 
door</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
-    universal back door</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span> <span class="inserted"><ins><em>the modem 
processor</em></ins></span> that <span class="removed"><del><strong>this
-  does not operate via</strong></del></span> the <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has 
a</em></ins></span> back door that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as forcibly install
+  The NSA</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
+    can <span class="removed"><del><strong>tap data in smart phones, including 
iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems that this
+  does not operate via the</strong></del></span> <span 
class="inserted"><ins><em>used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
+    A Chinese version of Android has a</em></ins></span> universal back <span 
class="removed"><del><strong>door that we know nearly</strong></del></span> 
<span class="inserted"><ins><em>door&lt;/a&gt;. Nearly</em></ins></span>
     all
   <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door"&gt;
   lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;
@@ -342,31 +344,42 @@
     <span class="inserted"><ins><em>a back door&lt;/a&gt; that provides remote 
access</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>files 
stored</em></ins></span> on <span class="removed"><del><strong>what people are 
listening to</strong></del></span>
+  &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>files 
stored</em></ins></span> on
     <span class="inserted"><ins><em>the device.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
+&lt;h3 id="deception"&gt;deception&lt;/h3&gt;
 
-&lt;p&gt;Digital restrictions management,</em></ins></span> or <span 
class="removed"><del><strong>watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM,&rdquo; refers</em></ins></span> to <span 
class="removed"><del><strong>serve them</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed to restrict what 
users can do</em></ins></span> with <span class="removed"><del><strong>targeted
-  advertisements.&lt;/p&gt;
-&lt;/li&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide</em></ins></span> what <span 
class="removed"><del><strong>people are listening</strong></del></span> <span 
class="inserted"><ins><em>permissions</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
-&lt;li&gt;
-  &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>the data
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
+
+&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
+functionalities designed to restrict what users can do with the data
 in their computers.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201501030"&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces</em></ins></span> the <span class="removed"><del><strong>privacy 
and</strong></del></span> <span class="inserted"><ins><em>use of Google 
DNS&lt;/a&gt;. This is one of the methods that
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
+    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
     Netflix uses to enforce the geolocation restrictions dictated by the
     movie studios.&lt;/p&gt;
   &lt;/li&gt;
@@ -597,6 +610,16 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
@@ -997,13 +1020,16 @@
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy 
and</em></ins></span> security of
+    research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
@@ -1043,8 +1069,8 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and <span 
class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      <span class="removed"><del><strong>roughly 5 tracking libraries. 
Developers of this app have
       confirmed that the non-premium version of the app does
       JavaScript injection for tracking and display ads.&lt;/dd&gt;
   &lt;/dl&gt;
@@ -1096,7 +1122,7 @@
 of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
 &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
+and other companies from getting</strong></del></span> <span 
class="inserted"><ins><em>roughly
       five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>personal information in</strong></del></span> 
<span class="inserted"><ins><em>app have confirmed that</em></ins></span>
       the <span class="removed"><del><strong>first
 place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app does JavaScript 
injection for
@@ -1524,7 +1550,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/01/20 19:04:00 $
+$Date: 2020/02/15 15:02:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- malware-mobiles.de.po       20 Jan 2020 19:04:00 -0000      1.128
+++ malware-mobiles.de.po       15 Feb 2020 15:02:45 -0000      1.129
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -242,6 +242,10 @@
 msgstr "<a href=\"#back-doors\">Hintertüren</a>"
 
 #. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
+#. type: Content of: <div><div><ul><li>
 # | <a [-href=\"#back-doors\">Back doors</a>-] {+href=\"#drm\">DRM</a>+}
 #, fuzzy
 #| msgid "<a href=\"#back-doors\">Back doors</a>"
@@ -459,6 +463,26 @@
 "a>, die den Fernzugriff auf die im Gerät gespeicherten Daten ermöglicht."
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr ""
 
@@ -957,6 +981,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- malware-mobiles.es.po       21 Jan 2020 12:34:48 -0000      1.162
+++ malware-mobiles.es.po       15 Feb 2020 15:02:46 -0000      1.163
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -192,6 +193,10 @@
 msgstr "<a href=\"#back-doors\">Puertas traseras</a>"
 
 #. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
+#. type: Content of: <div><div><ul><li>
 msgid "<a href=\"#drm\">DRM</a>"
 msgstr "<a href=\"#drm\">DRM</a>"
 
@@ -369,6 +374,26 @@
 "que permite el acceso remoto a los archivos almacenados en el dispositivo."
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr "DRM"
 
@@ -801,6 +826,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- malware-mobiles.fr.po       21 Jan 2020 13:07:02 -0000      1.184
+++ malware-mobiles.fr.po       15 Feb 2020 15:02:46 -0000      1.185
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2020-01-21 14:06+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -190,6 +191,14 @@
 msgstr "<a href=\"#back-doors\">Portes dérobées</a>"
 
 #. type: Content of: <div><div><ul><li>
+# | <a [-href=\"#manipulation\">Manipulation</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#manipulation\">Manipulation</a>"
+
+#. type: Content of: <div><div><ul><li>
 msgid "<a href=\"#drm\">DRM</a>"
 msgstr "<a href=\"#drm\">DRM</a>"
 
@@ -365,6 +374,26 @@
 "permet l'accès à distance aux fichiers stockés dans l'appareil."
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr "DRM"
 
@@ -798,6 +827,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-mobiles.it-diff.html        20 Jan 2020 19:04:00 -0000      1.77
+++ malware-mobiles.it-diff.html        15 Feb 2020 15:02:46 -0000      1.78
@@ -234,6 +234,7 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+  &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
@@ -290,25 +291,25 @@
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on the user's computer&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>NSA can tap data in smart phones, including 
iPhones, Android,</strong></del></span> <span class="inserted"><ins><em>app 
developers
-    regularly used it to make the computer download</em></ins></span> and
-  <span class="removed"><del><strong>BlackBerry&lt;/a&gt;. While 
there</strong></del></span> <span class="inserted"><ins><em>execute any code
+    install malware on the user's computer&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>NSA can tap data in smart phones, including 
iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail 
here,</strong></del></span> <span class="inserted"><ins><em>app developers
+    regularly used</em></ins></span> it <span 
class="removed"><del><strong>seems that this
+  does not operate via</strong></del></span> <span 
class="inserted"><ins><em>to make</em></ins></span> the <span 
class="removed"><del><strong>universal back door</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
     they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems</strong></del></span> <span 
class="inserted"><ins><em>a concrete example of what users are exposed to when 
they
-    run nonfree apps. They can never be completely sure</em></ins></span> that 
<span class="removed"><del><strong>this
-  does not operate via</strong></del></span> <span class="inserted"><ins><em>a 
nonfree
+    &lt;p&gt;This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
-    a universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
-    universal back door <span class="inserted"><ins><em>in the modem 
processor</em></ins></span> that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -324,9 +325,8 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
-    all
-  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have.</strong></del></span> <span 
class="inserted"><ins><em>have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
@@ -341,6 +341,23 @@
 &lt;/ul&gt;
 
 
+&lt;h3 id="deception"&gt;deception&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
 &lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
@@ -375,14 +392,13 @@
     risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
-    &ldquo;free&rdquo;.</em></ins></span> It <span 
class="removed"><del><strong>may involve exploiting various bugs. There 
are</strong></del></span> <span class="inserted"><ins><em>should have said 
&ldquo;gratis&rdquo;
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can 
be</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -583,6 +599,16 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
@@ -941,62 +967,65 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>bugs in</strong></del></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span> app <span 
class="inserted"><ins><em>said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
-    the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens of thousands of pairs</em></ins></span> that <span 
class="removed"><del><strong>we know nearly all
+  portable phones have. It may involve exploiting various bugs. There 
are</strong></del></span> <span 
class="inserted"><ins><em>collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon &lt;a
-    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
+    &lt;p&gt;Verizon</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some</em></ins></span> of <span class="removed"><del><strong>bugs 
in</strong></del></span> <span class="inserted"><ins><em>its phones. The app 
will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span> app <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
+    being pre-installed on only one phone&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article 
misuses</strong></del></span> the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app &lt;a
-    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable 
phones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's</strong></del></span> <span class="inserted"><ins><em>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    &lt;p&gt;The Uber</em></ins></span> app <span 
class="removed"><del><strong>listens all the time,</strong></del></span> <span 
class="inserted"><ins><em>tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  on what people are listening to or watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations to serve them with targeted
+  advertisements.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
@@ -1052,8 +1081,8 @@
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
       <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for <span 
class="removed"><del><strong>tracking</strong></del></span>
-      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
+      the <span class="removed"><del><strong>non-premium version 
of</strong></del></span> <span class="inserted"><ins><em>non-premium version of 
the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -1066,104 +1095,108 @@
   &lt;li id="M201606050"&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>display ads.&lt;/dd&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across</em></ins></span> the <span class="removed"><del><strong>app 
does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>display ads.&lt;/dd&gt;
   &lt;/dl&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span> <span class="inserted"><ins><em>suggests you to 
share the picture you take according to who is</em></ins></span>
-    in <span class="removed"><del><strong>2015&lt;/a&gt; found that 90% 
of</strong></del></span> the <span class="removed"><del><strong>top-ranked 
gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely to be
-    sent across the wire to Facebook's servers and face-recognition
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none</em></ins></span> of <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo;</em></ins></span> them <span 
class="inserted"><ins><em>to the service.&lt;/p&gt;
-  &lt;/li&gt;
+    even if</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-  &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people</em></ins></span> are <span 
class="inserted"><ins><em>listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of</strong></del></span> <span class="inserted"><ins><em>user 
didn't &ldquo;upload&rdquo;</em></ins></span> them <span 
class="removed"><del><strong>are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application</em></ins></span> not 
<span class="removed"><del><strong>in fact</strong></del></span> <span 
class="inserted"><ins><em>only can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in 
stores</strong></del></span> or <span class="removed"><del><strong>played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,</em></ins></span>
+    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps</strong></del></span>
+  &lt;p&gt;Pairs of Android apps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>track users by</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played 
by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and</em></ins></span> 
TV <span class="removed"><del><strong>programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
+       to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots</strong></del></span>
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by</strong></del></span> 
<span class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal 
data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude.&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
+    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
<span class="inserted"><ins><em>the app's functionality, was</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>personal 
details of users</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described these apps as
+    &lt;p&gt;The article should not</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>usual analytics 
tools are
-    legitimate, but</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most</strong></del></span>
-    <span class="inserted"><ins><em>analyze what</em></ins></span> users <span 
class="removed"><del><strong>have
-stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>are doing or how.  &ldquo;Analytics&rdquo; 
tools</em></ins></span>
-    that <span class="removed"><del><strong>spell out
-what they</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
+    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
+    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
 and honestly identify the information it collects on users, instead
 of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
 &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>just as wrong as 
any</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in the first
+and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
 place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1529,7 +1562,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/01/20 19:04:00 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- malware-mobiles.it.po       20 Jan 2020 19:04:01 -0000      1.128
+++ malware-mobiles.it.po       15 Feb 2020 15:02:46 -0000      1.129
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -226,6 +226,10 @@
 msgstr "<a href=\"#back-doors\">Backdoor</a>"
 
