www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 18 Aug 2020 04:02:35 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/08/18 04:02:34

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po nl.po 
                         pl.po pot proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.520&r2=1.521
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.616&r2=1.617
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.201&r2=1.202

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- de.po       15 Aug 2020 03:31:42 -0000      1.201
+++ de.po       18 Aug 2020 08:02:31 -0000      1.202
@@ -1991,6 +1991,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- es.po       15 Aug 2020 03:31:42 -0000      1.288
+++ es.po       18 Aug 2020 08:02:31 -0000      1.289
@@ -1922,6 +1922,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- fr.po       15 Aug 2020 07:58:34 -0000      1.356
+++ fr.po       18 Aug 2020 08:02:31 -0000      1.357
@@ -1662,6 +1662,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- it.po       15 Aug 2020 03:31:43 -0000      1.201
+++ it.po       18 Aug 2020 08:02:31 -0000      1.202
@@ -1960,6 +1960,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- ja.po       15 Aug 2020 03:31:43 -0000      1.209
+++ ja.po       18 Aug 2020 08:02:31 -0000      1.210
@@ -1511,6 +1511,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.de-diff.html  8 Aug 2020 18:30:57 -0000       1.59
+++ malware-apple.de-diff.html  18 Aug 2020 08:02:31 -0000      1.60
@@ -317,11 +317,9 @@
     <span class="inserted"><ins><em>converting them</em></ins></span> to <span 
class="removed"><del><strong>&lt;a
   
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
-  &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
-
-  &lt;p&gt;The article uses</strong></del></span> <span 
class="inserted"><ins><em>or from Open Document Formats&lt;/a&gt;. iWork
+  &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>or from 
Open Document Formats&lt;/a&gt;. iWork
     formats have changed several times since they were first
-    introduced. This may have had</em></ins></span> the <span 
class="removed"><del><strong>term &ldquo;lock&rdquo; to 
describe</strong></del></span> <span class="inserted"><ins><em>effect of 
thwarting &lt;a
+    introduced. This may have had the effect of thwarting &lt;a
     href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
     efforts&lt;/a&gt;, thus preventing free software from fully supporting
     them.&lt;/p&gt;
@@ -335,142 +333,85 @@
 
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>DRM,
-  but we prefer</strong></del></span> <span class="inserted"><ins><em>rest of 
the file
-  they do not count as malware. We mention them</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
-  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
-  digital handcuffs&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-
-  &lt;li&gt;
-    &lt;p&gt;The Apple Music client
-      program</strong></del></span>
-  <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908310"&gt;
-    &lt;p&gt;A series of vulnerabilities</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
+    &lt;p&gt;A series of vulnerabilities &lt;a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
     in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos and contacts stored 
on</em></ins></span>
-    the user's <span class="removed"><del><strong>file 
system</strong></del></span> <span 
class="inserted"><ins><em>iMonster&lt;/a&gt;.&lt;/p&gt;
+    including private messages, passwords, photos and contacts stored on
+    the user's iMonster&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent on 
Apple</em></ins></span>
-    for <span class="removed"><del><strong>music files, copies 
them</strong></del></span> <span class="inserted"><ins><em>even a modicum of 
security.  It also means that the devices do
-    not even try</em></ins></span> to <span 
class="removed"><del><strong>an</strong></del></span> <span 
class="inserted"><ins><em>offer security against</em></ins></span> Apple
-      <span class="removed"><del><strong>server, and deletes 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>article</strong></del></span> <span 
class="inserted"><ins><em>deep insecurity of iMonsters is even more pertinent 
given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607220"&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker 
to</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code</em></ins></span> from <span 
class="removed"><del><strong>fixing the security bugs in Quicktime for
-      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>any application which uses this API</em></ins></span> 
to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>render a
-    certain kind of image file&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201607220"&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
+    
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malicious code from any application which</em></ins></span> uses <span 
class="inserted"><ins><em>this API to render a
+    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;iOS version 9 for</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604120"&gt;
-    &lt;p&gt;A bug in the</em></ins></span> iThings <span 
class="inserted"><ins><em>Messages app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site to extract all</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not acknowledged that
-    this was wrong.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's messaging
-    history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201604120"&gt;
+    &lt;p&gt;A bug in</em></ins></span> the <span 
class="removed"><del><strong>term &ldquo;lock&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>iThings Messages app &lt;a
+    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+    a malicious web site</em></ins></span> to <span 
class="removed"><del><strong>describe</strong></del></span> <span 
class="inserted"><ins><em>extract all</em></ins></span> the <span 
class="removed"><del><strong>DRM,
+  but</strong></del></span> <span class="inserted"><ins><em>user's messaging
+    history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-  unlocked.&lt;/a&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
+  &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</em></ins></span>
-    The <span class="removed"><del><strong>&ldquo;upgrade&rdquo; also 
deactivated applications</strong></del></span> <span 
class="inserted"><ins><em>NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is</em></ins></span> not 
<span class="removed"><del><strong>approved by &lt;a 
href="/proprietary/proprietary-jails.html"&gt;Apple
-  censorship&lt;/a&gt;.  All</strong></del></span> <span 
class="inserted"><ins><em>much
-    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>was apparently intentional.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods</strong></del></span> <span 
class="inserted"><ins><em>does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>music that users had got from 
internet music
-  stores</strong></del></span> <span class="inserted"><ins><em>universal back 
door</em></ins></span> that <span class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>we know nearly all portable
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that</em></ins></span> we <span 
class="removed"><del><strong>prefer</strong></del></span> <span 
class="inserted"><ins><em>know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Apple 
Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Interference&lt;/h3&gt;
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They
-  are like sabotage, but they are not grave enough</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>qualify for</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span>
-  <span class="inserted"><ins><em>word &ldquo;sabotage&rdquo;. Nonetheless, 
they are nasty and
+  are like sabotage, but they are not grave enough to qualify for the
+  word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
   wrong. This section describes examples of Apple committing
   interference.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908150"&gt;
-    &lt;p&gt;Apple</em></ins></span> is <span 
class="removed"><del><strong>snooping</strong></del></span> <span 
class="inserted"><ins><em>putting DRM</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>iPhone
-    batteries, and the system proprietary software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
+    &lt;p&gt;Apple is putting DRM on iPhone
+    batteries, and the system proprietary software &lt;a
+    
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
     off certain features when batteries are replaced other than by
-    Apple.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
+    Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage 
app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="jails"&gt;Jails&lt;/h3&gt;
 
-&lt;p&gt;Jails are systems that impose censorship</em></ins></span> on <span 
class="removed"><del><strong>iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span> <span 
class="inserted"><ins><em>application programs.&lt;/p&gt;
+&lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201904080"&gt;
-    &lt;p&gt;Apple plans to require</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
-    all application software</em></ins></span> for <span 
class="removed"><del><strong>at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
+    all application software for MacOS be approved by Apple 
first&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an</strong></del></span> <span 
class="inserted"><ins><em>MacOS be approved by</em></ins></span> Apple <span 
class="removed"><del><strong>ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving</strong></del></span> 
<span class="inserted"><ins><em>first&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Offering</em></ins></span> a <span 
class="removed"><del><strong>valid email address</strong></del></span> <span 
class="inserted"><ins><em>checking service as an option could be
-    useful</em></ins></span> and <span class="removed"><del><strong>receiving 
the verification code Apple 
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>would not be wrong.  Requiring 
users</em></ins></span> to <span class="inserted"><ins><em>get</em></ins></span>
-    Apple's <span class="removed"><del><strong>servers 
all</strong></del></span> <span class="inserted"><ins><em>approval is tyranny. 
Apple says</em></ins></span> the <span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo</strong></del></span> <span 
class="inserted"><ins><em>check will
+    &lt;p&gt;Offering a checking service as an option could be
+    useful and would not be wrong.  Requiring users to get
+    Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
     href="/proprietary/malware-apple.html#TOC"&gt;part of
     the operating system&lt;/a&gt;), but Apple could change that policy step
@@ -532,10 +473,10 @@
   &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>video you take,</strong></del></span> <span 
class="inserted"><ins><em>the app censorship prevents security
+    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
-    &lt;p&gt;Apple's censorship of apps is fundamentally 
unjust,</em></ins></span> and <span class="removed"><del><strong>keeps them 
up</strong></del></span> <span class="inserted"><ins><em>would be
+    &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
     inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -547,51 +488,59 @@
 
     &lt;p&gt;The root of these wrongs is in Apple. If Apple had not designed
     the iMonsters to let Apple censor applications, Apple would not have
-    had the power</em></ins></span> to <span class="removed"><del><strong>date 
on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>stop 
users from installing whatever kind of apps.&lt;/p&gt;
+    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature 
is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+    &lt;p&gt;Apple &lt;a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
     deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power to strengthen that of the Chinese 
government.&lt;/p&gt;
+    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
+  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
+  digital handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian 
surveillance</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;</em></ins></span>
-    by <span class="removed"><del><strong>the
-      startup</strong></del></span> <span class="inserted"><ins><em>blocking 
distribution</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program</strong></del></span>
 
-    &lt;p&gt;This is ironic because LinkedIn</em></ins></span> is a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
-    While subjecting its users to its own surveillance, it tries to
-    protect its users from Russian surveillance, and is therefore subject
+  <span class="inserted"><ins><em>&lt;li id="M201701064"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian 
surveillance</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>user's file</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is ironic because LinkedIn is a 
surveillance</em></ins></span> system <span class="removed"><del><strong>for 
music files, copies them</strong></del></span> <span 
class="inserted"><ins><em>itself.
+    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>an Apple
+      server,</strong></del></span> <span class="inserted"><ins><em>its own 
surveillance, it tries to
+    protect its users from Russian surveillance,</em></ins></span> and <span 
class="removed"><del><strong>deletes 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is therefore subject
     to Russian censorship.&lt;/p&gt;
 
     &lt;p&gt;However, the point here is the wrong of Apple's censorship of
-    apps.&lt;/p&gt;
+    apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="inserted"><ins><em>enforce China's censorship</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;</em></ins></span>
-    by <span class="removed"><del><strong>default so</strong></del></span> 
<span class="inserted"><ins><em>blocking distribution of the New York Times 
app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;</em></ins></span>
+    &lt;p&gt;Apple <span class="inserted"><ins><em>used its censorship system 
to enforce China's censorship</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>security bugs in Quicktime for
+      Windows&lt;/a&gt;, while refusing to fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>New 
York Times app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games, &lt;a
-    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;iOS version 9 for
+    iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
+    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
     banning some games from the cr&hellip;app store&lt;/a&gt; because of which
-    political points they suggest. Some political points are apparently
+    political points</em></ins></span> they <span 
class="removed"><del><strong>were repaired by someone</strong></del></span> 
<span class="inserted"><ins><em>suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -609,68 +558,92 @@
 