 #. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
+#. type: Content of: <div><div><ul><li>
 # | <a [-href=\"#back-doors\">Back doors</a>-] {+href=\"#drm\">DRM</a>+}
 #, fuzzy
 #| msgid "<a href=\"#back-doors\">Back doors</a>"
@@ -447,6 +451,26 @@
 "backdoor</a> che fornisce accesso remoto ai file contenuti nel dispositivo."
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr ""
 
@@ -919,6 +943,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.ja-diff.html        20 Jan 2020 19:04:01 -0000      1.94
+++ malware-mobiles.ja-diff.html        15 Feb 2020 15:02:46 -0000      1.95
@@ -217,22 +217,24 @@
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;</em></ins></span>
     transmit <span class="removed"><del><strong>personal data in an insecure 
way&lt;/a&gt;.
 However,</strong></del></span> <span class="inserted"><ins><em>even when they 
are turned off&lt;/a&gt;.  This means their movements
-    are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these apps is that
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>listening 
feature work.&lt;/p&gt;</em></ins></span>
+    are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>worse aspect</strong></del></span> <span 
class="inserted"><ins><em>listening feature work.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div id="TOC"&gt;
-&lt;h3&gt;Types of malware</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
+&lt;h3&gt;Types</em></ins></span> of <span class="removed"><del><strong>these 
apps is that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>malware</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
   BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
   does not operate via</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+  &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
@@ -336,6 +338,23 @@
 &lt;/ul&gt;
 
 
+&lt;h3 id="deception"&gt;deception&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
 &lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
@@ -577,6 +596,16 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
@@ -1379,7 +1408,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/01/20 19:04:01 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-mobiles.ja.po       20 Jan 2020 19:04:01 -0000      1.119
+++ malware-mobiles.ja.po       15 Feb 2020 15:02:46 -0000      1.120
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -182,6 +182,12 @@
 #. type: Content of: <div><div><ul><li>
 #, fuzzy
 #| msgid "<a href=\"#back-doors\">Back doors</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#back-doors\">バックドア</a>"
+
+#. type: Content of: <div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#back-doors\">Back doors</a>"
 msgid "<a href=\"#drm\">DRM</a>"
 msgstr "<a href=\"#back-doors\">バックドア</a>"
 
@@ -342,6 +348,26 @@
 "されたデータの遠隔からのアクセスを提供します。"
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 #, fuzzy
 msgid "DRM"
 msgstr "ディジタル制限管理"
@@ -684,6 +710,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.pot 20 Jan 2020 19:04:01 -0000      1.94
+++ malware-mobiles.pot 15 Feb 2020 15:02:46 -0000      1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -136,6 +136,10 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
 msgid "<a href=\"#drm\">DRM</a>"
 msgstr ""
 
@@ -260,6 +264,26 @@
 msgstr ""
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a "
+"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\";>
 "
+"bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr ""
 
@@ -544,6 +568,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\";>
 "
+"snooping and sabotage capabilities</a> if they install their own software on "
+"the device.  Many employers demand to do this.  For the employee, this is "
+"simply nonfree software, as fundamentally unjust and as dangerous as any "
+"other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a "
 
"href=\"https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/\";>
 "
 "tracks users even when it is turned off</a>, after tricking them into giving "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- malware-mobiles.ru.po       20 Jan 2020 20:01:53 -0000      1.218
+++ malware-mobiles.ru.po       15 Feb 2020 15:02:46 -0000      1.219
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-01-20 18:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -186,6 +187,14 @@
 msgstr "<a href=\"#back-doors\"> Лазейки</a>"
 
 #. type: Content of: <div><div><ul><li>
+# | <a [-href=\"#manipulation\">Manipulation</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#manipulation\"> Манипуляция</a>"
+
+#. type: Content of: <div><div><ul><li>
 msgid "<a href=\"#drm\">DRM</a>"
 msgstr "<a href=\"#drm\"> Цифровое управление 
ограничениями</a>"
 
@@ -363,6 +372,26 @@
 "предоставляет удаленный доступ к файлам, х
ранящимся на устройстве."
 
 #. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><h3>
 msgid "DRM"
 msgstr "Цифровое управление ограничениями"
 
@@ -789,6 +818,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- nl.po       6 Feb 2020 16:32:26 -0000       1.169
+++ nl.po       15 Feb 2020 15:02:46 -0000      1.170
@@ -3067,6 +3067,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -3349,12 +3358,12 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3456,6 +3465,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -3468,8 +3485,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -3781,6 +3799,18 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Apple's Operating Systems are-]{+Google's Software Is+} Malware - GNU
 # | Project - Free Software Foundation
@@ -4290,16 +4320,6 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
-# type: Content of: <div><p>
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Microsoft's+} Software {+Is Malware+} - GNU Project -
 # | Free Software Foundation
@@ -5137,6 +5157,14 @@
 msgid "Types of malware in mobiles"
 msgstr "Soorten&nbsp;malware"
 
+#. type: Content of: <div><div><ul><li>
+# | <a [-href=\"#deception\">Interference</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Interference</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Oplichterij</a>"
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "See above for the <a href=\"#universal-back-door-phone-modem\">general "
@@ -5229,6 +5257,29 @@
 "the files stored on the device."
 msgstr ""
 
+#. type: Content of: <div><h3>
+# | [-Apple Deception-]{+deception+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "deception"
+msgstr "Apple-oplichterij"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -5458,6 +5509,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -6420,6 +6481,16 @@
 "a>."
 msgstr ""
 
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014, 2015, 2016, 2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Potential Malware+} - GNU Project - Free
 # | Software Foundation
@@ -6677,10 +6748,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016-] {+2019+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2015, 2016-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -7157,6 +7229,19 @@
 "posting images without their consent."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+DRM+} - GNU Project - Free Software Foundation
 #, fuzzy
@@ -7302,6 +7387,13 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016-] {+2019+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Incompatibility+} - GNU Project - Free Software
 # | Foundation
@@ -8354,6 +8446,19 @@
 "continuing this practice</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -9199,19 +9304,6 @@
 "because they pass it through Microsoft."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -10046,9 +10138,6 @@
 #~ "Foute links en andere correcties graag sturen aan <a href=\"mailto:";
 #~ "address@hidden\">&lt;address@hidden&gt;</a>."
 
-#~ msgid "Apple Deception"
-#~ msgstr "Apple-oplichterij"
-
 #, fuzzy
 #~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- pl.po       6 Feb 2020 16:32:26 -0000       1.168
+++ pl.po       15 Feb 2020 15:02:46 -0000      1.169
@@ -2631,6 +2631,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -2912,11 +2921,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2017, 2018, 2019+} Free Software
-# | Foundation, Inc.
+# | Copyright &copy; [-2013, 2014, 2015-] {+2017, 2018, 2019, 2020+} Free
+# | Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3015,6 +3024,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -3027,8 +3044,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -3327,6 +3345,15 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
 # | Software Foundation
@@ -3795,14 +3822,6 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2017, 2018, 2019, 2020+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Microsoft's+} Software {+Is Malware+} - GNU Project -
 # | Free Software Foundation
@@ -4585,6 +4604,15 @@
 msgid "Types of malware in mobiles"
 msgstr "<strong>Rodzaj malware</strong>"
 
+#. type: Content of: <div><div><ul><li>
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "See above for the <a href=\"#universal-back-door-phone-modem\">general "
@@ -4677,6 +4705,26 @@
 "the files stored on the device."
 msgstr ""
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -4888,6 +4936,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -5849,6 +5907,14 @@
 "a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2017, 2018, 2019+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Potential Malware+} - GNU Project - Free
 # | Software Foundation
@@ -6097,11 +6163,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2019+} Free Software Foundation,
-# | Inc.
+# | Copyright &copy; [-2013, 2014, 2015-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -6561,6 +6627,16 @@
 "posting images without their consent."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+DRM+} - GNU Project - Free Software Foundation
 #, fuzzy
@@ -6697,6 +6773,14 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2019+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Incompatibility+} - GNU Project - Free Software
 # | Foundation
@@ -7760,6 +7844,16 @@
 "continuing this practice</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
 # | Foundation
@@ -8579,16 +8673,6 @@
 "because they pass it through Microsoft."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
 # | Foundation