     &lt;p&gt;This particular political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+    affects</em></ins></span> other <span class="removed"><del><strong>than
+    Apple&lt;/a&gt;.</strong></del></span> Apple <span 
class="removed"><del><strong>eventually backed off from this policy under
+    criticism from</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
     applications that show the confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use</em></ins></span> it <span 
class="removed"><del><strong>still counts</strong></del></span> as a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+    Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it to represent confederate army units
+    fighting in</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not 
acknowledged</strong></del></span> <span class="inserted"><ins><em>Civil 
War.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span> <span 
class="inserted"><ins><em>symbol</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-      security to get at them,</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;,</em></ins></span> but <span 
class="removed"><del><strong>NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;This ludicrous rigidity illustrates the point</em></ins></span> 
that
+    <span class="removed"><del><strong>this was wrong.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>even
-    strategic games that use it</em></ins></span> to <span 
class="inserted"><ins><em>represent confederate army units
-    fighting in the Civil War.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An</strong></del></span> Apple <span class="removed"><del><strong>firmware 
&ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated 
applications</strong></del></span> <span 
class="inserted"><ins><em>should</em></ins></span>
+    not <span class="removed"><del><strong>approved by &lt;a 
href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All</strong></del></span> <span 
class="inserted"><ins><em>be allowed to censor apps.  Even if Apple carried 
out</em></ins></span> this <span class="removed"><del><strong>was apparently 
intentional.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point 
that</em></ins></span> Apple <span class="removed"><del><strong>servers unsaved 
documents being
-  edited&lt;/a&gt;. The &lt;a
-  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have</strong></del></span> <span 
class="inserted"><ins><em>should</em></ins></span>
-    not <span class="removed"><del><strong>decided</strong></del></span> <span 
class="inserted"><ins><em>be allowed</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried out this act of
-    censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>even more 
sensitive than</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span>
-    the
-  <span class="removed"><del><strong>things you</strong></del></span> <span 
class="inserted"><ins><em>real issue.  Apple should not</em></ins></span> have 
<span class="removed"><del><strong>stored</strong></del></span> <span 
class="inserted"><ins><em>the power to impose its views
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods the music that users had got from internet music
+  stores that competed</strong></del></span> <span 
class="inserted"><ins><em>act of
+    censorship</em></ins></span> with <span 
class="removed"><del><strong>iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use</strong></del></span> <span 
class="inserted"><ins><em>some care,</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users</strong></del></span> would <span 
class="removed"><del><strong>have no way to tell</strong></del></span> <span 
class="inserted"><ins><em>still be wrong.  Whether racism
+    is bad,</em></ins></span> whether <span class="removed"><del><strong>the 
phone</strong></del></span> <span class="inserted"><ins><em>educating people 
about drone attacks</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>bad, are not
+    the real issue.  Apple should not have the power</em></ins></span> to 
<span class="inserted"><ins><em>impose its views
     about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of</em></ins></span> Apple's <span 
class="removed"><del><strong>servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>2014 to &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app 
on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    ban all bitcoin apps&lt;/a&gt; for the</em></ins></span> iThings <span 
class="inserted"><ins><em>for a time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned</em></ins></span> a <span class="removed"><del><strong>server every 
phone number</strong></del></span> <span class="inserted"><ins><em>game about 
growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has 
made</strong></del></span>
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app</em></ins></span> that <span 
class="inserted"><ins><em>displayed</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>locations
+    of US drone assassinations, giving various excuses. Each
+    time</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the locations
-    of US drone assassinations, giving</em></ins></span> various
-  <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>servers without asking 
permission&lt;/a&gt;.
-  This exposes</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  After the fifth 
rejection, Apple &lt;a
+  &lt;li&gt;&lt;p&gt;Users cannot make an</strong></del></span> <span 
class="inserted"><ins><em>developers fixed one 
&ldquo;problem&rdquo;,</em></ins></span> Apple <span 
class="removed"><del><strong>ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving</strong></del></span>
+    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>verification 
code</strong></del></span> <span class="inserted"><ins><em>fifth 
rejection,</em></ins></span> Apple 
+      <span class="removed"><del><strong>sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>subject matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date</strong></del></span> <span 
class="inserted"><ins><em>app based</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
+      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>the subject matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -679,99 +652,144 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>Big Brother and perhaps</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="removed"><del><strong>other snoops.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
-  because even if today's version doesn't have</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature 
is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>malicious
-  functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many users push back hard, and 
the</strong></del></span> <span class="inserted"><ins><em>company such as Apple 
to say, &ldquo;We allow</em></ins></span> users
-  <span class="removed"><del><strong>can't remove</strong></del></span>
-    <span class="inserted"><ins><em>to turn this off&rdquo; while ensuring 
that few will understand how
-    to actually turn</em></ins></span> it <span 
class="removed"><del><strong>themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>off.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;There is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>company such as Apple</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We allow 
users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn</em></ins></span> it <span 
class="removed"><del><strong>still counts as a
+      surveillance functionality.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
-  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+    &lt;p&gt;Unknown people apparently took</strong></del></span> <span 
class="inserted"><ins><em>off.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send</strong></del></span> <span 
class="inserted"><ins><em>software.  This section</em></ins></span> reports 
<span class="inserted"><ins><em>examples of hard sell and other unjust 
commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take</em></ins></span> advantage of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>their customers by imposing arbitrary 
limits</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span class="inserted"><ins><em>their 
use</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>the software.  This section reports 
examples</em></ins></span> of <span class="removed"><del><strong>them 
through</strong></del></span> <span class="inserted"><ins><em>hard sell and 
other unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri &lt;a
-    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>give 
you information&lt;/a&gt; about music charts if you're not an Apple
-    Music subscriber.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Apple Siri</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
+    to <span class="removed"><del><strong>Apple servers unsaved documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> you <span 
class="removed"><del><strong>have</strong></del></span> <span 
class="inserted"><ins><em>information&lt;/a&gt; about music charts if 
you're</em></ins></span> not <span class="removed"><del><strong>decided to 
save</strong></del></span> <span class="inserted"><ins><em>an Apple
+    Music subscriber.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
-  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span> 
<span class="inserted"><ins><em>which Apple employs its power over 
users</em></ins></span>
-to <span class="removed"><del><strong>Apple.&lt;/p&gt;
+&lt;p&gt;These</em></ins></span> are <span class="removed"><del><strong>even 
more sensitive than the
+  things you have stored</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple admits the
-  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying</strong></del></span> <span class="inserted"><ins><em>directly 
intervene</em></ins></span> in <span class="removed"><del><strong>a search 
facility&lt;/a&gt;, but there's a lot
-  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over 
users</em></ins></span>
+to <span class="inserted"><ins><em>directly intervene in ways that harm them 
or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908130"&gt;
-    &lt;p&gt;When</em></ins></span> Apple <span 
class="removed"><del><strong>has not talked about&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>suspects 
a user of fraud, it
+    judges</em></ins></span> the <span class="removed"><del><strong>files to 
Big Brother</strong></del></span> <span class="inserted"><ins><em>case 
secretly</em></ins></span> and <span class="removed"><del><strong>perhaps to 
other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't have</strong></del></span> <span 
class="inserted"><ins><em>presents the verdict
+    as</em></ins></span> a <span class="removed"><del><strong>malicious
+  functionality, tomorrow's version might add it.</strong></del></span> <span 
class="inserted"><ins><em>fait accompli.</em></ins></span>  The <span 
class="removed"><del><strong>developer won't
+  remove the malfeature unless many users push back hard, 
and</strong></del></span> <span class="inserted"><ins><em>punishment to a user 
found guilty &lt;a
+    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
+    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>users
+  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
+    &lt;p&gt;Apple and Samsung deliberately</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
+    the <span class="removed"><del><strong>latest MacOS send 
reports</strong></del></span> <span class="inserted"><ins><em>performance of 
older phones</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span> 
<span class="inserted"><ins><em>force users</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple admits 
the</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201805310"&gt;
+    &lt;p&gt;Apple has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that Apple</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently</em></ins></span> has <span 
class="removed"><del><strong>not talked about&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>suspects a user</em></ins></span> of <span 
class="removed"><del><strong>iOS seem to exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here is</strong></del></span> 
<span class="inserted"><ins><em>fraud, it
-    judges</em></ins></span> the <span class="inserted"><ins><em>case secretly 
and presents the verdict
-    as a fait accompli.  The punishment to a user found 
guilty</em></ins></span> &lt;a
+  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to <span 
class="removed"><del><strong>exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here</strong></del></span> <span 
class="inserted"><ins><em>do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client</em></ins></span> is <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>free software on other platforms, but not on
+    iThings. Since</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
   
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
   iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples</em></ins></span> the 
<span class="removed"><del><strong>iThing is, and
-  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    changes</em></ins></span> the <span class="removed"><del><strong>iThing 
is, and
+  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
+    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810240"&gt;
-    &lt;p&gt;Apple</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>Samsung deliberately</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
+    &lt;p&gt;Apple will stop</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
-    the performance of older phones to force users to buy their newer
-    phones&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has &lt;a
-    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram</em></ins></span> from <span 
class="removed"><del><strong>iPhones</strong></del></span> <span 
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span 
class="removed"><del><strong>the state&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
month&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>may have 
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to 
do</em></ins></span> with
-  <span class="removed"><del><strong>&lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  remotely extract some data from iPhones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    bugs</em></ins></span> for <span class="removed"><del><strong>the 
state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
   iOS 8 security improvements&lt;/a&gt;; but
   &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
   not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
@@ -781,176 +799,179 @@
 
 &lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of</strong></del></span> 
<span class="inserted"><ins><em>Russia's command to</em></ins></span> Apple 
<span class="removed"><del><strong>programs that block or
-hinder users from switching</strong></del></span> to <span 
class="removed"><del><strong>any alternative 
program&mdash;and,</strong></del></span> <span class="inserted"><ins><em>block
-    Telegram</em></ins></span> in
-<span class="removed"><del><strong>particular, from switching 
to</strong></del></span> <span class="inserted"><ins><em>Russia.&lt;/p&gt;
+&lt;p&gt;In this section, we list characteristics of</strong></del></span> 
<span class="inserted"><ins><em>older model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>programs that block or
+hinder users</strong></del></span> <span class="inserted"><ins><em>stops 
people</em></ins></span> from <span 
class="removed"><del><strong>switching</strong></del></span> <span 
class="inserted"><ins><em>fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070"&gt;
+    &lt;p id="iphone7-sabotage"&gt;The
+    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="removed"><del><strong>any alternative program&mdash;and, in
+particular, from switching</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+    &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is</em></ins></span> free software <span 
class="removed"><del><strong>which can liberate the device
-the software runs on.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(The article uses the term 
&ldquo;lock&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>free software which can 
liberate</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>software runs on.&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>on other platforms, but not on
-    iThings. Since</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely to Apple services&lt;/a&gt; by being designed</strong></del></span> 
<span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app</em></ins></span> to be 
<span class="removed"><del><strong>incompatible with all
-other options, ethical or unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606080"&gt;</em></ins></span>
+    &lt;p&gt;Apple <span class="removed"><del><strong>devices 
lock</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+    stops</em></ins></span> users <span class="inserted"><ins><em>from fixing 
the security bugs</em></ins></span> in <span class="removed"><del><strong>&lt;a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely</strong></del></span> <span class="inserted"><ins><em>Quicktime for 
Windows&lt;/a&gt;,
+    while refusing</em></ins></span> to <span class="inserted"><ins><em>fix 
them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605040"&gt;
+    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being 
designed</strong></del></span> <span class="inserted"><ins><em>Music client 
program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them</em></ins></span> to 
<span class="removed"><del><strong>be incompatible with all
+other options, ethical or unethical.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means
-of converting them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+</em></ins></span>  to <span 
class="inserted"><ins><em>APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows</em></ins></span> or <span 
class="inserted"><ins><em>even older versions of MacOS.&lt;/p&gt;
+formats</strong></del></span> <span class="inserted"><ins><em>an Apple 
server,</em></ins></span>
+    and <span class="inserted"><ins><em>deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706060"&gt;
-    &lt;p&gt;Apple will stop &lt;a
-    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, Apple stops people</em></ins></span> from <span 
class="removed"><del><strong>Open Document Formats&lt;/a&gt;. iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>fixing problems 
themselves;
-    that's</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>thwarting</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+  &lt;li id="M201602050"&gt;
+    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means
+of converting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</em></ins></span>
+    them <span class="removed"><del><strong>to or from Open Document 
Formats&lt;/a&gt;. iWork formats
+have changed several times since</strong></del></span> <span 
class="inserted"><ins><em>irreparably if</em></ins></span> they were <span 
class="removed"><del><strong>first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>repaired by someone 
other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
+    was wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704070"&gt;
-    &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed to</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
+  &lt;li id="M201510020"&gt;
+    &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
 efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;p&gt;iWork formats are considered</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
-    &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the term</em></ins></span> &lt;a
+&lt;p&gt;iWork formats are considered</strong></del></span> <span 
class="inserted"><ins><em>iThings to</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;
 digital
-    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS and iOS, the procedure for</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;In MacOS and iOS,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
+  &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
 converting images</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users</em></ins></span> from <span 
class="inserted"><ins><em>fixing</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing</em></ins></span> to <span class="removed"><del><strong>a 
free format is so tedious
-and time-consuming that users just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>fix them 
itself.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt; to a free format is so 
tedious
+and time-consuming</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that users <span 
class="removed"><del><strong>just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>had got 
from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
+  &lt;li id="M200709270"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 <span class="removed"><del><strong>id="drm"&gt;Apple DRM&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which 
allows</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
-    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>Music client program</em></ins></span> &lt;a
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports 
that</em></ins></span> Apple
+    <span class="inserted"><ins><em>made a practice of surreptitiously 
activating the Siri software</em></ins></span> to &lt;a
   <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
-  watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+  watch the videos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when</em></ins></span> they <span 
class="removed"><del><strong>purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>EU Copyright Directive make it &lt;a
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive 
make</strong></del></span> <span class="inserted"><ins><em>had not activated 
Siri&lt;/a&gt;.
+    This was not just occasional,</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
-      would require circumventing the iOS DRM.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>an Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      illegal</strong></del></span> <span class="inserted"><ins><em>was 
systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings &lt;a
-    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent 
people</strong></del></span> <span class="inserted"><ins><em>eventually backed 
off from this policy under
-    criticism</em></ins></span> from <span 
class="removed"><del><strong>charging an iThing with a 
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  Apple uses DRM software</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>prevent people from charging an iThing with a 
   generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on</strong></del></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>users. However, it has not 
acknowledged</em></ins></span> that <span class="removed"><del><strong>a new 
model</strong></del></span> <span class="inserted"><ins><em>this
-    was wrong.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
-  for monitors</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> to <span 
class="removed"><del><strong>have malicious hardware,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking the users&lt;/a&gt;. Apple did not
-    forcibly install the upgrade</em></ins></span> but <span 
class="removed"><del><strong>DRM software in MacOS is
-  involved in activating</strong></del></span> the <span 
class="removed"><del><strong>hardware.</strong></del></span> <span 
class="inserted"><ins><em>downloading alone caused lots
-    of trouble.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods the music that users had got from internet music
-    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  DRM (digital restrictions mechanisms)</strong></del></span> <span 
class="inserted"><ins><em>these recordings,</em></ins></span> in <span 
class="removed"><del><strong>MacOS&lt;/a&gt;. This article
+  focuses on the fact that</strong></del></span> a <span 
class="removed"><del><strong>new model</strong></del></span> <span 
class="inserted"><ins><em>group that made
+    transcripts</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200709270"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-    unlocked&lt;/a&gt;.</em></ins></span>  The <span 
class="removed"><del><strong>software for accessing iTunes
-  is</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> also <span 
class="removed"><del><strong>responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>deactivated applications
-    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM</strong></del></span> <span class="inserted"><ins><em>them. He does not 
believes</em></ins></span> that <span 
class="removed"><del><strong>caters</strong></del></span> <span 
class="inserted"><ins><em>Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+  and said</strong></del></span> <span class="inserted"><ins><em>prevent this 
is, for the program</em></ins></span> that <span 
class="removed"><del><strong>MacOS would do</strong></del></span>
+    <span class="inserted"><ins><em>controls access to</em></ins></span> the 
<span class="removed"><del><strong>same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-
-&lt;h3 <span class="removed"><del><strong>id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of the</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+iOS,</strong></del></span> <span class="inserted"><ins><em>microphone to 
decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, 
and</em></ins></span> the
+    operating system <span class="removed"><del><strong>of 
the</strong></del></span> <span class="inserted"><ins><em>under it free as 
well. This way, users could make
+    sure</em></ins></span> Apple <span class="removed"><del><strong>iThings, 
is the prototype
+of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201910131"&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from</em></ins></span> Apple <span 
class="removed"><del><strong>iThings, is</strong></del></span> <span 
class="inserted"><ins><em>devices in China to</em></ins></span> the <span 
class="removed"><del><strong>prototype
-of a jail&lt;/a&gt;.  It was Apple</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>introduced the practice of
-designing general purpose computers</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
+    sends browsing data from</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced</strong></del></span> <span 
class="inserted"><ins><em>devices in China to</em></ins></span> the <span 
class="removed"><del><strong>practice of
+designing general purpose computers</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent 
collaborates</em></ins></span>
     with <span class="removed"><del><strong>censorship</strong></del></span> 
<span class="inserted"><ins><em>the Chinese government, its Safe Browsing black 
list most certainly
     contains the websites</em></ins></span> of <span 
class="removed"><del><strong>application
 programs.&lt;/p&gt;
 