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- pot 6 Feb 2020 16:32:26 -0000       1.167
+++ pot 15 Feb 2020 15:02:46 -0000      1.168
@@ -2417,6 +2417,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla users claim Tesla <a href=\"https://www.reuters.com/article/us-tesla-";
 "battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-"
 "capacity-idUSKCN1UY2TW\">force-installed software to cut down on battery "
@@ -2698,7 +2707,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -2787,6 +2796,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -2799,8 +2816,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -3099,6 +3117,11 @@
 "to do with cheating."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -3551,10 +3574,6 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-
 #. type: Content of: <title>
 msgid ""
 "Microsoft's Software Is Malware - GNU Project - Free Software Foundation"
@@ -4292,6 +4311,10 @@
 msgid "Types of malware in mobiles"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "See above for the <a href=\"#universal-back-door-phone-modem\">general "
@@ -4384,6 +4407,26 @@
 "the files stored on the device."
 msgstr ""
 
+#. type: Content of: <div><h3>
+msgid "deception"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "The Netflix Android app <a href=\"http://torrentfreak.com/netflix-cracks-";
@@ -4595,6 +4638,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/";
 "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
 "move/2270305001/\"> tracks users even when it is turned off</a>, after "
@@ -5539,6 +5592,10 @@
 "a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Potential Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -5767,7 +5824,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -6164,6 +6221,12 @@
 "posting images without their consent."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
 msgstr ""
@@ -6282,6 +6345,10 @@
 "parents' money without explaining it to them."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Incompatibility - GNU Project - Free Software Foundation"
 msgstr ""
@@ -6979,6 +7046,12 @@
 "continuing this practice</a>."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7715,12 +7788,6 @@
 "because they pass it through Microsoft."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr ""

Index: proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-addictions.es.po        21 Nov 2019 11:44:38 -0000      1.31
+++ proprietary-addictions.es.po        15 Feb 2020 15:02:46 -0000      1.32
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -180,6 +181,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -200,9 +209,18 @@
 "incrementar la adictividad de sus juegos."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Desafortunadamente, el artículo utiliza el término «<cite>free</"
 "cite>» para significar «precio cero». Recomendamos en su lugar decir "
@@ -555,8 +573,12 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2011, 2012-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -580,6 +602,9 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
+#~ msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+
 #~ msgid ""
 #~ "Here are instances of proprietary programs that add addictive "
 #~ "functionality to lure users into using it perpetually. Some of these "

Index: proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-addictions.fr.po        18 Nov 2019 17:15:32 -0000      1.38
+++ proprietary-addictions.fr.po        15 Feb 2020 15:02:46 -0000      1.39
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -176,6 +177,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -195,9 +204,18 @@
 "d'utilisateurs pour augmenter le pouvoir addictif de leurs jeux."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Malheureusement, cet article utilise le mot <cite>free</cite> dans "
 "le sens de « gratuit ». Nous vous recommandons de dire plutôt 
<cite>gratis</"
@@ -547,8 +565,12 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2011, 2012-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -571,3 +593,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."

Index: proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-addictions.pot  18 Nov 2019 11:26:47 -0000      1.18
+++ proprietary-addictions.pot  15 Feb 2020 15:02:46 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -136,6 +136,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a "
+"href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
 "
+"akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a "
 "href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\";> "
@@ -149,7 +158,7 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
 "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
 "instead.)</small>"
 msgstr ""
@@ -380,7 +389,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary-addictions.ru.po        19 Nov 2019 07:01:51 -0000      1.35
+++ proprietary-addictions.ru.po        15 Feb 2020 15:02:46 -0000      1.36
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-04-11 16:26+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -174,6 +175,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"&ldquo;Loot boxes&ldquo; are a direct application of the random reward "
+"mechanism, and their addictiveness is enhanced by seductive animation. They "
+"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -193,9 +202,18 @@
 "вырабатывали более сильную зависимость."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean &ldquo;"
-"zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)</small>"
+# | <small>(Unfortunately, [-this article uses-] {+the last two articles use+}
+# | &ldquo;free&rdquo; to mean &ldquo;zero price.&rdquo; We recommend saying
+# | &ldquo;gratis&rdquo; instead.)</small>
+#, fuzzy
+#| msgid ""
+#| "<small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean "
+#| "&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
+#| "instead.)</small>"
+msgid ""
+"<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(К сожалению, в статье слово 
&ldquo;свободный&rdquo; используется в "
 "значении &ldquo;нулевой цены&rdquo;. Мы 
рекомендуем вместо этого говорить "
@@ -539,8 +557,12 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+# | Copyright &copy; [-2011, 2012-] {+2019, 2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011, 2012 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -567,6 +589,9 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2019 Free Software Foundation, Inc."
+
 #~ msgid ""
 #~ "Here are instances of proprietary programs that add addictive "
 #~ "functionality to lure users into using it perpetually. Some of these "

Index: proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-deception.de-diff.html  23 Nov 2019 15:30:43 -0000      1.31
+++ proprietary-deception.de-diff.html  15 Feb 2020 15:02:46 -0000      1.32
@@ -75,19 +75,31 @@
 &lt;div class="column-limit" id="proprietary-deception"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904150"&gt;
-    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers 
to</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
     detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
     run dirty the rest of the time. In real driving, the cars exceeded
     emissions standards by a factor of up to 35.&lt;/p&gt;
 
     &lt;p&gt;Using free software would not have stopped Volkswagen from
     programming it this way, but would have made it harder to conceal,
-    and given the users</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>possibility 
of correcting the deception.&lt;/p&gt;
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
 
     &lt;p&gt;Former executives of Volkswagen are being &lt;a
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
@@ -105,8 +117,8 @@
 
   &lt;li id="M201902041.2"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos instead of &ldquo;beautifying&rdquo; them&lt;/a&gt;,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -139,9 +151,9 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    people <span class="removed"><del><strong>there&lt;/a&gt;.
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo;
       are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
       interfaces designed to mislead users, or make option settings
@@ -149,9 +161,9 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
     users to turn this off&rdquo; while ensuring that few will
-    understand how to actually turn it off.&lt;/p&gt;
+    understand how to actually turn it off.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
     &lt;p&gt;A top-ranking proprietary Instagram client promising
@@ -226,7 +238,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -236,7 +248,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/23 15:30:43 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-deception.de.po 23 Nov 2019 15:30:43 -0000      1.43
+++ proprietary-deception.de.po 15 Feb 2020 15:02:46 -0000      1.44
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:43+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -110,6 +110,22 @@
 "Einzelheiten aufzuzeigen."
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 # | Volkswagen programmed its car engine computers to {+<a
 # | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
 # | detect the Environmental Protection Agency's emission [-tests,-]
@@ -307,13 +323,14 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free Software
-# | Foundation, Inc.
+# | Copyright &copy; 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free
+# | Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 msgstr "Copyright &copy; 2015-2018 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-deception.es.po 24 Nov 2019 11:31:59 -0000      1.13
+++ proprietary-deception.es.po 15 Feb 2020 15:02:46 -0000      1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-24 12:11+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -82,6 +83,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 "Environmental Protection Agency's emission tests</a>, and run dirty the rest "
@@ -258,8 +275,15 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, "
+#| "Inc."
 msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
 

Index: proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-deception.fr.po 24 Nov 2019 09:35:45 -0000      1.52
+++ proprietary-deception.fr.po 15 Feb 2020 15:02:46 -0000      1.53
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-23 17:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: fr <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -80,6 +81,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 "Environmental Protection Agency's emission tests</a>, and run dirty the rest "
@@ -259,8 +276,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015-2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-deception.ja-diff.html  31 Dec 2019 01:04:21 -0000      1.37
+++ proprietary-deception.ja-diff.html  15 Feb 2020 15:02:46 -0000      1.38
@@ -68,16 +68,25 @@
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy 
reference</em></ins></span> or <span 
class="removed"><del><strong>trickery.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>two
+to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-deception"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202002020"&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then &lt;a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904150"&gt;
     &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
     
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
@@ -89,8 +98,8 @@
     programming it this way, but would have made it harder to conceal,
     and given the users the possibility of correcting the deception.&lt;/p&gt;
 
-    &lt;p&gt;Former executives of Volkswagen are being</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    &lt;p&gt;Former executives of Volkswagen are being &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -105,8 +114,11 @@
 
   &lt;li id="M201902041.2"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one</em></ins></span> or <span 
class="removed"><del><strong>trickery.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>more 
malicious functionalities, such as</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos instead of &ldquo;beautifying&rdquo; them&lt;/a&gt;,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -225,7 +237,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -236,7 +248,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-deception.ja.po 31 Dec 2019 01:04:21 -0000      1.45
+++ proprietary-deception.ja.po 15 Feb 2020 15:02:46 -0000      1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:31+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -88,6 +88,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 "Environmental Protection Agency's emission tests</a>, and run dirty the rest "
@@ -241,7 +257,8 @@
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-deception.pot   23 Nov 2019 15:30:43 -0000      1.28
+++ proprietary-deception.pot   15 Feb 2020 15:02:46 -0000      1.29
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a "
+"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\";>
 "
+"bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Volkswagen programmed its car engine computers to <a "
 
"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";> 
"
 "detect the Environmental Protection Agency's emission tests</a>, and run "
@@ -182,7 +198,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, 
Inc."
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-deception.ru.po 23 Nov 2019 16:29:02 -0000      1.61
+++ proprietary-deception.ru.po 15 Feb 2020 15:02:46 -0000      1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-09-27 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -81,6 +82,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos.";
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 "Environmental Protection Agency's emission tests</a>, and run dirty the rest "
@@ -257,9 +274,11 @@
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-sabotage.de-diff.html   18 Nov 2019 15:05:18 -0000      1.50
+++ proprietary-sabotage.de-diff.html   15 Feb 2020 15:02:46 -0000      1.51
@@ -69,12 +69,22 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910071"&gt;
     &lt;p&gt;Adobe has &lt;a
     
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/"&gt;
-    cancelled</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>software subscriptions of all users in
+    cancelled the software subscriptions of all users in
     Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
     turned into a tool for sabotage.&lt;/p&gt;
   &lt;/li&gt;
@@ -107,10 +117,10 @@
     versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
     tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components</em></ins></span> of <span 
class="inserted"><ins><em>the updating system that users
+    &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
+    users' machines, causing numerous problems, some</em></ins></span> of 
<span class="inserted"><ins><em>which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
     critical&lt;/a&gt;.&lt;/p&gt;
 
@@ -843,7 +853,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -853,7 +863,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/18 15:05:18 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-sabotage.de.po  18 Nov 2019 15:05:18 -0000      1.132
+++ proprietary-sabotage.de.po  15 Feb 2020 15:02:46 -0000      1.133
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -110,6 +110,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -1404,14 +1414,14 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright &copy; 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2015-2018 Free Software Foundation, Inc."
 

Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-sabotage.es.po  21 Nov 2019 22:24:38 -0000      1.27
+++ proprietary-sabotage.es.po  15 Feb 2020 15:02:46 -0000      1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-21 12:19+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -82,6 +83,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -1146,8 +1157,14 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-sabotage.fr.po  18 Nov 2019 17:15:33 -0000      1.175
+++ proprietary-sabotage.fr.po  15 Feb 2020 15:02:46 -0000      1.176
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -81,6 +82,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -1153,8 +1164,14 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2015-2019 Free Software Foundation, Inc."
 

Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-sabotage.it-diff.html   18 Nov 2019 15:05:18 -0000      1.61
+++ proprietary-sabotage.it-diff.html   15 Feb 2020 15:02:46 -0000      1.62
@@ -71,6 +71,16 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910071"&gt;
     &lt;p&gt;Adobe</em></ins></span> has <span 
class="removed"><del><strong>something
 worse</strong></del></span> <span class="inserted"><ins><em>&lt;a
@@ -103,7 +113,8 @@
     being cut off</em></ins></span> for <span 
class="removed"><del><strong>older
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</strong></del></span> <span 
class="inserted"><ins><em>life, which more-or-less cripples the 
user's</em></ins></span> Apple <span 
class="removed"><del><strong>stops</strong></del></span>
+    &lt;p&gt;Meanwhile,</strong></del></span> <span 
class="inserted"><ins><em>life, which more-or-less cripples the 
user's</em></ins></span> Apple <span class="removed"><del><strong>stops people 
from fixing problems themselves;
+    that's</strong></del></span>
     <span class="inserted"><ins><em>devices forever&lt;/a&gt;.  There is no 
appeal.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -115,16 +126,16 @@
     versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
     tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
+    &ldquo;repair&rdquo; any components of</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
+    users' machines, causing numerous problems, some</em></ins></span> of 
<span class="inserted"><ins><em>which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
     critical&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the</em></ins></span> people <span class="inserted"><ins><em>they 
are supposedly serving. Migrate to a &lt;a
+    that</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software developers have learned to adopt
+    toward the people they are supposedly serving. Migrate to a &lt;a
     href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
     can!&lt;/p&gt;
 
@@ -134,13 +145,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201904040"&gt;
-    &lt;p&gt;Ebooks &ldquo;bought&rdquo;</em></ins></span> from <span 
class="removed"><del><strong>fixing problems themselves;
-    that's</strong></del></span> <span class="inserted"><ins><em>Microsoft's 
store check that
-    their DRM is valid by connecting to</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>store every time their
+    &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
     &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
     this store, &lt;a href="https://www.bbc.com/news/technology-47810367"&gt;
     bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;&lt;/a&gt;. (The
-    article additionally highlights the pitfalls</em></ins></span> of <span 
class="removed"><del><strong>proprietary 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DRM.)&lt;/p&gt;
+    article additionally highlights the pitfalls of DRM.)&lt;/p&gt;
 
     &lt;p&gt;This is another proof that a DRM-encumbered product doesn't belong
     to the person who bought it. Microsoft said it will refund customers,
@@ -820,7 +830,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -831,7 +841,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/11/18 15:05:18 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-sabotage.it.po  18 Nov 2019 15:05:18 -0000      1.126
+++ proprietary-sabotage.it.po  15 Feb 2020 15:02:46 -0000      1.127
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -104,6 +104,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -1240,14 +1250,14 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."

Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary-sabotage.ja-diff.html   31 Dec 2019 01:04:21 -0000      1.66
+++ proprietary-sabotage.ja-diff.html   15 Feb 2020 15:02:46 -0000      1.67
@@ -70,6 +70,16 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910071"&gt;
     &lt;p&gt;Adobe has &lt;a
     
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/"&gt;
@@ -796,7 +806,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -807,7 +817,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-sabotage.ja.po  31 Dec 2019 01:04:21 -0000      1.120
+++ proprietary-sabotage.ja.po  15 Feb 2020 15:02:46 -0000      1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -87,6 +87,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -950,7 +960,7 @@
 #| msgid ""
 #| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-sabotage.pot    18 Nov 2019 15:05:18 -0000      1.84
+++ proprietary-sabotage.pot    15 Feb 2020 15:02:46 -0000      1.85
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -62,6 +62,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\";>
 "
+"snooping and sabotage capabilities</a> if they install their own software on "
+"the device.  Many employers demand to do this.  For the employee, this is "
+"simply nonfree software, as fundamentally unjust and as dangerous as any "
+"other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a "
 
"href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/\";>
 "
 "cancelled the software subscriptions of all users in Venezuela</a>. This "
@@ -758,7 +768,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 

Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- proprietary-sabotage.ru.po  19 Nov 2019 07:01:53 -0000      1.209
+++ proprietary-sabotage.ru.po  15 Feb 2020 15:02:46 -0000      1.210
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-12-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -79,6 +80,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "
@@ -1142,8 +1153,14 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
 "Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary-surveillance.de-diff.html       1 Feb 2020 14:33:19 -0000       
1.104
+++ proprietary-surveillance.de-diff.html       15 Feb 2020 15:02:46 -0000      
1.105
@@ -606,17 +606,32 @@
 
   &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>can't 
&ldquo;fool&rdquo;</em></ins></span>
     the
-    <span class="removed"><del><strong>source code somehow to 
determine</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    <span class="removed"><del><strong>source code somehow to determine 
whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
+    them</em></ins></span> to <span 
class="inserted"><ins><em>turn</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on <span 
class="removed"><del><strong>each other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the 
privacy</strong></del></span> and <span class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>off, listen 
to</em></ins></span> the
+    <span class="removed"><del><strong>promises for privacy, 
security,</strong></del></span> <span class="inserted"><ins><em>microphone,
     retrieve geo-location data from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed to disguise itself
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>web browsing history, and
+    read</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -624,20 +639,43 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
+    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
+    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
+    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt;</strong></del></span>
 <span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to
+      users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>users cannot 
stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
+    to <span class="removed"><del><strong>read logs
+      for other apps and also core system logs. TigerVPN 
developers</strong></del></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -651,155 +689,305 @@
   &lt;li id="M201910131"&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
+    sends browsing data from Apple devices in China</em></ins></span> to the 
<span class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>the
+      users. The stated purpose of the JS injection is</strong></del></span> 
<span class="inserted"><ins><em>check URLs that possibly 
correspond</em></ins></span> to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;fraudulent&rdquo; websites. Since 
Tencent collaborates
+    with</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
+    contains</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
+  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
+    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell</em></ins></span> whether <span 
class="inserted"><ins><em>the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
-    and videos they make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
+what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>other companies 
from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>video</em></ins></span> you <span 
class="removed"><del><strong>disable Google Maps</strong></del></span>
+    <span class="inserted"><ins><em>take,</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>keeps them up</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
+    <span class="removed"><del><strong>yet another 
example</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way to
-    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
-    surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
+    unthinkable with free software.&lt;/p&gt;
+
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
+    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos</em></ins></span> of <span class="removed"><del><strong>their 
users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
-    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>break Apple's
+    security</em></ins></span> to <span class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>get at them, but NSA can access any of them through 
&lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers</strong></del></span> 
<span class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
+    &lt;p&gt;This may</em></ins></span> have <span 
class="removed"><del><strong>no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just</strong></del></span> <span class="inserted"><ins><em>improved with 
&lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not</em></ins></span> as <span 
class="removed"><del><strong>wrong</strong></del></span> <span 
class="inserted"><ins><em>much</em></ins></span> as <span 
class="removed"><del><strong>any other 
snooping.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect</strong></del></span>
 