-&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="inserted"><ins><em>requests
     originating from single IP addresses, the government can identify
     dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="inserted"><ins><em>Great Nation&rdquo; app requires users 
to grant it</em></ins></span> &lt;a
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a
 <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
 code signing&lt;/a&gt; that</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
@@ -1353,7 +1374,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/08 18:30:57 $
+$Date: 2020/08/18 08:02:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-apple.de.po 8 Aug 2020 18:30:57 -0000       1.154
+++ malware-apple.de.po 18 Aug 2020 08:02:31 -0000      1.155
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1331,6 +1331,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- malware-apple.es.po 9 Aug 2020 10:45:25 -0000       1.186
+++ malware-apple.es.po 18 Aug 2020 08:02:31 -0000      1.187
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -1109,6 +1110,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- malware-apple.fr.po 8 Aug 2020 21:57:59 -0000       1.194
+++ malware-apple.fr.po 18 Aug 2020 08:02:31 -0000      1.195
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-08-08 23:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -1112,6 +1113,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-apple.it-diff.html  8 Aug 2020 18:30:57 -0000       1.66
+++ malware-apple.it-diff.html  18 Aug 2020 08:02:31 -0000      1.67
@@ -348,9 +348,15 @@
   &lt;li id="M201908310"&gt;</em></ins></span>
     &lt;p&gt;A <span 
class="removed"><del><strong>vulnerability</strong></del></span> <span 
class="inserted"><ins><em>series of vulnerabilities &lt;a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found</em></ins></span>
-    in <span class="removed"><del><strong>Apple's Image I/O 
API</strong></del></span> <span class="inserted"><ins><em>iOS</em></ins></span> 
allowed <span class="removed"><del><strong>an attacker</strong></del></span> 
<span class="inserted"><ins><em>attackers to gain access to sensitive 
information
-    including private messages, passwords, photos and contacts stored on
-    the user's iMonster&lt;/a&gt;.&lt;/p&gt;
+    in <span class="removed"><del><strong>Apple's Image I/O 
API</strong></del></span> <span class="inserted"><ins><em>iOS</em></ins></span> 
allowed <span class="removed"><del><strong>an attacker</strong></del></span> 
<span class="inserted"><ins><em>attackers</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this 
API</strong></del></span> <span class="inserted"><ins><em>gain 
access</em></ins></span> to <span class="removed"><del><strong>render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A bug in</strong></del></span> <span 
class="inserted"><ins><em>sensitive information
+    including private messages, passwords, photos and contacts stored 
on</em></ins></span>
+    the <span class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
     Apple's proprietary software makes users totally dependent on Apple
@@ -366,10 +372,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201604120"&gt;
-    &lt;p&gt;A bug in the iThings Messages app &lt;a
+    &lt;p&gt;A bug in the iThings</em></ins></span> Messages app &lt;a
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site to extract all the user's messaging
-    history&lt;/a&gt;.&lt;/p&gt;
+    a malicious web site to extract all the user's messaging <span 
class="removed"><del><strong>history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
@@ -674,38 +681,29 @@
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed</em></ins></span> to &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+    iPhone 7 contains DRM specifically designed to &lt;a
+    
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(The article</em></ins></span> uses <span 
class="removed"><del><strong>this API</strong></del></span> <span 
class="inserted"><ins><em>the term &ldquo;lock&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A bug in</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;&lt;small&gt;(The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
-    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
+  &lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;
+    while refusing to fix them itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201605040"&gt;
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
     &lt;p&gt;The Apple Music client program &lt;a
     
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
     the user's <span class="removed"><del><strong>system. They are like 
sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>file system for music files, copies 
them</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>an Apple server,
@@ -755,6 +753,24 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910131"&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
@@ -1250,7 +1266,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/08 18:30:57 $
+$Date: 2020/08/18 08:02:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-apple.it.po 8 Aug 2020 18:30:57 -0000       1.147
+++ malware-apple.it.po 18 Aug 2020 08:02:31 -0000      1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1342,6 +1342,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-apple.ja-diff.html  8 Aug 2020 18:30:57 -0000       1.81
+++ malware-apple.ja-diff.html  18 Aug 2020 08:02:31 -0000      1.82
@@ -335,26 +335,21 @@
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the 
file</em></ins></span>
-  they <span class="removed"><del><strong>are</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> not <span 
class="removed"><del><strong>grave enough</strong></del></span> <span 
class="inserted"><ins><em>count as malware. We mention them</em></ins></span> 
to <span class="removed"><del><strong>qualify 
-for</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span>
-  <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
-  bugs.&lt;/p&gt;
+  they <span class="removed"><del><strong>are</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> not <span 
class="inserted"><ins><em>count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't 
have</em></ins></span> grave <span 
class="removed"><del><strong>enough</strong></del></span>
+  <span class="inserted"><ins><em>bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908310"&gt;
     &lt;p&gt;A series of vulnerabilities &lt;a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
-    in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span> <span class="inserted"><ins><em>contacts stored 
on
+    in iOS allowed attackers</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
     the user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The deep insecurity</em></ins></span> of <span 
class="inserted"><ins><em>iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent 
on</em></ins></span> Apple <span class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-    <span class="inserted"><ins><em>for even a modicum of security.  It also 
means that the devices do
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on 
Apple</em></ins></span>
+    for <span class="inserted"><ins><em>even a modicum of security.  It also 
means that the devices do
     not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -709,15 +704,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple</em></ins></span> forced millions of iThings to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
-    a system upgrade
-         <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
+    &lt;p&gt;Apple forced millions of iThings to &lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
+  &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
     deleted from iPods the music that users had got from internet music
@@ -731,41 +725,70 @@
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when</em></ins></span> the 
<span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, 
they are nasty</strong></del></span> <span class="inserted"><ins><em>user has
+    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span 
class="removed"><del><strong>wrong.</strong></del></span> <span 
class="inserted"><ins><em>the
+    operating system under it free as well.</em></ins></span> This <span 
class="removed"><del><strong>section describes examples 
of</strong></del></span> <span class="inserted"><ins><em>way, users could make
+    sure</em></ins></span> Apple <span class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>can't listen</em></ins></span> to <span 
class="removed"><del><strong>download a system upgrade</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> the <span 
class="removed"><del><strong>software.  This section reports 
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking the users&lt;/a&gt;.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install</strong></del></span> 
<span class="inserted"><ins><em>devices in China to</em></ins></span> the <span 
class="removed"><del><strong>upgrade but</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
     Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>hard sell</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>other unjust commercial tactics by Apple.&lt;/p&gt;
+    with</em></ins></span> the <span class="removed"><del><strong>downloading 
alone caused lots</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government</em></ins></span> can 
<span class="removed"><del><strong>take advantage of</strong></del></span> 
<span class="inserted"><ins><em>identify
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>customers by imposing arbitrary 
limits</strong></del></span> <span class="inserted"><ins><em>lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>their use 
of</strong></del></span> the <span class="removed"><del><strong>software.  This 
section reports examples of hard sell</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>other unjust 
commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Apple Siri
-      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about music charts if you're not an Apple Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;</strong></del></span>
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
+&lt;p&gt;The wrongs</strong></del></span> <span 
class="inserted"><ins><em>contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
@@ -1199,7 +1222,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/08 18:30:57 $
+$Date: 2020/08/18 08:02:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-apple.ja.po 8 Aug 2020 18:30:57 -0000       1.131
+++ malware-apple.ja.po 18 Aug 2020 08:02:31 -0000      1.132
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1002,6 +1002,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-apple.nl-diff.html  8 Aug 2020 18:30:57 -0000       1.84
+++ malware-apple.nl-diff.html  18 Aug 2020 08:02:31 -0000      1.85
@@ -335,26 +335,21 @@
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the 
file</em></ins></span>
-  they <span class="removed"><del><strong>are</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> not <span 
class="removed"><del><strong>grave enough</strong></del></span> <span 
class="inserted"><ins><em>count as malware. We mention them</em></ins></span> 
to <span class="removed"><del><strong>qualify 
-for</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span>
-  <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
-  bugs.&lt;/p&gt;
+  they <span class="removed"><del><strong>are</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> not <span 
class="inserted"><ins><em>count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't 
have</em></ins></span> grave <span 
class="removed"><del><strong>enough</strong></del></span>
+  <span class="inserted"><ins><em>bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908310"&gt;
     &lt;p&gt;A series of vulnerabilities &lt;a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/"&gt;found
-    in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span> <span class="inserted"><ins><em>contacts stored 
on
+    in iOS allowed attackers</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
     the user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The deep insecurity</em></ins></span> of <span 
class="inserted"><ins><em>iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent 
on</em></ins></span> Apple <span class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-    <span class="inserted"><ins><em>for even a modicum of security.  It also 
means that the devices do
+    &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on 
Apple</em></ins></span>
+    for <span class="inserted"><ins><em>even a modicum of security.  It also 
means that the devices do
     not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -709,15 +704,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple</em></ins></span> forced millions of iThings to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download</em></ins></span>
-    a system upgrade
-         <span class="removed"><del><strong>&lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without</strong></del></span>
 <span class="inserted"><ins><em>without</em></ins></span> asking the 
users&lt;/a&gt;. Apple did not
+    &lt;p&gt;Apple forced millions of iThings to &lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
     forcibly install the upgrade but the downloading alone caused lots
     of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201412040"&gt;
+  &lt;li id="M201412040"&gt;
     &lt;p&gt;Apple &lt;a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
     deleted from iPods the music that users had got from internet music
@@ -731,41 +725,70 @@
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
     not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
     censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when</em></ins></span> the 
<span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, 
they are nasty</strong></del></span> <span class="inserted"><ins><em>user has
+    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span 
class="removed"><del><strong>wrong.</strong></del></span> <span 
class="inserted"><ins><em>the
+    operating system under it free as well.</em></ins></span> This <span 
class="removed"><del><strong>section describes examples 
of</strong></del></span> <span class="inserted"><ins><em>way, users could make
+    sure</em></ins></span> Apple <span class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>can't listen</em></ins></span> to <span 
class="removed"><del><strong>download a system upgrade</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> the <span 
class="removed"><del><strong>software.  This section reports 
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking the users&lt;/a&gt;.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install</strong></del></span> 
<span class="inserted"><ins><em>devices in China to</em></ins></span> the <span 
class="removed"><del><strong>upgrade but</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
     Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>hard sell</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>other unjust commercial tactics by Apple.&lt;/p&gt;
+    with</em></ins></span> the <span class="removed"><del><strong>downloading 
alone caused lots</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="removed"><del><strong>trouble.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government</em></ins></span> can 
<span class="removed"><del><strong>take advantage of</strong></del></span> 
<span class="inserted"><ins><em>identify
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>customers by imposing arbitrary 
limits</strong></del></span> <span class="inserted"><ins><em>lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>their use 
of</strong></del></span> the <span class="removed"><del><strong>software.  This 
section reports examples of hard sell</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>other unjust 
commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Apple Siri
-      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about music charts if you're not an Apple Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>give you information&lt;/a&gt;
+      about music charts if you're not an Apple Music subscriber.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
-&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;</strong></del></span>
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>wrongs</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
+&lt;p&gt;The wrongs</strong></del></span> <span 
class="inserted"><ins><em>contain a
     back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span class="removed"><del><strong>section are not 
precisely malware, since they do
 not involve making</strong></del></span>
@@ -1199,7 +1222,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/08 18:30:57 $
+$Date: 2020/08/18 08:02:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-apple.nl.po 8 Aug 2020 18:30:57 -0000       1.85
+++ malware-apple.nl.po 18 Aug 2020 08:02:31 -0000      1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -990,6 +990,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-apple.pot   8 Aug 2020 18:30:57 -0000       1.95
+++ malware-apple.pot   18 Aug 2020 08:02:31 -0000      1.96
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -785,6 +785,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a "
+"href=\"https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf\";>
 "
+"record users' conversations when they had not activated Siri</a>.  This was "
+"not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a "
 