-  &lt;li id="M201407230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
+    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also</em></ins></span> a <span 
class="inserted"><ins><em>feature for web sites to track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;
+    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users</em></ins></span> cannot make an Apple ID <span 
class="removed"><del><strong>&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>(&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to install even gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;)</em></ins></span> without giving a 
valid
+    email address and receiving the <span 
class="inserted"><ins><em>verification</em></ins></span> code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
@@ -807,102 +995,207 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;</em></ins></span>
+    upload <span class="inserted"><ins><em>call logs automatically from 
Android phones&lt;/a&gt; while disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>location data while 
in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>sent</em></ins></span> them <span 
class="removed"><del><strong>up to date on</strong></del></span> all <span 
class="removed"><del><strong>your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature 
is</strong></del></span> <span 
class="inserted"><ins><em>later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to</strong></del></span> <span 
class="inserted"><ins><em>phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
+    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>Android) 
&lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>completely stop the 
tracking.  This is
+    yet another example</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending to obey</em></ins></span> 
the <span class="inserted"><ins><em>user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
+    transmission</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature</strong></del></span> <span 
class="inserted"><ins><em>substantial expense</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
+    not wanted or requested</em></ins></span> by <span 
class="removed"><del><strong>default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> the 
<span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any 
file</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+    Journal (in</em></ins></span> an <span class="removed"><del><strong>iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>article blocked from 
us by a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>popular</strong></del></span> Android <span 
class="removed"><del><strong>apps is pervasive</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span>
+    and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>laptops&lt;/a&gt; 
(presumably Windows laptops).  Here is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present in some Android devices</em></ins></span> when 
<span class="removed"><del><strong>&ldquo;location 
services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>turned off, even</strong></del></span>
+    <span class="inserted"><ins><em>sold.  Some Motorola phones, 
made</em></ins></span> when <span class="removed"><del><strong>the phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span> <span 
class="inserted"><ins><em>this company was owned
+    by Google, use a modified version</em></ins></span> of <span 
class="inserted"><ins><em>Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on and off, listen to</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve geo-location 
data from</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;consent&rdquo; of 
users</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>not enough</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most</em></ins></span> users <span class="removed"><del><strong>can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>have 
stopped
+    reading the &ldquo;Terms</em></ins></span> and <span 
class="removed"><del><strong>they send so much data</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo;</em></ins></span> that <span 
class="removed"><del><strong>their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by the user,</strong></del></span> <span 
class="inserted"><ins><em>spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should</em></ins></span> 
clearly <span class="removed"><del><strong>must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
+    hiding it</em></ins></span> in <span class="removed"><del><strong>Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in</strong></del></span> an <span 
class="removed"><del><strong>article blocked</strong></del></span> <span 
class="inserted"><ins><em>obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
+    and other companies</em></ins></span> from <span 
class="removed"><del><strong>us by</strong></del></span> <span 
class="inserted"><ins><em>getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>paywall)
+      reports that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -915,25 +1208,35 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>contain 
JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</em></ins></span>
+    send <span class="removed"><del><strong>their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>lots of 
data</em></ins></span> to <span class="removed"><del><strong>have 
GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
     &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -958,64 +1261,135 @@
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies 
of</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat app's 
principal purpose</strong></del></span> <span 
class="inserted"><ins><em>software</em></ins></span>
+    is <span class="removed"><del><strong>to restrict</strong></del></span> 
<span class="inserted"><ins><em>not a cure for</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
computer,</strong></del></span> <span class="inserted"><ins><em>nasty 
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot 
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202001290"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring</em></ins></span> app <span 
class="inserted"><ins><em>does &lt;a
     
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
     surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy on users even more than users
+      expected. It</strong></del></span> <span 
class="inserted"><ins><em>Android phones,
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span> <span class="inserted"><ins><em>sabotage 
capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
+    the Great Nation&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses</strong></del></span> the <span 
class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>Android version was found</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>contain a
+    back-door allowing developers</em></ins></span> to <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>run any code they wish</em></ins></span> in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span> <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
+    app <span class="removed"><del><strong>that it will&lt;/a&gt;
+        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>is mandatory at</em></ins></span> some <span 
class="removed"><del><strong>of its phones.</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
 
-    &lt;p&gt;Note: The &lt;a
+    &lt;p&gt;Note:</em></ins></span> The <span 
class="removed"><del><strong>app will give Verizon the same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    saying</em></ins></span> that <span class="removed"><del><strong>Google 
normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on</strong></del></span> <span 
class="inserted"><ins><em>tests were</em></ins></span> only <span 
class="removed"><del><strong>one phone&lt;/a&gt;, and</strong></del></span> 
<span class="inserted"><ins><em>performed on</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>Android version
+    of</em></ins></span> the <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
+    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
     tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
+    into giving</em></ins></span> the app <span 
class="removed"><del><strong>remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions 
in order to use one</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span> <span class="inserted"><ins><em>proprietary
     program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or more people
+    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of who has installed
@@ -1023,17 +1397,24 @@
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of the operating system, in order to gather as much private data as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
+        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to 
gather</em></ins></span> as <span class="removed"><del><strong>a 
protection</strong></del></span> <span class="inserted"><ins><em>much private 
data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
@@ -1044,73 +1425,132 @@
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>has</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back</em></ins></span> to <span class="inserted"><ins><em>the 
woman</em></ins></span> who
+      <span class="removed"><del><strong>is in</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature 
seems</strong></del></span> <span class="inserted"><ins><em>has harmful 
implications for women's rights</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>equal employment
+    and freedom</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> of <span 
class="inserted"><ins><em>Android phones and iPhones
     running Goggle apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>proprietary 
software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for 
<span class="removed"><del><strong>children don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>sending
+    the location data to Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    the data, or pass it</em></ins></span> on <span 
class="inserted"><ins><em>to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS</strong></del></span> <span class="inserted"><ins><em>data. This 
results</em></ins></span> in <span class="inserted"><ins><em>massive
+    surveillance on which</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
+      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which 
can</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> it 
<span class="removed"><del><strong>asked the</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
+    &lt;p&gt;Whenever</em></ins></span> user <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1118,28 +1558,45 @@
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built 
apps that
+    way and released them, apparently</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the 
personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> shows <span class="inserted"><ins><em>that 
no one can trust a nonfree program, not even</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    78,000 have been analyzed,</em></ins></span> of <span 
class="inserted"><ins><em>which 24,000 (31%) transmit</em></ins></span> the 
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
@@ -1182,7 +1639,7 @@
     the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>mistreat</strong></del></span> <span 
class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt; &lt;a
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1190,11 +1647,10 @@
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the</em></ins></span> users <span 
class="removed"><del><strong>in
-    various ways. If</strong></del></span> <span class="inserted"><ins><em>of 
what</em></ins></span> it <span 
class="removed"><del><strong>did</strong></del></span> <span 
class="inserted"><ins><em>will do
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>good job</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
@@ -1205,13 +1661,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>this,</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>could more or less
-    prevent such snooping, except</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
@@ -1229,16 +1684,15 @@
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even</em></ins></span> when <span 
class="inserted"><ins><em>users disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by</em></ins></span> the <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming</em></ins></span> app <span 
class="removed"><del><strong>developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
     the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
@@ -1254,30 +1708,18 @@
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>protect us. 
We must demand release</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these proprietary apps 
whose</em></ins></span>
-    source code <span class="removed"><del><strong>to the
-    public, so we can depend on each other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>they cannot look at.  The other apps might be snooping
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="removed"><del><strong>investigated the</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps generally work against
-    their users.  To protect their</em></ins></span> privacy and <span 
class="removed"><del><strong>security
-    of 283</strong></del></span> <span 
class="inserted"><ins><em>freedom,</em></ins></span> Android <span 
class="removed"><del><strong>VPN apps concluded that &ldquo;in 
spite</strong></del></span> <span class="inserted"><ins><em>users
-    need to get rid</em></ins></span> of the
-    <span class="removed"><del><strong>promises for privacy, 
security,</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>anonymity 
given</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps</em></ins></span> by <span class="inserted"><ins><em>getting apps 
from</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions 
of</strong></del></span> <span class="inserted"><ins><em>free software
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
@@ -1286,30 +1728,26 @@
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>are HIV-positive, then provides the information to
+    which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could</em></ins></span> be <span class="removed"><del><strong>unawarely 
subject</strong></del></span> <span class="inserted"><ins><em>designed so that 
users communicate such info</em></ins></span> to <span 
class="removed"><del><strong>poor security guarantees</strong></del></span> 
<span class="inserted"><ins><em>each
+    It could be designed so that users communicate such info to each
     other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>abusive practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following is</strong></del></span> <span 
class="inserted"><ins><em>dis-service
+    &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to</em></ins></span> a <span 
class="removed"><del><strong>non-exhaustive list of proprietary 
VPN</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps <span 
class="removed"><del><strong>from
-    the research paper that tracks</strong></del></span>
-    <span class="inserted"><ins><em>is pervasive and sometimes very clever. 
Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1318,97 +1756,49 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>infringes</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>privacy of
-    users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</strong></del></span> <span class="inserted"><ins><em>words
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>track 
users</strong></del></span> <span class="inserted"><ins><em>zero 
price.)&lt;/small&gt;&lt;/p&gt;
+    referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span 
class="removed"><del><strong>show</strong></del></span> <span 
class="inserted"><ins><em>sent</em></ins></span> them <span 
class="removed"><del><strong>targeted ads.&lt;/dd&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests the 
&lt;code&gt;READ_SMS&lt;/code&gt;</strong></del></span> and <span 
class="removed"><del><strong>&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to
-      users'</strong></del></span> text <span 
class="removed"><del><strong>messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps</strong></del></span> <span 
class="inserted"><ins><em>messages</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>emails</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
-    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
-
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>JS 
injection is to display
-      ads. Uses roughly 5 tracking libraries. Also, it redirects the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google</em></ins></span> have
-      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app does
-      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A</strong></del></span>
 study
-    <span class="inserted"><ins><em>the source code somehow to determine 
whether they mistreat users</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90%</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good 
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or 
less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>app developers are 
clever
-    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious</em></ins></span> 
apps, <span class="removed"><del><strong>it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>we cannot 
trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>source 
code to</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;</em></ins></span>
-    &lt;p&gt;Apps for BART &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1416,14 +1806,11 @@
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
+  &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1443,128 +1830,78 @@
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
+  &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>it will&lt;/a&gt; pre-install
-    on some</em></ins></span> of <span class="removed"><del><strong>users is 
not enough
-to legitimize actions like this.  At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>its 
phones. The app will give Verizon</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>same 
information
-    about the users' searches</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.</strong></del></span> Google <span 
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
+  &lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon &lt;a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>app is &lt;a
+    &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>only one 
phone&lt;/a&gt;,</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in</strong></del></span> the 
<span class="removed"><del><strong>first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>user must
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
     user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app</em></ins></span> tracks <span 
class="removed"><del><strong>the users'</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'</em></ins></span>
-    movements <span class="removed"><del><strong>without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>before</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-    yet another</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> example <span 
class="removed"><del><strong>of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how 
&ldquo;getting</em></ins></span> the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>user's
-    consent&rdquo; for surveillance is inadequate as</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>most popular</strong></del></span> <span 
class="inserted"><ins><em>privacy and security of
-    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps
-  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>concluded 
that &ldquo;in spite of the promises
-    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>anonymity given by the majority of VPN
-    apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>may be 
unawarely subject</em></ins></span> to <span class="inserted"><ins><em>poor 
security
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from</em></ins></span> 
the <span class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>research paper,
-    of some proprietary VPN</em></ins></span> apps <span 
class="inserted"><ins><em>that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such</em></ins></span> as
-  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they are not 
free software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full 
access</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>users'
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android</strong></del></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>and also 
core system logs. TigerVPN developers have
+      for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs and
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
       may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -1574,108 +1911,52 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>also uses 
roughly
-      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
-      the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app does JavaScript 
injection for
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;/dl&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+  &lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>picture you take according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>who is</em></ins></span>
-    in <span class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
-      would</strong></del></span> require <span 
class="removed"><del><strong>circumventing</strong></del></span> <span 
class="inserted"><ins><em>online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
-      obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
service.&lt;/p&gt;</em></ins></span>
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>or watching&lt;/a&gt;. In addition,</em></ins></span>
-    it <span class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>tell 
whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and 
in server accounts,
-    it</em></ins></span> can
-        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>alter</em></ins></span> them <span 
class="removed"><del><strong>from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="inserted"><ins><em>include &lt;a
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
@@ -1684,221 +1965,96 @@
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>server 
records</strong></del></span> <span class="inserted"><ins><em>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described</em></ins></span> these 
<span class="removed"><del><strong>numbers for at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
+  &lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>still counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There is also a feature for web 
sites</strong></del></span> <span class="inserted"><ins><em>some are 
starting</em></ins></span>
-    to <span class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span class="inserted"><ins><em>realize 
that</em></ins></span> it is <span class="removed"><del><strong>still true in 
iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
-
-    &lt;p&gt;This article shows the</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways</em></ins></span> that <span class="removed"><del><strong>can 
be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>they present snooping as a way to &ldquo;serve&rdquo;
+  &lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the &lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>attitude of the proprietary software industry
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
-    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>paid
-    proprietary apps,</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>was only 60%.&lt;/p&gt;
-
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most</em></ins></span> of <span 
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span 
class="inserted"><ins><em>them are not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>that 
word</em></ins></span>
-    is <span class="removed"><del><strong>the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
-      sometimes very clever. Some trackers can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201506264"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
+    study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the phones
-      on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>off, listen to the microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.</em></ins></span> This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>in addition</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested</strong></del></span>
-    <span class="inserted"><ins><em>the snooping done</em></ins></span> by the 
<span class="removed"><del><strong>user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone
-      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>OS</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us</strong></del></span>
-    <span class="inserted"><ins><em>the phone.&lt;/p&gt;
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>question of 
whether</em></ins></span> the <span class="removed"><del><strong>GPS and 
microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>app developers
-    get users to say &ldquo;I agree&rdquo;. That</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>no excuse for
-    malware.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+  &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>optional&lt;/a&gt;. 
Not
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;p&gt;The</em></ins></span> nonfree Snapchat app's principal purpose is 
to restrict the
+  &lt;li id="M201312270"&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
     use of data on the user's computer, but it does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to <span class="removed"><del><strong>get</strong></del></span> 
<span class="inserted"><ins><em>get the user's list of other people's phone
+    it tries to get the user's list of other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1909,9 +2065,8 @@
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
     approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>weakness</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -1919,44 +2074,28 @@
   &lt;li id="M201212100"&gt;
     &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
     