"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\";>
 "
 "sends browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- malware-apple.ru.po 17 Aug 2020 10:32:07 -0000      1.244
+++ malware-apple.ru.po 18 Aug 2020 08:02:31 -0000      1.245
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-08-08 18:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1103,6 +1104,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- nl.po       15 Aug 2020 03:31:43 -0000      1.202
+++ nl.po       18 Aug 2020 08:02:31 -0000      1.203
@@ -1568,6 +1568,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- pl.po       15 Aug 2020 03:31:43 -0000      1.201
+++ pl.po       18 Aug 2020 08:02:31 -0000      1.202
@@ -1330,6 +1330,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- pot 15 Aug 2020 03:31:43 -0000      1.200
+++ pot 18 Aug 2020 08:02:31 -0000      1.201
@@ -1158,6 +1158,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary-surveillance.de-diff.html       15 Aug 2020 07:00:38 -0000      
1.121
+++ proprietary-surveillance.de-diff.html       18 Aug 2020 08:02:31 -0000      
1.122
@@ -646,26 +646,17 @@
     Google
     Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Could Google</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps from
-    cheating?  There is no systematic way for Google, or Android
-    users, to inspect executable proprietary apps to see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps,</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>study the
-    source code somehow to determine whether they 
mistreat</strong></del></span> users <span class="removed"><del><strong>in
-    various ways. If it did a good job of this,</strong></del></span> <span 
class="inserted"><ins><em>cannot stop
-    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>could more or less
-    prevent such snooping, except when the app developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones
-    to have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to</em></ins></span> have <span 
class="removed"><del><strong>done</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -676,28 +667,52 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made</em></ins></span> a <span class="removed"><del><strong>better 
job</strong></del></span> <span 
class="inserted"><ins><em>practice</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
+    cheating?  There is no</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was</em></ins></span> systematic <span 
class="removed"><del><strong>way for Google, or Android
+    users,</strong></del></span> <span 
class="inserted"><ins><em>practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>inspect executable proprietary 
apps</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for</strong></del></span> these 
<span class="removed"><del><strong>apps, and study the
+    source code somehow to determine whether they mistreat 
users</strong></del></span> <span 
class="inserted"><ins><em>recordings,</em></ins></span> in
+    <span class="removed"><del><strong>various ways. If it 
did</strong></del></span> a <span class="removed"><del><strong>good 
job</strong></del></span> <span class="inserted"><ins><em>group that made
+    transcripts</em></ins></span> of <span class="removed"><del><strong>this, 
it could more or less</strong></del></span> <span 
class="inserted"><ins><em>them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to</em></ins></span> prevent <span 
class="removed"><del><strong>such snooping, except when</strong></del></span> 
<span class="inserted"><ins><em>this is, for</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>program that
+    controls access</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
 
   &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>check URLs that 
possibly correspond</em></ins></span> to
-    <span class="inserted"><ins><em>&ldquo;fraudulent&rdquo; websites. Since 
Tencent collaborates
+    Google</strong></del></span> <span 
class="inserted"><ins><em>microphone</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>decide when the user 
has
+    &ldquo;activated&rdquo; any service,</em></ins></span> to <span 
class="inserted"><ins><em>be free software, and</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to</em></ins></span> the 
<span class="removed"><del><strong>privacy and security
+    of 283 Android VPN apps concluded</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with</em></ins></span> the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
-    contains</em></ins></span> the <span class="removed"><del><strong>privacy 
and security
-    of 283 Android VPN apps concluded that &ldquo;in 
spite</strong></del></span> <span 
class="inserted"><ins><em>websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>requests
-    originating from single IP addresses,</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject
-    to poor security guarantees</strong></del></span> <span 
class="inserted"><ins><em>government can identify
+    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
+    contains</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>websites</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely subject
+    to poor security guarantees</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
     dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>abusive practices inflicted by
     VPN apps.&rdquo;&lt;/p&gt;
 
@@ -737,38 +752,37 @@
 
   &lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>read logs
       for other apps and also core system logs. TigerVPN developers
       have confirmed this.&lt;/dd&gt;
 
     &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>HTML 
pages returned to</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose of the JS 
injection is</strong></del></span> <span class="inserted"><ins><em>obvious way 
&lt;a
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    doesn't really</em></ins></span> turn them <span 
class="removed"><del><strong>over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>off&lt;/a&gt;.  
A more advanced way really does turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span class="removed"><del><strong>the
+      users. The stated purpose of the JS injection is</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
     no way to tell whether</em></ins></span> the
       <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
       website).&lt;/dd&gt;
@@ -811,38 +825,37 @@
 
     &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
   It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  for that word</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
   perfectly.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-    information&lt;/a&gt; as accessed</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
   &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>24 Sep 2015.) The 
iCloud feature is</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or 
played</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span>
 by <span class="removed"><del><strong>TV programs&lt;/a&gt;.
+  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span>
 by
+       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
        &lt;/p&gt;
 
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>the
-    startup</em></ins></span> of <span class="removed"><del><strong>Android 
apps can collude</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
-    don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>transmit users' personal
-       data</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>default 
so it still counts as a
     surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of 
this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
        tens</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
@@ -860,413 +873,407 @@
 
 &lt;p&gt;Merely asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most 
users</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
+    &lt;p&gt;This may</em></ins></span> have
+<span class="removed"><del><strong>stopped reading the &ldquo;Terms and 
Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>improved with 
&lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google
+and</strong></del></span> <span class="inserted"><ins><em>exist
+    for no possible purpose</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>than 
surveillance&lt;/a&gt;.  Here is</em></ins></span> the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>Conditions&rdquo; 
that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span>
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>iThing is,</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span>
     <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>NSA snoop on 
all</em></ins></span> the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+  &lt;p&gt;The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="removed"><del><strong>takes for granted that the usual analytics tools 
are
+  legitimate,</strong></del></span> <span class="inserted"><ins><em>talks 
about iOS 6,</em></ins></span> but <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>still true in iOS 
7.)&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    to <span class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving a valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>verification code Apple sends</em></ins></span>
+    to <span class="removed"><del><strong>any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  This is
-    yet another example of</strong></del></span> <span 
class="inserted"><ins><em>a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions</em></ins></span> the <span class="removed"><del><strong>EU 
Copyright Directive</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
+    visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other</em></ins></span> nonfree <span 
class="removed"><del><strong>software pretending to obey the user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>programs snoop too. For instance, Spotify and
-    other streaming dis-services make</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services</em></ins></span> make <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>a dossier about each user, and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
+    users identify themselves</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
 
+    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>dossier 
about each user,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they 
make</em></ins></span>
-    users <span class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>same wrongs when</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really</strong></del></span> <span 
class="inserted"><ins><em>culprits are not Chinese,
+    but we condemn this no matter who</em></ins></span> does <span 
class="removed"><del><strong>turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>identify 
themselves</em></ins></span> to <span class="inserted"><ins><em>pay&lt;/a&gt;.  
Out, out, damned Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>same wrongs 
when</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span>
 
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>culprits</em></ins></span> are not <span 
class="removed"><del><strong>free software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;p&gt;The article takes for granted that the usual analytics tools are
-  legitimate,</strong></del></span> <span 
class="inserted"><ins><em>Chinese,</em></ins></span>
-    but <span class="removed"><del><strong>is that valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>we condemn 
this</em></ins></span> no <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>matter who does it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to
-  <span class="removed"><del><strong>analyze</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising</em></ins></span>
-    what <span class="removed"><del><strong>users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the &ldquo;consent&rdquo; was 
for.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
-    &lt;p&gt;An</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>phone was 
observed</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even</em></ins></span> when <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;location services&rdquo;</em></ins></span> are 
<span class="removed"><del><strong>sold.
-      Some Motorola</strong></del></span> <span 
class="inserted"><ins><em>turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
+    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
+    the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS apps</strong></del></span> 
<span class="inserted"><ins><em>Android)</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>completely stop</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and location 
<span class="removed"><del><strong>information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>tracking, you must
+    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>completely stop</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
 
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This is
-    yet another example of nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>tracking.  
This</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup</strong></del></span>
+    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; 
means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    when</em></ins></span> it's <span class="removed"><del><strong>active by 
default so it still counts as</strong></del></span> <span 
class="inserted"><ins><em>actually doing something else.  
Such</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because 
this</strong></del></span> <span class="inserted"><ins><em>user,
-    when it's actually doing something else.  Such a thing</em></ins></span> 
would <span class="removed"><del><strong>require circumventing the iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>thing would be almost
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
-      obvious way</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span>
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span class="inserted"><ins><em>users.  Said 
transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute 
spying</em></ins></span>
+    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed to break Apple's
+      security to get at them, but NSA can</strong></del></span> <span 
class="inserted"><ins><em>some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>any 
file on the system.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    Samsung's back door&lt;/a&gt; provides</em></ins></span> access <span 
class="inserted"><ins><em>to</em></ins></span> any <span 
class="removed"><del><strong>of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>file on</em></ins></span> the <span 
class="inserted"><ins><em>system.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+  &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span>
+    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in 
Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+    the <span class="removed"><del><strong>iThing is,</strong></del></span> 
<span class="inserted"><ins><em>FBI can remotely activate the 
GPS</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
+  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which</strong></del></span> <span class="inserted"><ins><em>microphone in 
Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  
Here</em></ins></span> is &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version</em></ins></span> of <span 
class="inserted"><ins><em>Android that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone <span 
class="removed"><del><strong>number that the user types into it&lt;/a&gt;; the 
server records these numbers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="removed"><del><strong>at least 
30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>voice all the 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
+    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
+    by <span class="removed"><del><strong>default, 
though</strong></del></span> <span class="inserted"><ins><em>Google, use a 
modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens</em></ins></span> for <span class="inserted"><ins><em>voice 
all</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>is not enough</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out 
what</em></ins></span>
-    they <span class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>personal details of 
users that install</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>still counts as a
-      surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>collects on users, instead</em></ins></span> of 
<span class="removed"><del><strong>this</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, 
instead</em></ins></span> of <span class="removed"><del><strong>iOS 
seem</strong></del></span>
     <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    and</em></ins></span> other <span class="removed"><del><strong>than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>companies from getting this personal information 
in</em></ins></span> the
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA</strong></del></span>
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span> <span class="inserted"><ins><em>contain JavaScript 
code,</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
     sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used</em></ins></span> by <span 
class="removed"><del><strong>default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>most US libraries,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of</em></ins></span> data <span 
class="removed"><del><strong>from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-    needed to check DRM!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    send</em></ins></span> lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even</em></ins></span> which <span 
class="removed"><del><strong>enable them to turn</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;div <span class="inserted"><ins><em>class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;div</em></ins></span> class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is 
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions</em></ins></span>
-    for <span class="removed"><del><strong>Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Firefox and Chrome were found</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>and off, 
listen to the microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and 
web</strong></del></span> <span class="inserted"><ins><em>users' 
detailed</em></ins></span> browsing <span 
class="removed"><del><strong>history,</strong></del></span> <span 
class="inserted"><ins><em>habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>Google
+    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from the
+      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>AVG extensions
+    for Firefox</em></ins></span> and <span 
class="removed"><del><strong>web</strong></del></span> <span 
class="inserted"><ins><em>Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed</em></ins></span> browsing <span 
class="removed"><del><strong>history,</strong></del></span> <span 
class="inserted"><ins><em>habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>Google
     removed</em></ins></span> the <span class="removed"><del><strong>contact 
list. This malware is designed</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
     once more how unsafe nonfree software can be. Tools that are 
supposed</em></ins></span>
     to
@@ -1295,206 +1302,203 @@
   &lt;li&gt;&lt;p&gt;A Motorola phone
       &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
       listens</strong></del></span> <span class="inserted"><ins><em>nonfree 
software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    paying</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
       Street Journal (in an article blocked from us by a paywall)
       reports that
       &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
       (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat 
app's principal purpose</strong></del></span> <span 
class="inserted"><ins><em>program could be doing this, and 
that</em></ins></span> is <span class="inserted"><ins><em>a good
-    reason</em></ins></span> to <span class="removed"><del><strong>restrict
-      the</strong></del></span> use <span class="inserted"><ins><em>free 
software instead.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+      to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
+      the use of data on the user's computer, but it does surveillance
       too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>device.  
Many employers demand</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>user's list of</strong></del></span>
-    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust
-    and as dangerous as any</em></ins></span> other <span 
class="removed"><del><strong>people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree software.&lt;/p&gt;</em></ins></span>
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>and dis-service spy on users even more 
than</strong></del></span> <span 
class="inserted"><ins><em>requires</em></ins></span> users
-      <span class="removed"><del><strong>expected. It</strong></del></span> 
<span class="inserted"><ins><em>to grant it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span>
-    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202003010"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Alipay Health Code</em></ins></span> app
+    <span class="inserted"><ins><em>estimates whether the user has 
Covid-19</em></ins></span> and <span class="removed"><del><strong>dis-service 
spy on users even more than users
+      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to a movie&lt;/a&gt;.
     &lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="inserted"><ins><em>is mandatory at some 
workplaces.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>this 
article misuses</strong></del></span> the <span 
class="removed"><del><strong>words
+  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
+    &lt;p&gt;The ToToc messaging</em></ins></span> app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note</strong></del></span> that <span 
class="inserted"><ins><em>is a good
+    reason to use free software instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note:</em></ins></span> this article <span 
class="removed"><del><strong>misuses</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
       referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</strong></del></span> <span 
class="inserted"><ins><em>Android version
-    of the app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>Apple, &ldquo;this 
kind of
-    &lsquo;superuser&rsquo; surveillance could not</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in</em></ins></span>
+    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software</em></ins></span> on <span class="removed"><del><strong>what 
people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand</em></ins></span> 
to <span class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+               &lt;p&gt;Faceapp appears</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>demands to personal data in</strong></del></span> 
<span class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> <span class="inserted"><ins><em>grant 
it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
+    access <span class="removed"><del><strong>it demands</strong></del></span> 
to <span class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>the phone's microphone, photos, text messages, 
contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order to use 
one</em></ins></span> of its <span class="removed"><del><strong>phones. The app 
will give Verizon the same
-   information about the</strong></del></span>
-    <span class="inserted"><ins><em>functionalities.&lt;/p&gt;
-  &lt;/li&gt;
+        announced an opt-in proprietary search</strong></del></span> <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
+    app <span class="removed"><del><strong>that it will&lt;/a&gt;
+        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>is mandatory at</em></ins></span> some <span 
class="removed"><del><strong>of its phones.</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of</em></ins></span> users' <span 
class="removed"><del><strong>searches that Google normally gets when
+    &lt;p&gt;Note:</em></ins></span> The <span 
class="removed"><del><strong>app will give Verizon the same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>Google 
normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on</strong></del></span> <span 
class="inserted"><ins><em>tests were</em></ins></span> only <span 
class="removed"><del><strong>one phone&lt;/a&gt;, and</strong></del></span> 
<span class="inserted"><ins><em>performed on</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>Android version
+    of</em></ins></span> the <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There</em></ins></span> is <span 
class="inserted"><ins><em>a
-    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>list of all</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With a free program there would not be a list</em></ins></span> 
of <span class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>who has installed
-    it.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the app <span 
class="removed"><del><strong>remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions 
in order to use one</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  can</strong></del></span> <span class="inserted"><ins><em>proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
   on many sorts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
-    of <span class="removed"><del><strong>data in</strong></del></span> the 
<span class="removed"><del><strong>phone, and</strong></del></span> <span 
class="inserted"><ins><em>operating system,</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>order to gather as much private data as
-    they possibly can.&lt;/p&gt;
-
-    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'</strong></del></span>
 <span class="inserted"><ins><em>trust is
-    having control over the software we run.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users'</em></ins></span> movements <span 
class="removed"><del><strong>before and after</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to 
locations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
+        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to 
gather</em></ins></span> as <span class="removed"><del><strong>a 
protection</strong></del></span> <span class="inserted"><ins><em>much private 
data as
+    they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>example illustrates how 
&ldquo;getting the user's consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>involves an apparently unintentional weakness in 
Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, we can't trust rules</em></ins></span> against <span 
class="removed"><del><strong>massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905300"&gt;
     &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
@@ -1530,20 +1534,19 @@
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according to who</strong></del></span>
-    <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>&ldquo;anonymized 
and aggregated,&rdquo; it can easily be
-    traced back</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
+    available</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>picture you 
take according</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back</em></ins></span> to <span class="inserted"><ins><em>the 
woman</em></ins></span> who
+      <span class="removed"><del><strong>is in</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span class="inserted"><ins><em>has 
harmful implications for women's rights</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>equal employment
+    and freedom</em></ins></span> to <span class="removed"><del><strong>be
+      sent across the wire to Facebook's servers and face-recognition
       algorithms.&lt;/p&gt;
 
       &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
+      anymore,</strong></del></span> <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use
     these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
     free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
@@ -1596,12 +1599,12 @@
     &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
       QR-code scanner</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>that have 
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data 
without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to 
user-installed apps that have access to</em></ins></span>
-    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access to</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it</em></ins></span> on <span 
class="inserted"><ins><em>to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
 