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps</strong></del></span> <span 
class="inserted"><ins><em>say whether it</em></ins></span> can &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do 
so.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+  &lt;li id="M201307110"&gt;
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
@@ -1971,138 +2110,85 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book</strong></del></span> <span class="inserted"><ins><em>had &lt;a
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note that this article 
misuses</strong></del></span> the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;</em></ins></span>
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Facebook's app listens all the time,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
+  &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data</em></ins></span> on <span class="removed"><del><strong>what 
people are listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>users' 
computers and sends</em></ins></span> it <span class="removed"><del><strong>may
-    be analyzing people's conversations</strong></del></span> to <span 
class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
+  &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install</strong></del></span> <span 
class="inserted"><ins><em>massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running</em></ins></span> on <span 
class="removed"><del><strong>some of</strong></del></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the 
same</strong></del></span> <span class="inserted"><ins><em>user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
-    information <span class="removed"><del><strong>about the users' searches 
that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
-    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>their users</em></ins></span> and <span 
class="inserted"><ins><em>report to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console</em></ins></span> is
-    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>wide 
range</em></ins></span> of data <span class="removed"><del><strong>in the 
phone,</strong></del></span> <span class="inserted"><ins><em>about their 
users</em></ins></span> and <span class="removed"><del><strong>in server 
accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span> <span 
class="inserted"><ins><em>their users'
-    friends</em></ins></span> and <span class="removed"><del><strong>after the 
ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>associates&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and 
hunt</em></ins></span> for <span class="removed"><del><strong>surveillance is 
inadequate as</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;whales&rdquo; who can be led to 
spend</em></ins></span> a <span class="removed"><del><strong>protection against 
massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lot of money. They also
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;</em></ins></span>
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
+  &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
     spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>what users 
post</strong></del></span> <span class="inserted"><ins><em>every process 
running</em></ins></span> on <span class="removed"><del><strong>various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -2114,21 +2200,13 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according to who
-      is in</strong></del></span> <span class="inserted"><ins><em>people that 
use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2139,78 +2217,44 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>me</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>other way.&rdquo; 
Evidently that was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>snooping). 
In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>this data is sold</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>third 
parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>some
-      are starting</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, according to him,
-    is</em></ins></span> that it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span> 
the <span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>Vizio software</em></ins></span> is <span 
class="removed"><del><strong>a typical example of</strong></del></span>
-    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind</em></ins></span> the <span 
class="removed"><del><strong>attitude of</strong></del></span> <span 
class="inserted"><ins><em>scenes,
-    and there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>proprietary 
software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices 
report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>that
-    matter),</em></ins></span> the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>easiest way to make sure it isn't spying on 
you</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
-    <span class="inserted"><ins><em>to disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
-    instead. Unfortunately, this</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>not always possible. Another option,
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software),</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>set up a
-    firewall to block connections to Vizio's servers. Or,</em></ins></span> as 
<span class="removed"><del><strong>what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>a last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>article for the facts it presents. 
It</em></ins></span>
-    is <span class="removed"><del><strong>in addition to</strong></del></span> 
<span class="inserted"><ins><em>too bad that</em></ins></span> the <span 
class="removed"><del><strong>snooping done</strong></del></span> <span 
class="inserted"><ins><em>article finishes</em></ins></span> by <span 
class="inserted"><ins><em>advocating</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness of surrendering to Netflix. 
The Netflix app &lt;a
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2218,32 +2262,17 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just 
broadcasts</em></ins></span> and <span class="removed"><del><strong>perhaps by 
the OS in</strong></del></span>
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>image is coming from</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,</em></ins></span>
-    the <span class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>TV reports what</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it 
were</em></ins></span> not
-      <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>hidden 
as</em></ins></span> it <span class="inserted"><ins><em>was in these TVs,
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="inserted"><ins><em>be picked up 
by proprietary malware running
-    on</em></ins></span> other <span class="removed"><del><strong>companies.  
This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>devices in range so as</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>determine that they
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
@@ -2251,40 +2280,27 @@
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
+    &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</strong></del></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles the company
+  &lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
+    users</em></ins></span> to <span class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by 
default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
@@ -2333,11 +2349,11 @@
     