       &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
       users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
@@ -1611,23 +1614,35 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
     &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending</strong></del></span>
+      sends user data, including geolocation, for</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>to other companies. 
 This shows the
-      weakness</strong></del></span>
+    send sensitive personal data to third parties&lt;/a&gt;, which 
can</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> it 
<span class="removed"><del><strong>asked the</strong></del></span>
     <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send</strong></del></span> <span 
class="inserted"><ins><em>understand. In</em></ins></span> any <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever</em></ins></span> user <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built 
apps that
+    way and released them, apparently</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the 
personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> shows <span class="inserted"><ins><em>that 
no one can trust a nonfree program, not even</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span>
+    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1641,298 +1656,209 @@
   &lt;li&gt;
     &lt;p&gt;A remote-control sex toy was found to make</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed,</em></ins></span> of <span 
class="inserted"><ins><em>which 24,000 (31%) transmit</em></ins></span> the 
<span class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend 
Cayla</strong></del></span> <span class="inserted"><ins><em>companies built 
apps that
-    way</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>released them, apparently not realizing that 
all</em></ins></span> the <span class="removed"><del><strong>toys with a mobile 
phone. This</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected</em></ins></span> would
-      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>listen in on</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span 
class="removed"><del><strong>speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend 
Cayla</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>total) link 
this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="inserted"><ins><em>apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;
+    that</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree software developers from including 
malware</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>surveillance 
feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with 
the app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>was.&lt;/p&gt;
+    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>users, and redirecting
+    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it</strong></del></span> <span 
class="inserted"><ins><em>most of them</em></ins></span> was <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play</em></ins></span> found <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>that &lt;a
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
+    gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>access 
the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>users’ 
privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to spy on <span 
class="removed"><del><strong>children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
+    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could <span 
class="removed"><del><strong>have
+      checked and changed.&lt;/p&gt;
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on</strong></del></span> 
<span class="inserted"><ins><em>users. Other technical flaws were
+    &lt;p&gt;The company</strong></del></span>
+    <span class="inserted"><ins><em>potentially also be used to spy on users. 
Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an 
Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>a back door, 
but</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding</em></ins></span> 
that <span class="removed"><del><strong>could be a
-      misunderstanding.  However,</strong></del></span> it <span 
class="inserted"><ins><em>notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>certainly surveillance,</strong></del></span> 
<span class="inserted"><ins><em>about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data</em></ins></span> at
-      <span 
class="removed"><del><strong>least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
+    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="inserted"><ins><em>side issue. What the company does
+    with the</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is 
that</em></ins></span>
+    the <span class="inserted"><ins><em>company gets that</em></ins></span> 
data <span class="removed"><del><strong>broker would have been 
able</strong></del></span> <span class="inserted"><ins><em>at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the user's actions 
to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>specific sabotage method Lenovo used did 
not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that</em></ins></span> 
the user <span class="removed"><del><strong>was.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the app; others only say that the user is
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
+    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
     a recording. But we can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and collect information about</em></ins></span> its <span 
class="removed"><del><strong>location</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>someone 
else</strong></del></span> <span class="inserted"><ins><em>insecurely snitch on 
its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    their users.  To protect their privacy</em></ins></span> and <span 
class="inserted"><ins><em>freedom, Android users
+    need</em></ins></span> to <span class="removed"><del><strong>transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with 
an</strong></del></span> <span class="inserted"><ins><em>get rid of the 
proprietary software&mdash;both proprietary</em></ins></span>
+    Android <span class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but</strong></del></span> 
<span class="inserted"><ins><em>Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1944,10 +1870,24 @@
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info 
to</em></ins></span> each <span class="removed"><del><strong>subsection --&gt;
+    It</em></ins></span> could be <span class="removed"><del><strong>a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>designed so that users communicate such 
info</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
     <span class="inserted"><ins><em>other but not to the server's 
database.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1961,9 +1901,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1971,10 +1917,11 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -1984,10 +1931,59 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    &lt;p&gt;Google</em></ins></span> did not <span 
class="removed"><del><strong>affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
 <span class="inserted"><ins><em>various ways to prevent that, and deleted 
these apps after
+    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
+    for <span class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>the 
snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -2694,7 +2690,7 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
@@ -2704,7 +2700,7 @@
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
@@ -2734,7 +2730,10 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3806,7 +3805,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- proprietary-surveillance.de.po      15 Aug 2020 03:31:43 -0000      1.335
+++ proprietary-surveillance.de.po      18 Aug 2020 08:02:32 -0000      1.336
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1322,6 +1322,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-surveillance.es.po      15 Aug 2020 03:31:43 -0000      1.59
+++ proprietary-surveillance.es.po      18 Aug 2020 08:02:32 -0000      1.60
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-07-24 10:30+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -959,6 +959,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.520
retrieving revision 1.521
diff -u -b -r1.520 -r1.521
--- proprietary-surveillance.fr.po      15 Aug 2020 07:58:34 -0000      1.520
+++ proprietary-surveillance.fr.po      18 Aug 2020 08:02:32 -0000      1.521
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-08-15 09:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -955,6 +956,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary-surveillance.it-diff.html       15 Aug 2020 07:00:38 -0000      
1.187
+++ proprietary-surveillance.it-diff.html       18 Aug 2020 08:02:32 -0000      
1.188
@@ -674,7 +674,7 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+    &lt;p&gt;Google Play (a component</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -684,25 +684,40 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating</em></ins></span> the 
<span class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable</strong></del></span> <span class="inserted"><ins><em>check 
URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent 
collaborates</em></ins></span>
-    with <span class="removed"><del><strong>free software.&lt;/p&gt;
-
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> the <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black 
list</em></ins></span> most <span class="removed"><del><strong>popular Android 
apps
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>Siri software</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated 
Siri&lt;/a&gt;.</em></ins></span>
+    This <span class="removed"><del><strong>is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>was not just occasional, it was systematic 
practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>them. He does not believes that Apple has 
ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span 
class="removed"><del><strong>user,</strong></del></span> <span 
class="inserted"><ins><em>program that
+    controls access to the microphone to decide</em></ins></span> when <span 
class="removed"><del><strong>it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>the user has
+    &ldquo;activated&rdquo; any service, to</em></ins></span> be <span 
class="removed"><del><strong>almost
+    unthinkable with</strong></del></span> free <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular Android apps
   &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
   behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
     contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
@@ -714,50 +729,49 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>the app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  was</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>takes for granted 
that</strong></del></span> <span class="inserted"><ins><em>mentions specific 
examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>Washington Post, The Weather
     Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
   legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
-    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers 
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps 
contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is</em></ins></span> no <span 
class="removed"><del><strong>right to
-  analyze</strong></del></span> <span 
class="inserted"><ins><em>telling</em></ins></span> what <span 
class="removed"><del><strong>users are doing or how.  &ldquo;Analytics&rdquo; 
tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  &lt;li&gt;&lt;p&gt;Gratis Android</strong></del></span> <span 
class="inserted"><ins><em>most nonfree</em></ins></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.</strong></del></span> <span class="inserted"><ins><em>contain
+    trackers.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>of these</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>personally identifying</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> such as <span 
class="removed"><del><strong>Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
       Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal</em></ins></span> to <span class="removed"><del><strong>any 
file</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy</em></ins></span> on <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
     this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -820,7 +834,10 @@
     server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving the code Apple
       sends to it.&lt;/p&gt;
   &lt;/li&gt;
@@ -831,10 +848,7 @@
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>Apple's servers 
all</em></ins></span> the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -858,69 +872,48 @@
     security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+  &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which 
is</strong></del></span> <span class="inserted"><ins><em>the 
state&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks 
about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;</em></ins></span>
-    iOS <span class="removed"><del><strong>6,</strong></del></span> <span 
class="inserted"><ins><em>8 security improvements&lt;/a&gt;;</em></ins></span> 
but <span class="removed"><del><strong>it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This may have improved with &lt;a
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but &lt;a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+  &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
-    for <span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The &lt;a</em></ins></span> class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;</em></ins></span>
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally <span 
class="removed"><del><strong>incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
+  &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
@@ -928,20 +921,41 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track 
users, which</em></ins></span> is <span 
class="removed"><del><strong>the</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
+    to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -952,22 +966,23 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn 
the</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
+    &lt;p&gt;Xiaomi</em></ins></span> phones
+      <span class="removed"><del><strong>on and off, listen 
to</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
     visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span>
-    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user, and &lt;a
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, and &lt;a
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
     &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
@@ -976,14 +991,14 @@
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read 
call,</strong></del></span> location <span class="inserted"><ins><em>data while 
in
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -1063,30 +1078,30 @@
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
       the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
       numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
@@ -1139,9 +1154,8 @@
    information about the users' searches that Google normally gets 
when</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the user <span class="removed"><del><strong>must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+   &lt;p&gt;Currently,</strong></del></span>
+    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1161,10 +1175,12 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to &lt;a
-    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
-    removed</em></ins></span> the <span class="removed"><del><strong>app takes 
effect. However,</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
+    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>users' 
detailed browsing habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="inserted"><ins><em>Google
+    removed</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
     once more how unsafe nonfree software can be. Tools that are supposed
     to protect a proprietary system are, instead, infecting it with
     additional malware (the system itself being</em></ins></span> the
@@ -1182,27 +1198,22 @@
     reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
     often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes</em></ins></span> it <span class="removed"><del><strong>can
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is</em></ins></span> not <span class="removed"><del><strong>only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure 
for the injustice</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It 
may avoid
+    paying for</em></ins></span> the <span class="removed"><del><strong>phone, 
and in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1211,206 +1222,178 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code</em></ins></span> app
-    <span class="inserted"><ins><em>estimates whether the user has Covid-19 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Alipay Health Code</em></ins></span> app <span 
class="removed"><del><strong>tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
+    <span class="inserted"><ins><em>estimates whether</em></ins></span> the 
<span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
+        for</strong></del></span> <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
-    surveillance <span class="removed"><del><strong>software snoop on what 
radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>for other 
companies</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+ and Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
+    surveillance <span class="removed"><del><strong>is 
inadequate</strong></del></span> <span class="inserted"><ins><em>for other 
companies</em></ins></span> as <span class="removed"><del><strong>a protection 
against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new 
voice</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging</em></ins></span> app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span> the <span 
class="removed"><del><strong>picture you take according to who
-      is in</strong></del></span> <span class="inserted"><ins><em>government 
of</em></ins></span> the <span class="removed"><del><strong>frame.&lt;/p&gt;
+    &lt;p&gt;The ToToc</em></ins></span> messaging app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>United Arab 
Emirates&lt;/a&gt;.
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this, and that is a good
-    reason</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>use free software instead.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;free&rdquo; in</em></ins></span>
-    the <span class="removed"><del><strong>wire to Facebook's servers and 
face-recognition
-      algorithms.&lt;/p&gt;
+    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>snoop on what radio</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>sense</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
+    &lt;p&gt;iMonsters</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>Android phones,
     when used for work, give employers powerful &lt;a
     
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt;</em></ins></span> if <span 
class="inserted"><ins><em>they install their own
-    software on</em></ins></span> the <span class="removed"><del><strong>user 
didn't &ldquo;upload&rdquo; them</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand</em></ins></span> to 
<span class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software</em></ins></span> on <span class="removed"><del><strong>various 
sites 
+      such</strong></del></span> <span class="inserted"><ins><em>the device.  
Many employers demand to do this.  For the
+    employee, this is simply nonfree software,</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>fundamentally unjust</em></ins></span>
+    and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span>
-    <span class="inserted"><ins><em>employee, this</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>simply nonfree 
software, as fundamentally unjust</em></ins></span>
-    and <span class="removed"><del><strong>snooping). In August
-      2015</strong></del></span> <span class="inserted"><ins><em>as dangerous 
as any other nonfree software.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
 
-  &lt;li id="M201910130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant</em></ins></span> it 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
+    the Great Nation&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>the 
phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
+    access to the</em></ins></span> phone's <span 
class="removed"><del><strong>photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> the 
<span class="removed"><del><strong>picture you take 
according</strong></del></span> <span class="inserted"><ins><em>Android version 
was found</em></ins></span> to <span class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>frame.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to 
contain</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing 
developers</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether</strong></del></span> <span class="inserted"><ins><em>run any 
code</em></ins></span> they <span class="removed"><del><strong>want that. This 
is a typical example of</strong></del></span> <span 
class="inserted"><ins><em>wish in</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>users'
+      &lt;p&gt;This spyware feature seems to require online access 
to</strong></del></span> <span class="inserted"><ins><em>users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
+    app is mandatory at</em></ins></span> some
+      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version</em></ins></span> of the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android version
+    of the app,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>at least 
is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this 
kind</em></ins></span> of
+    <span class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could 
not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed</em></ins></span> on the 
<span class="removed"><del><strong>user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>app, and 
that, according</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The</em></ins></span> Facebook <span 
class="removed"><del><strong>users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users</em></ins></span> even <span class="removed"><del><strong>if 
the user didn't &ldquo;upload&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>when it is turned off&lt;/a&gt;, after 
tricking</em></ins></span> them <span 
class="removed"><del><strong>to</strong></del></span>
+    <span class="inserted"><ins><em>into giving</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>its
-    functionalities.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>snooping). In 
August
+      2015 it</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    program</em></ins></span> is a <span class="removed"><del><strong>typical 
example</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="inserted"><ins><em>surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
-    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>list</em></ins></span> of <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they</strong></del></span> <span class="inserted"><ins><em>10,000 
or more people
+    who</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
 
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user</strong></del></span> <span 
class="inserted"><ins><em>installed it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;With a free program there would not be a list of 
who</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>operating 
system, in order</em></ins></span> to <span class="removed"><del><strong>spy 
through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>gather as much private data as
-    they possibly can.&lt;/p&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing 
features
+    of the operating system, in order to gather</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>much private data</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span>
+    <span class="inserted"><ins><em>they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
+    &lt;p&gt;Many Android</em></ins></span> apps <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>can track
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>Android,
+    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    tool</em></ins></span> for <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>natalist Christians. 
 It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
@@ -1420,129 +1403,191 @@
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>toys with</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
+    requirement</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary 
phone app&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>be 
allowed into</em></ins></span>
+    the <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute 
by
-      minute (thus, indirectly, whether</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="inserted"><ins><em>can easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should</strong></del></span> <span class="inserted"><ins><em>equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
+    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>statements about</strong></del></span> their <span 
class="removed"><del><strong>products, rather than free software which users 
could have
-      checked and changed.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android 
phones and iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
-      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
-    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="inserted"><ins><em>huge number of &lt;a
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive</em></ins></span> 
data <span class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on 
to user-installed apps that</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who</strong></del></span>
-    the <span class="removed"><del><strong>user was.&lt;/p&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information</strong></del></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>toys with a mobile 
phone.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>results</em></ins></span> in <span 
class="inserted"><ins><em>massive
+    surveillance</em></ins></span> on <span class="removed"><del><strong>a 
child's speech, and even speak
+      into</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
+      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
+    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected</em></ins></span> would <span 
class="removed"><del><strong>have been able to figure out
+      who the user was.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
-    way <span class="removed"><del><strong>to access the data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>and 
released them, apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even the
+    developers</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1552,42 +1597,27 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>apparent violation 
of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This 
proves</em></ins></span>
-    that the <span class="removed"><del><strong>specific sabotage method 
Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>development 
platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
+    them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1597,23 +1627,18 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+      &lt;p&gt;Specifically, it can collect the emails</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
+    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
@@ -1656,123 +1681,252 @@
     the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's 
server&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>will do
+    with</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>company 
does
+    with</em></ins></span> the <span class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>the 
app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span>
+    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> the <span class="removed"><del><strong>cell 
phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>same 
machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>phone company to 
track</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span> 
is <span class="removed"><del><strong>possible to physically 
remove</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
+      cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>other ways</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>turn 
off</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>other kinds of</em></ins></span> location <span 
class="removed"><del><strong>at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information,</strong></del></span>
+    <span class="inserted"><ins><em>tracking,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>most users will be tricked by</em></ins></span> the 
<span class="removed"><del><strong>state orders it to get</strong></del></span> 
<span class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+    a recording. But we can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found to snoop
+    and collect information</em></ins></span> about <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> were <span 
class="removed"><del><strong>programmed</strong></del></span>
+    <span class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
+    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is 
coming</strong></del></span> <span class="inserted"><ins><em>proprietary apps 
by getting apps</em></ins></span> from the <span 
class="removed"><del><strong>user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable</strong></del></span> <span class="inserted"><ins><em>free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>surveillance, 
even</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> if <span 
class="removed"><del><strong>it were not hidden as it was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>HIV-positive, 
then provides</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV will</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>have so much information about its users.
+    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>TVs are</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
+    other but</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report what</strong></del></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying</strong></del></span>
 
-  &lt;li id="M201803050"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    spy</em></ins></span> on 
+      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP 
address&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>after 
going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
@@ -1824,7 +1978,7 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public,</em></ins></span> so <span class="inserted"><ins><em>we can depend 
on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
@@ -2651,124 +2805,57 @@
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the</em></ins></span> Nest 
<span class="removed"><del><strong>Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
-    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
-    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, 
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell 
phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
-    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
-    in the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
-    paying for the subscription,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
@@ -2779,97 +2866,49 @@
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage</em></ins></span> data <span 
class="removed"><del><strong>remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>back 
over</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>house, all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>to get the data
-      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span class="removed"><del><strong>over, the 
state can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
     Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the 
TV</strong></del></span> will <span class="removed"><del><strong>say, 
&ldquo;Without your consent to tracking,</strong></del></span> <span 
class="inserted"><ins><em>teach</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2879,14 +2918,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
     misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
@@ -3551,7 +3585,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary-surveillance.it.po      15 Aug 2020 03:31:43 -0000      1.347
+++ proprietary-surveillance.it.po      18 Aug 2020 08:02:32 -0000      1.348
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1282,6 +1282,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary-surveillance.ja-diff.html       15 Aug 2020 07:00:38 -0000      
1.205
+++ proprietary-surveillance.ja-diff.html       18 Aug 2020 08:02:32 -0000      
1.206
@@ -678,50 +678,94 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating the Siri 
software</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the 
program</em></ins></span> that
+    <span class="inserted"><ins><em>controls access to the microphone to 
decide when</em></ins></span> the user <span class="removed"><del><strong>types 
into it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>has
+    &ldquo;activated&rdquo; any service, to be free software, 
and</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot</strong></del></span>
+    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could</em></ins></span> make <span 
class="removed"><del><strong>an</strong></del></span>
+    <span class="inserted"><ins><em>sure</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal</strong></del></span>
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing</em></ins></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them</strong></del></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
+    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>Apple devices in China to</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
-    contains the websites of political opponents. By linking the requests
+    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular iOS apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
+    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    &lt;p&gt;In spite of</em></ins></span> Apple's <span 
class="removed"><del><strong>servers all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>supposed commitment</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span class="removed"><del><strong>automatically 
updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>busy 
at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.)</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location,</em></ins></span> email <span 
class="inserted"><ins><em>address, phone number or even
-    delivery</em></ins></span> address <span class="inserted"><ins><em>(in the 
case of DoorDash). Once this information
+    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>Washington Post,</em></ins></span> The <span 
class="removed"><del><strong>term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>Weather
+    Channel (owned</em></ins></span> by <span 
class="removed"><del><strong>default so</strong></del></span> <span 
class="inserted"><ins><em>IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But</em></ins></span> it <span 
class="removed"><del><strong>still counts</strong></del></span> <span 
class="inserted"><ins><em>is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>a
+      surveillance</strong></del></span> <span class="inserted"><ins><em>phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
     used for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> the <span 
class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make it &lt;a
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
@@ -732,26 +776,22 @@
     &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's</em></ins></span> Apple
-      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+  &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="removed"><del><strong>their users 
with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -759,18 +799,16 @@
     &lt;p&gt;The iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
     a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 
days.&lt;/p&gt;</em></ins></span>
+    server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. <span 
class="removed"><del><strong>[...]</strong></del></span> <span 
class="inserted"><ins><em>[&hellip;]</em></ins></span> 
&lt;/p&gt;&lt;/blockquote&gt;
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
@@ -781,7 +819,7 @@
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
     iCloud&lt;/a&gt;, but it's active by default so it still counts as a
-    surveillance functionality.&lt;/p&gt;
+    surveillance</em></ins></span> functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
@@ -790,15 +828,15 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
+      the</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>get other</strong></del></span> <span 
class="inserted"><ins><em>regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThing</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
@@ -819,8 +857,8 @@
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other</em></ins></span> info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the 
iThing</em></ins></span> is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
@@ -902,32 +940,32 @@
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
     users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>same wrongs when the 
culprits are not Chinese,
+    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>same wrongs 
when</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>culprits are not Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>contact list.</strong></del></span> 
<span class="inserted"><ins><em>phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
@@ -941,8 +979,8 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the 
tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
     <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
       <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
@@ -996,33 +1034,58 @@
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
       the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other 
people's</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
+    &lt;p&gt;A Motorola</em></ins></span> phone
+      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a 
protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>not enough to
     legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on</strong></del></span> <span 
class="inserted"><ins><em>spell out</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs</strong></del></span>
+    <span class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
+    honestly identify the information it collects</em></ins></span> on <span 
class="removed"><del><strong>various sites</strong></del></span> <span 
class="inserted"><ins><em>users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1030,40 +1093,21 @@
   &lt;li id="M201111170"&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
@@ -1095,7 +1139,10 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM</strong></del></span>
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1113,10 +1160,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
+    &lt;p&gt;Some Avast and AVG extensions
     for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
     snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>Google
@@ -1134,8 +1178,8 @@
       twisted ways that they present snooping as a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who</em></ins></span> is <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
-    often</em></ins></span> a <span class="removed"><del><strong>typical 
example</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The 
result</em></ins></span> is
+    <span class="inserted"><ins><em>often</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
@@ -1262,11 +1306,9 @@
       Here's information on</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1278,8 +1320,11 @@
 
    &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
     being sued</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+  &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
     proprietary program</em></ins></span> for <span 
class="removed"><del><strong>collecting lots</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
@@ -1307,66 +1352,65 @@
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>track
-    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+  &lt;li id="M201905300"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Femm 
&ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>reports the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it</strong></del></span> is <span 
class="removed"><del><strong>surrounded</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt;</em></ins></span> by <span 
class="inserted"><ins><em>natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>its users through the</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a</em></ins></span> proprietary <span 
class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot</em></ins></span> of
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), and the vibration frequency.&lt;/p&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>menstrual and 
pregnancy monitoring apps</em></ins></span> is <span 
class="removed"><del><strong>surrounded by a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers</em></ins></span> and <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>labeling
       standard with which manufacturers would make statements about
-      their products, rather than free software which users can check
+      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span> can <span class="removed"><del><strong>check
       and change.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>woman who uses the 
app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a lot of
+    sensitive data, including user's location and contact 
list,</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
     free-software app that does more or less the same thing without
     spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
@@ -1442,309 +1486,179 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>poor
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>buried in
-    lengthy terms of service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is 
buried</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms of service that are 
difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+  &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>personal
-    data</em></ins></span> they <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>collected would go to Facebook as well.&lt;/p&gt;
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, 
not</em></ins></span> even <span class="removed"><del><strong>which 
page</strong></del></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
     <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
-    misuse users' personal data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>other 
companies, and &lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>development 
platform are ineffective at
+    that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users,</em></ins></span> and 
<span class="inserted"><ins><em>redirecting
+    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to</em></ins></span> make 
<span class="removed"><del><strong>changes</strong></del></span> <span 
class="inserted"><ins><em>uninstallation
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>various
-  settings&lt;/a&gt;.&lt;/p&gt;
+    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;That's easy to do</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk</em></ins></span> because <span 
class="removed"><del><strong>the system has</strong></del></span>
-    <span class="inserted"><ins><em>there is</em></ins></span> no <span 
class="removed"><del><strong>authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really do.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>150 most popular
+    &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for
-    <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
-    potentially also</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>used to spy on users. Other technical flaws were
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The</em></ins></span> 
company <span class="removed"><del><strong>to track the car's movements all
-    the time; it</strong></del></span> is <span 
class="removed"><del><strong>possible to physically remove</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>what it will do
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>not
-      really</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy, and should be 
replaced</strong></del></span> <span class="inserted"><ins><em>side issue. What 
the company does</em></ins></span>
-    with <span class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>data is a 
secondary issue.</em></ins></span> The <span class="removed"><del><strong>other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>principal wrong here is that</em></ins></span>
-    the company <span class="removed"><del><strong>to 
extract</strong></del></span> <span class="inserted"><ins><em>gets 
that</em></ins></span> data <span class="removed"><del><strong>remotely and
-      determine the car's location</strong></del></span> at <span 
class="removed"><del><strong>any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate</em></ins></span> the data
-      <span class="removed"><del><strong>and hand</strong></del></span> it 
<span class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>same machine via
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>app; others only say</em></ins></span> that 
<span class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014,</strong></del></span> <span 
class="inserted"><ins><em>the user is
-    using that app,</em></ins></span> but <span 
class="removed"><del><strong>we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>alone is often 
quite informative.&lt;/p&gt;
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone</em></ins></span> is <span 
class="inserted"><ins><em>often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>phones of users</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record the user's location</em></ins></span> even when <span 
class="inserted"><ins><em>users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>other ways</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than</strong></del></span> 
other <span class="removed"><del><strong>TV manufacturers in spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>kinds of location
+    &lt;p&gt;There are other ways to turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and 
-      <span class="removed"><del><strong>link</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>your IP address&lt;/a&gt; so that advertisers can 
track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>act as spies for 
licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We expect</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>an injustice 
already.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>no 
way</em></ins></span> to <span class="inserted"><ins><em>save
-    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1753,152 +1667,87 @@
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied</em></ins></span> by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>researchers were 
found</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping</em></ins></span>
-    in
-      <span class="removed"><del><strong>range so as to 
determine</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs 
recognize</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="inserted"><ins><em>the proprietary apps by getting apps 
from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns</em></ins></span>
-    the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would 
then</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="inserted"><ins><em>so much information about its users.
-    It could be designed so that users communicate such info</em></ins></span> 
to
-      <span class="removed"><del><strong>give it to the US or 
some</strong></del></span> <span 
class="inserted"><ins><em>each</em></ins></span>
-    other <span class="removed"><del><strong>government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is</strong></del></span> <span 
class="inserted"><ins><em>but</em></ins></span> not to <span 
class="removed"><del><strong>be trusted unless it is done
-    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the server's 
database.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+  &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and
-      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
-      transmission reports</strong></del></span> a <span 
class="removed"><del><strong>404 error really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a</em></ins></span> user's <span class="removed"><del><strong>local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed</strong></del></span> <span 
class="inserted"><ins><em>movements around</em></ins></span> a <span 
class="removed"><del><strong>patch to stop this, but any product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+  &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>zero 
price.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>sent them and text messages and 
emails</em></ins></span> to <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; 
even</strong></del></span> <span class="inserted"><ins><em>contrary, it
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
-    discovering</em></ins></span> what <span 
class="removed"><del><strong>their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>they did. So we cannot blame Google specifically
+    discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span class="removed"><del><strong>you can't trust 
a computer with 
-      a</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice of their being
-    nonfree. It also distributes its own</em></ins></span> nonfree <span 
class="removed"><del><strong>operating system.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>apps, such as Google Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>wide range</strong></del></span> <span 
class="inserted"><ins><em>better job</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier,</strong></del></span> <span 
class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="removed"><del><strong>sites made by different 
-      companies.&lt;/p&gt;
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-      &lt;p&gt;They use this data</strong></del></span> <span 
class="inserted"><ins><em>study
-    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt</strong></del></span> <span class="inserted"><ins><em>outsmart the 
checking.&lt;/p&gt;
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
@@ -1906,20 +1755,20 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who</strong></del></span> 
<span class="inserted"><ins><em>BART &lt;a
+    &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by 
TV
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1932,9 +1781,8 @@
   &lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,
-    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also</strong></del></span> <span class="inserted"><ins><em>the audio 
files users listen to
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
@@ -1956,8 +1804,8 @@
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when 
they</em></ins></span> use
-    <span class="inserted"><ins><em>its search engine.&lt;/p&gt;
+    about the users' searches that Google normally gets when they use
+    its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
@@ -1970,7 +1818,7 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to</em></ins></span> a <span 
class="removed"><del><strong>back</strong></del></span> <span 
class="inserted"><ins><em>Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -2666,7 +2514,7 @@
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back</em></ins></span> door 
<span class="inserted"><ins><em>&lt;a
+    update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
@@ -2730,108 +2578,206 @@
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>user reads</strong></del></span> 
<span class="inserted"><ins><em>devices are tethered to. Moreover, they are 
made available to
+    Alexa. As a result, Amazon has a very precise picture of users' 
life</em></ins></span>
+    at <span class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>home, not only in the present, but in the past (and, 
who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service staff even has 
access</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;. 
 Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    tell you how and where</em></ins></span> it's
+      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
+    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span>
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+    paying</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be 
<span class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be</em></ins></span> in
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
+    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>car remotely, the 
cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span class="removed"><del><strong>track 
the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers,</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company &lt;a
+    &lt;p&gt;A medical</em></ins></span> insurance <span 
class="removed"><del><strong>companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>company 
&lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>matter of 
proprietary surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
+      cases mentioned</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of making
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>car's location 
at</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
+    on you.  Even</em></ins></span> if <span class="removed"><del><strong>the 
state orders</strong></del></span> it <span class="removed"><del><strong>to get 
the data
+      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    data about</em></ins></span> the <span class="removed"><del><strong>state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  &lt;li id="M201310260"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
     Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>companies
+    monitor every aspect</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2841,20 +2787,29 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>back door, but</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to report <span class="removed"><del><strong>what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its location to someone else and to transmit 
conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2864,113 +2819,190 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars now &lt;a
-    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;
+    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>send various kinds of data to the 
manufacturer&lt;/a&gt;. For
+    the user, access</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>the data is nearly impossible, 
as</em></ins></span> it <span class="removed"><del><strong>enabled by 
default</strong></del></span> <span class="inserted"><ins><em>involves
+    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
     &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
+    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to the government-run platform.&lt;/p&gt;
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices of radio programs&lt;/a&gt; in its
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
+      the switch to turn this off</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and make changes in various
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf</em></ins></span> has <span 
class="removed"><del><strong>no effect.  (The fact that the
+      transmission reports a 404 error really means nothing; the server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed</strong></del></span> a <span 
class="removed"><del><strong>patch</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
     when accessed through the modem.  However, even if it asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract
-    data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it to get the data and hand it
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
     over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
 