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free <span 
class="removed"><del><strong>software which users could have
+      their products, rather than</strong></del></span> free
+    software <span class="removed"><del><strong>which users could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span>
-    <span class="inserted"><ins><em>software in your own computer.&lt;/p&gt;
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
@@ -2374,164 +2390,165 @@
       who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
     user <span class="removed"><del><strong>was.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>user 
watches, and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> could <span 
class="removed"><del><strong>listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered</strong></del></span> 
<span class="inserted"><ins><em>user watches, and the switch</em></ins></span> 
to <span class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save that data anyway.)&lt;/p&gt; 
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="inserted"><ins><em>stop this, but any
-    product could</em></ins></span> spy <span class="removed"><del><strong>on 
children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+    &lt;p&gt;That the manufacturer and the FBI</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    product</em></ins></span> could <span class="removed"><del><strong>listen 
to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>spy this way.&lt;/p&gt;
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;</em></ins></span>
-    and <span class="inserted"><ins><em>use its camera</em></ins></span> to 
<span class="removed"><del><strong>transmit
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>someone else and</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>transmit
        conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that could be a
-      misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span>
+    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society</em></ins></span> to <span 
class="inserted"><ins><em>surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer</em></ins></span> an <span 
class="removed"><del><strong>unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that 
could</strong></del></span> <span class="inserted"><ins><em>unencrypted copy of 
everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be a
+      <span class="removed"><del><strong>misunderstanding.  
However,</strong></del></span> <span class="inserted"><ins><em>better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>is certainly surveillance, at
+      least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>look</em></ins></span> at <span 
class="removed"><del><strong>Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>what's</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>videos. 
That's</em></ins></span> not <span class="removed"><del><strong>really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span>
+    <span class="inserted"><ins><em>security for your home. Security means 
making</em></ins></span> sure <span class="inserted"><ins><em>they don't 
get</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
-    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
-    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>to outsmart 
you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2542,195 +2559,192 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+    into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201703140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>users through 
the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by</em></ins></span> a 
<span class="removed"><del><strong>surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>person's
+    minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
     products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;</em></ins></span>
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>article describes 
wrongdoing by the manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>company that made</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement</em></ins></span> that <span 
class="inserted"><ins><em>it was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to a <span class="removed"><del><strong>server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>data
-    broker,</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>data broker would 
have been able to figure out who the
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company
-      <span class="removed"><del><strong>surveillance 
capability.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>has 
been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
-    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate</strong></del></span>
+    <span class="inserted"><ins><em>customers.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>fact
+      that</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
-    &lt;p&gt;That's easy</strong></del></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus,</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>one of Google's
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
     way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
     even if <span class="removed"><del><strong>it asked for
     authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
@@ -2880,22 +2894,23 @@
     and cable&lt;/a&gt;. Even if the image is coming from the user's own
     computer, the TV reports what it is. The existence of a way to
     disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>about you for later 
examination.&lt;/p&gt;</em></ins></span>
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't 
expect this has got better.&lt;/p&gt;
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
       consent before collecting personal</strong></del></span>
+    <span class="inserted"><ins><em>about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
     data <span class="removed"><del><strong>are totally inadequate.
       And what happens if a user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>TV
       will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
@@ -2954,7 +2969,11 @@
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span class="inserted"><ins><em>report its location to someone else and 
to transmit conversations
+    to
+      <span class="removed"><del><strong>the 600 millions social media 
profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2966,68 +2985,74 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201912171"&gt;
+    &lt;p&gt;Most modern cars</em></ins></span> now &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record</em></ins></span> and <span class="removed"><del><strong>TV 
advertisements play inaudible sounds</strong></del></span> <span 
class="inserted"><ins><em>send various kinds of data</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. For
+    the user, access</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden</em></ins></span> and
+      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>running with
+    proprietary software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network</em></ins></span> and 
<span class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
-    antenna</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>to
+      give it to</strong></del></span> <span class="inserted"><ins><em>you 
succeeded in breaking</em></ins></span> the <span 
class="removed"><del><strong>US</strong></del></span>
+    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem,</em></ins></span> or <span class="removed"><del><strong>some other 
government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
+    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    forward</em></ins></span> it <span class="removed"><del><strong>is done
+    by free software</strong></del></span> <span class="inserted"><ins><em>to 
the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt;</em></ins></span> in <span 
class="inserted"><ins><em>its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
     &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
@@ -3644,7 +3669,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/01 14:33:19 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.de.po      1 Feb 2020 14:33:19 -0000       1.319
+++ proprietary-surveillance.de.po      15 Feb 2020 15:02:46 -0000      1.320
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -2014,6 +2014,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -4568,6 +4578,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-surveillance.es.po      3 Feb 2020 09:31:53 -0000       1.21
+++ proprietary-surveillance.es.po      15 Feb 2020 15:02:46 -0000      1.22
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2020-02-03 10:09+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -1517,6 +1518,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -3985,6 +3996,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.490
retrieving revision 1.491
diff -u -b -r1.490 -r1.491
--- proprietary-surveillance.fr.po      1 Feb 2020 14:46:29 -0000       1.490
+++ proprietary-surveillance.fr.po      15 Feb 2020 15:02:46 -0000      1.491
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2020-02-01 15:46+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1512,6 +1513,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -3993,6 +4004,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary-surveillance.it-diff.html       1 Feb 2020 14:33:19 -0000       
1.171
+++ proprietary-surveillance.it-diff.html       15 Feb 2020 15:02:46 -0000      
1.172
@@ -1222,12 +1222,22 @@
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users to grant it &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when</em></ins></span> used <span class="inserted"><ins><em>for work, give 
employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  For the
+    employee, this</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>simply nonfree 
software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
     internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
@@ -1261,16 +1271,28 @@
     into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
       ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
       weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>its
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
+    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
+    it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1281,24 +1303,12 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
-    it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
     bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
     of the operating system, in order to gather as much 
private</em></ins></span> data <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>as
     they possibly can.&lt;/p&gt;
@@ -1359,24 +1369,23 @@
     &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
       enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
     sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
+      into</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of the vibrator 
minute</strong></del></span> <span class="inserted"><ins><em>phone.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>menstrual and 
pregnancy monitoring apps is often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="removed"><del><strong>was surrounded by a person's
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute 
by
+      minute (thus, indirectly, whether</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
       body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
     traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
     
@@ -1421,33 +1430,32 @@
     the <span class="removed"><del><strong>user was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span class="inserted"><ins><em>data. This 
results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>personal
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
+    way <span class="removed"><del><strong>to access</strong></del></span> 
<span class="inserted"><ins><em>and released them, apparently not realizing 
that all</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal
     data they</em></ins></span> collected <span 
class="removed"><del><strong>by the manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>would 
go to Facebook as well.&lt;/p&gt;
@@ -1506,7 +1514,7 @@
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
     <span class="inserted"><ins><em>their programs.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1517,76 +1525,191 @@
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201902010"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;</strong></del></span> <span class="inserted"><ins><em>10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>will do
+    with</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>company 
does
+    with</em></ins></span> the <span class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;That's easy to do because</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span>
+    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> the <span class="removed"><del><strong>cell 
phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>same 
machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>phone company to 
track</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span> 
is <span class="removed"><del><strong>possible to physically 
remove</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>users that have 
deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -1595,90 +1718,179 @@
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> are <span class="removed"><del><strong>an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> other
+      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
+    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
+    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
+    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span> <span class="inserted"><ins><em>its users.  
Furthermore, they could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
+    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is 
coming</strong></del></span> <span class="inserted"><ins><em>proprietary apps 
by getting apps</em></ins></span> from the <span 
class="removed"><del><strong>user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable</strong></del></span> <span class="inserted"><ins><em>free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>surveillance, 
even</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> if <span 
class="removed"><del><strong>it were not hidden as it was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>HIV-positive, 
then provides</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV will</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>have so much information about its users.
+    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>TVs are</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
+    other but</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report what</strong></del></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying</strong></del></span>
 
-  &lt;li id="M201803050"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    spy</em></ins></span> on 
+      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some 
trackers</em></ins></span> can <span class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
+    follow a user's movements around a physical store</em></ins></span> by 
<span class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, 
exposing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads</em></ins></span> all <span class="removed"><del><strong>users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>phone numbers</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible sounds to be
+      picked up by proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt;</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>user's address
+    book</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.)&lt;/small&gt;&lt;/p&gt;
+    referring to zero price.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
@@ -1688,7 +1900,7 @@
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1700,10 +1912,11 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo;</strong></del></span>
 
-  &lt;li id="M201705230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
     &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
@@ -1717,13 +1930,14 @@
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by</em></ins></span> 
TV
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2346,37 +2560,27 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it <span class="removed"><del><strong>can 
collect</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
@@ -2384,7 +2588,7 @@
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
@@ -2395,112 +2599,48 @@
 
     &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>was anonymizing the data may be
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
     true, but it doesn't really matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
+    customers.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2512,232 +2652,119 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI is in many cases &lt;a
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because the system has no 
authentication</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
-    when
-    <span class="removed"><del><strong>accessed through the modem.  However, 
even if</strong></del></span> it <span class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in the car</strong></del></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
-    users were easily identified</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>these recordings.&lt;/p&gt;
+    users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no <span class="removed"><del><strong>one 
connects</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>see or control what it records or sends.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
 <span class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more</em></ins></span> information 
<span class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
-      which</strong></del></span> <span class="inserted"><ins><em>from users
-    than</em></ins></span> is <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
-    recordings</em></ins></span> made <span 
class="removed"><del><strong>available to car manufacturers, insurance 
companies, and
-      others.&lt;/p&gt;
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span 
class="inserted"><ins><em>without</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>sends
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>invasion isn't 
done</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>malware. The</strong></del></span>
-    <span class="inserted"><ins><em>advertising companies and government 
agencies. In</em></ins></span> other
-      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>words,
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> <span 
class="inserted"><ins><em>devices such as</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>company to extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Sonos
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>past (and, 
who knows,
-    in the future too?)&lt;/p&gt;</em></ins></span>
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>spy on their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and</em></ins></span> other <span 
class="removed"><del><strong>day a woman came up to me</strong></del></span> 
<span class="inserted"><ins><em>personal data&lt;/a&gt;.&lt;/p&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree,</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>data processing is 
done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell</em></ins></span> you <span class="removed"><del><strong>on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>how and where it's done&rdquo;), users have no way
-    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human 
eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a way to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
-    and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span class="removed"><del><strong>now 
&lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if it is air-gapped, it could</em></ins></span> be
-      <span class="removed"><del><strong>picked</strong></del></span> <span 
class="inserted"><ins><em>saving</em></ins></span> up <span 
class="removed"><del><strong>by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>records
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2750,8 +2777,7 @@
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2767,10 +2793,8 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
-    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2779,27 +2803,21 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+  &lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2808,6 +2826,15 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912171"&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903290"&gt;
     &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
<span class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
@@ -3412,7 +3439,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/01 14:33:19 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary-surveillance.it.po      1 Feb 2020 14:33:19 -0000       1.332
+++ proprietary-surveillance.it.po      15 Feb 2020 15:02:46 -0000      1.333
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1946,6 +1946,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -4291,6 +4301,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary-surveillance.ja-diff.html       1 Feb 2020 14:33:19 -0000       
1.188
+++ proprietary-surveillance.ja-diff.html       15 Feb 2020 15:02:46 -0000      
1.189
@@ -1207,30 +1207,21 @@
     surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>Android 
version was found to contain</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that the specific sabotage method Lenovo</strong></del></span> <span 
class="inserted"><ins><em>Android phones,
+    when</em></ins></span> used <span class="removed"><del><strong>did not 
affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>for work, 
give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install 
their</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying that the tests were only performed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span class="inserted"><ins><em>software</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1244,9 +1235,8 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand to do this.  For the
+    employee,</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
@@ -1266,18 +1256,18 @@
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the app, and that, according</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1289,21 +1279,19 @@
 
 &lt;ul&gt;
   &lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201909091"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Facebook app</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users</em></ins></span> even when <span 
class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>turned off&lt;/a&gt;, 
after tricking them
-    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use 
one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's 
&ldquo;Study</em></ins></span>
+    the <span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users to grant</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>phone's microphone, photos, text messages, 
contacts, and
+    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -1311,21 +1299,39 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can</strong></del></span> contain <span 
class="removed"><del><strong>Javascript code,</strong></del></span> <span 
class="inserted"><ins><em>a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
 <span class="inserted"><ins><em>using</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>app is mandatory at some 
workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not</strong></del></span> 
<span class="inserted"><ins><em>a text editor) includes a clarification
+    saying that the tests were</em></ins></span> only <span 
class="inserted"><ins><em>performed on</em></ins></span> the
+      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users</em></ins></span> even <span 
class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>when it is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
     send <span class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>intimate details</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
       needed</strong></del></span> <span class="inserted"><ins><em>users' 
lives</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -1349,12 +1355,12 @@
 
   &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor</em></ins></span> has <span class="removed"><del><strong>a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>demanded the 
list of all the 10,000 or more people
+    A US prosecutor</em></ins></span> has <span 
class="inserted"><ins><em>demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
+    &lt;p&gt;With</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>free program 
there would not be a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1487,17 +1493,18 @@
     &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>other way.&rdquo; Evidently that was
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>to 
user-installed apps</em></ins></span> that <span 
class="removed"><del><strong>was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>data,</em></ins></span> or <span 
class="removed"><del><strong>less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>pass it</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014,</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access to
+    &lt;p&gt;The report was as of 2014,</strong></del></span> <span 
class="inserted"><ins><em>have access to
     the network</em></ins></span> but <span class="removed"><del><strong>we 
don't expect this</strong></del></span> <span class="inserted"><ins><em>no 
direct access to the data. This results in massive
     surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>got better.&lt;/p&gt;
 
@@ -1583,46 +1590,48 @@
   &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>surveillance feature for</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
       watching and listening</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording</em></ins></span> all the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with 
the app.&lt;/p&gt;</em></ins></span>
+    recording</em></ins></span> all the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
 users' <span class="removed"><del><strong>voice on the internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
+      give it to</strong></del></span> <span 
class="inserted"><ins><em>actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span class="removed"><del><strong>US or some other 
government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to
+    be <span class="removed"><del><strong>trusted unless it is done
+    by free software in your own computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>on Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing</em></ins></span> users' <span 
class="removed"><del><strong>voice</strong></del></span> <span 
class="inserted"><ins><em>photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; 
them,
-    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>would then have to
-      give it</strong></del></span> <span class="inserted"><ins><em>redirecting
-    them</em></ins></span> to <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>US or some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and
+      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads on users, and redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>turn this off 
has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>your own 
computer.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+  &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
-      the switch</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that the
-      transmission reports a 404 error really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
+    gratis VPN apps in Google Play found</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      &lt;p&gt;Even worse, it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
       snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>stop this, but any 
product</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+      &lt;p&gt;LG later said it had installed a patch</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span class="removed"><del><strong>stop 
this, but any product</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could
     <span class="inserted"><ins><em>potentially also be used 
to</em></ins></span> spy <span class="removed"><del><strong>this way.&lt;/p&gt;
@@ -1665,30 +1674,36 @@
     with the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>computer, and you can't trust a 
computer</strong></del></span> <span class="inserted"><ins><em>side issue. What 
the company does</em></ins></span>
-    with <span class="inserted"><ins><em>the data is</em></ins></span> a <span 
class="removed"><del><strong>nonfree operating 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+    with 
+      <span class="removed"><del><strong>a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> data <span 
class="removed"><del><strong>about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad 
networks</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span>
+    the <span class="inserted"><ins><em>company gets that</em></ins></span> 
data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> <span class="inserted"><ins><em>at 
all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern</strong></del></span>
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of</em></ins></span> gratis <span 
class="removed"><del><strong>game cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their users and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;They use this data</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
+  &lt;/li&gt;
 
-      &lt;p&gt;Even nastier,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>do it through ad networks</strong></del></span> 
<span class="inserted"><ins><em>send the machine's &ldquo;advertising 
ID,&rdquo; so</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the data
-      <span class="removed"><del><strong>collected by</strong></del></span> 
<span class="inserted"><ins><em>it obtains from the same machine 
via</em></ins></span>
-    various <span class="removed"><del><strong>cr&hellip;apps and sites made 
by</strong></del></span> <span class="inserted"><ins><em>apps. Some of them 
send Facebook detailed information about
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
@@ -1708,19 +1723,19 @@
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>hunt</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who can be 
led</strong></del></span> <span class="inserted"><ins><em>licensing 
enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span 
class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a <span class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>recording. But we can't be sure from the 
article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1728,8 +1743,9 @@
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>snoop
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
@@ -2177,10 +2193,10 @@
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-    collected by various cr&hellip;apps and sites made by</em></ins></span> 
different
+    collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things, and hunt for
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
@@ -2725,6 +2741,15 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912171"&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903290"&gt;
     &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
@@ -2789,19 +2814,19 @@
 
   &lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>hunt</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it 
asked</em></ins></span>
-    for <span class="removed"><del><strong>&ldquo;whales&rdquo; who 
can</strong></del></span> <span class="inserted"><ins><em>authentication, you 
couldn't</em></ins></span> be <span 
class="removed"><del><strong>led</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
     has no access.  The software in the car is proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>spend a lot</strong></del></span> <span 
class="inserted"><ins><em>the car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
     it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
   &lt;/li&gt;
@@ -2809,11 +2834,10 @@
   &lt;li id="M201306140"&gt;
     &lt;p&gt;Tesla cars allow the company to extract
     data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>get the data and hand it
+    information, but if the state orders it to get the data and hand it
     over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3255,7 +3279,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/02/01 14:33:19 $
+$Date: 2020/02/15 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary-surveillance.ja.po      1 Feb 2020 14:33:19 -0000       1.314
+++ proprietary-surveillance.ja.po      15 Feb 2020 15:02:46 -0000      1.315
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1462,6 +1462,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -3378,6 +3388,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary-surveillance.pot        1 Feb 2020 14:33:19 -0000       1.253
+++ proprietary-surveillance.pot        15 Feb 2020 15:02:46 -0000      1.254
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1061,6 +1061,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\";>
 "
+"snooping and sabotage capabilities</a> if they install their own software on "
+"the device.  Many employers demand to do this.  For the employee, this is "
+"simply nonfree software, as fundamentally unjust and as dangerous as any "
+"other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a "
 
"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\";>
 "
@@ -2695,6 +2705,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a "
+"href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\";> "
+"record and send various kinds of data to the manufacturer</a>. For the user, "
+"access to the data is nearly impossible, as it involves cracking the car's "
+"computer, which is always hidden and running with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a "
 
"href=\"https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html\";>
 "
 "when they go to a junkyard the driver's personal data goes with them</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.584
retrieving revision 1.585
diff -u -b -r1.584 -r1.585
--- proprietary-surveillance.ru.po      3 Feb 2020 08:01:43 -0000       1.584
+++ proprietary-surveillance.ru.po      15 Feb 2020 15:02:47 -0000      1.585
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-01 14:26+0000\n"
+"POT-Creation-Date: 2020-02-15 14:55+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-15 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1498,6 +1499,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"iMonsters and Android phones, when used for work, give employers powerful <a "
+"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-";
+"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
+"a> if they install their own software on the device.  Many employers demand "
+"to do this.  For the employee, this is simply nonfree software, as "
+"fundamentally unjust and as dangerous as any other nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app "
 "requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-";
 "app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
@@ -3951,6 +3962,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-";
+"run-on-the-new-oil.html\"> record and send various kinds of data to the "
+"manufacturer</a>. For the user, access to the data is nearly impossible, as "
+"it involves cracking the car's computer, which is always hidden and running "
+"with proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.de-diff.html    1 Feb 2020 14:33:19 -0000       1.144
+++ proprietary.de-diff.html    15 Feb 2020 15:02:47 -0000      1.145
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></