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really a matter of proprietary surveillance. These systems
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter 
of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
     anonymous payment systems, but the invasion isn't done by malware. The
     other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
@@ -3401,7 +3433,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary-surveillance.ja.po      15 Aug 2020 03:31:44 -0000      1.329
+++ proprietary-surveillance.ja.po      18 Aug 2020 08:02:32 -0000      1.330
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -963,6 +963,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary-surveillance.pot        15 Aug 2020 03:31:44 -0000      1.268
+++ proprietary-surveillance.pot        18 Aug 2020 08:02:32 -0000      1.269
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -700,6 +700,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a "
+"href=\"https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf\";>
 "
+"record users' conversations when they had not activated Siri</a>.  This was "
+"not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a "
 
"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\";>
 "
 "sends browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.616
retrieving revision 1.617
diff -u -b -r1.616 -r1.617
--- proprietary-surveillance.ru.po      17 Aug 2020 10:32:07 -0000      1.616
+++ proprietary-surveillance.ru.po      18 Aug 2020 08:02:32 -0000      1.617
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -942,6 +943,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Safari occasionally <a href=\"https://blog.cryptographyengineering.";
 "com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
 "browsing data from Apple devices in China to the Tencent Safe Browsing "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.de-diff.html    15 Aug 2020 07:00:38 -0000      1.167
+++ proprietary.de-diff.html    18 Aug 2020 08:02:32 -0000      1.168
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -57,15 +57,15 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited {
-   color: #004caa;
-   text-decoration: none;
+ #skiplinks a, #skiplinks a:visited</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>color: #004caa;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
@@ -153,11 +153,11 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -212,6 +212,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202008030"&gt;
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
@@ -258,19 +276,6 @@
     to contagious disease that can be fatal.  Software like this should
     be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201504210"&gt;
-    &lt;p&gt;Runescape is a popular online game with some &lt;a
-    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
-    addictive features&lt;/a&gt; derived from &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects of the game, like &lt;a
-    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
-    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
-    thus encourage children and impressionable people to spend money on
-    the game.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -333,7 +338,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.de.po   15 Aug 2020 03:31:44 -0000      1.207
+++ proprietary.de.po   18 Aug 2020 08:02:32 -0000      1.208
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -508,18 +531,6 @@
 "demand it should be prosecuted for it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Runescape is a popular online game with some <a href=\"https://www.reddit.";
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
-"addictions.html#addictiveness\"> behavioral manipulation techniques</a>. "
-"Certain repetitive aspects of the game, like <a href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"> grinding</a>, can be minimised by "
-"becoming a paying member, and can thus encourage children and impressionable "
-"people to spend money on the game."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary.es.po   15 Aug 2020 03:31:44 -0000      1.302
+++ proprietary.es.po   18 Aug 2020 08:02:32 -0000      1.303
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -322,6 +322,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -397,26 +420,6 @@
 "este tipo debería ser ilegal y los jefes que lo impusieran deberían ser "
 "procesados por ello."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Runescape is a popular online game with some <a href=\"https://www.reddit.";
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
-"addictions.html#addictiveness\"> behavioral manipulation techniques</a>. "
-"Certain repetitive aspects of the game, like <a href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"> grinding</a>, can be minimised by "
-"becoming a paying member, and can thus encourage children and impressionable "
-"people to spend money on the game."
-msgstr ""
-"Runescape es un popular juego en línea que posee algunas <a href=\"https://";
-"www.reddit.com/r/runescape/comments/33cd8g/"
-"question_why_is_runescape_so_addicting/\">características adictivas</a> "
-"derivadas de <a href=\"/proprietary/proprietary-addictions.html#addictiveness"
-"\">técnicas de manipulación de conducta</a>. Algunos aspectos repetitivos "
-"del juego, como el <cite><a href=\"https://es.wikipedia.org/wiki/Grind_";
-"(videojuegos)\">grinding</a></cite>, se pueden minimizar mediante pago, "
-"induciendo así a niños y personas influenciables a gastar dinero en el 
juego."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -498,6 +501,26 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Runescape is a popular online game with some <a href=\"https://www.reddit.";
+#~ "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"
+#~ "\"> addictive features</a> derived from <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a>. Certain repetitive aspects of the game, like <a href="
+#~ "\"https://en.wikipedia.org/wiki/Grinding_(video_games)\"> grinding</a>, "
+#~ "can be minimised by becoming a paying member, and can thus encourage "
+#~ "children and impressionable people to spend money on the game."
+#~ msgstr ""
+#~ "Runescape es un popular juego en línea que posee algunas <a href="
+#~ "\"https://www.reddit.com/r/runescape/comments/33cd8g/";
+#~ "question_why_is_runescape_so_addicting/\">características adictivas</a> "
+#~ "derivadas de <a href=\"/proprietary/proprietary-addictions."
+#~ "html#addictiveness\">técnicas de manipulación de conducta</a>. Algunos "
+#~ "aspectos repetitivos del juego, como el <cite><a href=\"https://es.";
+#~ "wikipedia.org/wiki/Grind_(videojuegos)\">grinding</a></cite>, se pueden "
+#~ "minimizar mediante pago, induciendo así a niños y personas 
influenciables "
+#~ "a gastar dinero en el juego."
+
+#~ msgid ""
 #~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
 #~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/";
 #~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- proprietary.fr.po   15 Aug 2020 07:58:34 -0000      1.344
+++ proprietary.fr.po   18 Aug 2020 08:02:32 -0000      1.345
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2020-08-15 09:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-08-18 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -394,27 +418,6 @@
 "contagieuse pouvant être mortelle. Des logiciels de ce type devraient être "
 "illégaux et les boss qui les exigent devraient être poursuivis."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Runescape is a popular online game with some <a href=\"https://www.reddit.";
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
-"addictions.html#addictiveness\"> behavioral manipulation techniques</a>. "
-"Certain repetitive aspects of the game, like <a href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"> grinding</a>, can be minimised by "
-"becoming a paying member, and can thus encourage children and impressionable "
-"people to spend money on the game."
-msgstr ""
-"Ruescape est un jeu en ligne populaire qui comporte des <a href=\"https://";
-"www.reddit.com/r/runescape/comments/33cd8g/"
-"question_why_is_runescape_so_addicting/\">fonctionnalités addictives</a> "
-"basées sur les <a href=\"/proprietary/proprietary-addictions."
-"html#addictiveness\">techniques de manipulation comportementale</a>. "
-"Certains aspects répétitifs du jeu, comme le <a 
href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"><cite>grinding</cite></a>, peuvent être "
-"minimisés en devenant membre payant et peuvent ainsi encourager les enfants "
-"et les personnes influençables à dépenser de l'argent en jouant."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -487,3 +490,24 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Runescape is a popular online game with some <a href=\"https://www.reddit.";
+#~ "com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"
+#~ "\"> addictive features</a> derived from <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a>. Certain repetitive aspects of the game, like <a href="
+#~ "\"https://en.wikipedia.org/wiki/Grinding_(video_games)\"> grinding</a>, "
+#~ "can be minimised by becoming a paying member, and can thus encourage "
+#~ "children and impressionable people to spend money on the game."
+#~ msgstr ""
+#~ "Ruescape est un jeu en ligne populaire qui comporte des <a href=\"https://";
+#~ "www.reddit.com/r/runescape/comments/33cd8g/"
+#~ "question_why_is_runescape_so_addicting/\">fonctionnalités addictives</a> "
+#~ "basées sur les <a href=\"/proprietary/proprietary-addictions."
+#~ "html#addictiveness\">techniques de manipulation comportementale</a>. "
+#~ "Certains aspects répétitifs du jeu, comme le <a href=\"https://en.";
+#~ "wikipedia.org/wiki/Grinding_(video_games)\"><cite>grinding</cite></a>, "
+#~ "peuvent être minimisés en devenant membre payant et peuvent ainsi "
+#~ "encourager les enfants et les personnes influençables à dépenser de "
+#~ "l'argent en jouant."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary.it-diff.html    15 Aug 2020 07:00:38 -0000      1.179
+++ proprietary.it-diff.html    18 Aug 2020 08:02:32 -0000      1.180
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -211,6 +211,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202008030"&gt;
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
@@ -257,19 +275,6 @@
     to contagious disease that can be fatal.  Software like this should
     be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201504210"&gt;
-    &lt;p&gt;Runescape is a popular online game with some &lt;a
-    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
-    addictive features&lt;/a&gt; derived from &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects of the game, like &lt;a
-    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
-    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
-    thus encourage children and impressionable people to spend money on
-    the game.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -332,7 +337,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary.it.po   15 Aug 2020 03:31:44 -0000      1.216
+++ proprietary.it.po   18 Aug 2020 08:02:32 -0000      1.217
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -512,18 +535,6 @@
 "demand it should be prosecuted for it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Runescape is a popular online game with some <a href=\"https://www.reddit.";
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
-"addictions.html#addictiveness\"> behavioral manipulation techniques</a>. "
-"Certain repetitive aspects of the game, like <a href=\"https://en.wikipedia.";
-"org/wiki/Grinding_(video_games)\"> grinding</a>, can be minimised by "
-"becoming a paying member, and can thus encourage children and impressionable "
-"people to spend money on the game."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary.ja-diff.html    15 Aug 2020 07:00:38 -0000      1.184
+++ proprietary.ja-diff.html    18 Aug 2020 08:02:32 -0000      1.185
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -160,12 +160,12 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -209,6 +209,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202008030"&gt;
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
@@ -255,19 +273,6 @@
     to contagious disease that can be fatal.  Software like this should
     be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201504210"&gt;
-    &lt;p&gt;Runescape is a popular online game with some &lt;a
-    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
-    addictive features&lt;/a&gt; derived from &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects of the game, like &lt;a
-    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
-    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
-    thus encourage children and impressionable people to spend money on
-    the game.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -330,7 +335,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/08/15 07:00:38 $
+$Date: 2020/08/18 08:02:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.ja.po   15 Aug 2020 03:31:44 -0000      1.200
+++ proprietary.ja.po   18 Aug 2020 08:02:32 -0000      1.201
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-08-15 03:25+0000\n"
+"POT-Creation-Date: 2020-08-18 07:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
+"surreptitiously activating the Siri software to <a href=\"https://www.";
+"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
+"pdf\"> record users' conversations when they had not activated Siri</a>.  "
+"This was not just occasional, it was systematic practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"His job was to listen to these recordings, in a group that made transcripts "
+"of them. He does not believes that Apple has ceased this practice."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The only reliable way to prevent this is, for the program that controls "
+"access to the microphone to decide when the user has &ldquo;activated&rdquo; "
+"any service, to be free software, and the operating system under it free as "
+"well. This way, users could make sure Apple can't listen to them