www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-surveillance.de....


From: GNUN
Subject: www/proprietary/po proprietary-surveillance.de....
Date: Thu, 25 Jan 2018 13:30:42 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/01/25 13:30:42

Modified files:
        proprietary/po : proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.333&r2=1.334

Patches:
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-surveillance.de.po      19 Jan 2018 14:05:19 -0000      1.197
+++ proprietary-surveillance.de.po      25 Jan 2018 18:30:40 -0000      1.198
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: 2018-01-18 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -182,7 +183,10 @@
 msgstr "<a href=\"#SpywareInChrome\">… in Chrome</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr "<a href=\"#SpywareInFlash\">… in Flash</a>"
 
 #. type: Content of: <div><div><ul><li>
@@ -2944,57 +2948,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"Einige JavaScript-Schadprogramme <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\" title=\"Ad targeters are pulling data from your browser’s password "
-"manager, unter: https://www.theverge.com/2017/12/30/16829804/browser-";
-"password-manager-adthink-princeton-research The Verge 2017.\">greifen "
-"Benutzernamen von browserbasierten Passwort-Managern ab</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"Einige Präsenzen senden JavaScript-Code um alle Benutzereingaben zu sammeln. 
"
-"<a href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-";
-"exfiltration-of-personal-data-by-session-replay-scripts/\" title=\"No "
-"boundaries: Exfiltration of personal data by session-replay scripts, unter: "
-"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/ 2017.\">die dann zum Reproduzieren "
-"der gesamten Sitzung verwendet werden können</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr "Mit <b>LibreJS</b> wird dieses schädliche JavaScript blockiert."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"Viele Internetpräsenzen schleusen JavaScript-Code ein um <a href=\"https://";
-"gizmodo.com/before-you-hit-submit-this-company-has-already-"
-"logge-1795906081\" title=\"Before You Hit ‚Submit‘, This Company Has 
Already "
-"Logged Your Personal Data, Gizmodoo 2017.\">vom Nutzer eingegebene "
-"Informationen in Formularen auszuspionieren, die noch nicht abgesendet sind</"
-"a>, um mehr über deren Identität zu erfahren. Einige wurden <a href="
-"\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-";
-"Illegally-Tracked-Consumers-New-Suits-Allege\" title=\"Sites Illegally "
-"Tracked Consumers New Suits Allege, Manatt 2017.\">nun verklagt</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 "sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -3110,6 +3063,102 @@
 "[9]</a>"
 
 #. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Spionageprogramme in Flash<ins>-Animationen</ins>"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr " "
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"Einige JavaScript-Schadprogramme <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\" title=\"Ad targeters are pulling data from your browser’s password "
+"manager, unter: https://www.theverge.com/2017/12/30/16829804/browser-";
+"password-manager-adthink-princeton-research The Verge 2017.\">greifen "
+"Benutzernamen von browserbasierten Passwort-Managern ab</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"Einige Präsenzen senden JavaScript-Code um alle Benutzereingaben zu sammeln. 
"
+"<a href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-";
+"exfiltration-of-personal-data-by-session-replay-scripts/\" title=\"No "
+"boundaries: Exfiltration of personal data by session-replay scripts, unter: "
+"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/ 2017.\">die dann zum Reproduzieren "
+"der gesamten Sitzung verwendet werden können</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr "Mit <b>LibreJS</b> wird dieses schädliche JavaScript blockiert."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Viele Internetpräsenzen schleusen JavaScript-Code ein um <a href=\"https://";
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\" title=\"Before You Hit ‚Submit‘, This Company Has 
Already "
+"Logged Your Personal Data, Gizmodoo 2017.\">vom Nutzer eingegebene "
+"Informationen in Formularen auszuspionieren, die noch nicht abgesendet sind</"
+"a>, um mehr über deren Identität zu erfahren. Einige wurden <a href="
+"\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-";
+"Illegally-Tracked-Consumers-New-Suits-Allege\" title=\"Sites Illegally "
+"Tracked Consumers New Suits Allege, Manatt 2017.\">nun verklagt</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"Flash Player-Funktion hilft <a href=\"//www.imasuper.com/66/technology/flash-"
+"cookies-the-silent-privacy-killer/\" title=\"Flash Cookies: The Silent "
+"Privacy Killer, unter: imasuper.com 2008.\">Besucher von Internetpräsenzen "
+"mittels Flash-Cookie zu verfolgen</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# | 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
+# | &ldquo;fingerprinting&rdquo; devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/";
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+"Flash wird ebenso für <a 
href=\"//arstechnica.com/security/2013/10/top-sites-"
+"and-maybe-the-nsa-track-users-with-device-fingerprinting/\" title=\"Top "
+"sites (and maybe the NSA) track users with “device fingerprinting”, 
unter: "
+"arstechnica.com 2013.\">„Fingerabdruck“-Geräte</a> zur Identifizierung 
von "
+"Nutzern verwendet."
+
+#. type: Content of: <div><h4>
 msgid "Spyware in Chrome"
 msgstr "Spionageprogramme in Chrome"
 
@@ -3163,47 +3212,6 @@
 "labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">Browserverlauf total auszuschnüffeln</a>. Und viele tun dies auch."
 
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Spionageprogramme in Flash<ins>-Animationen</ins>"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr " "
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"Flash Player-Funktion hilft <a href=\"//www.imasuper.com/66/technology/flash-"
-"cookies-the-silent-privacy-killer/\" title=\"Flash Cookies: The Silent "
-"Privacy Killer, unter: imasuper.com 2008.\">Besucher von Internetpräsenzen "
-"mittels Flash-Cookie zu verfolgen</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-";
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> &ldquo;"
-"fingerprinting&rdquo; devices </a> to identify users."
-msgstr ""
-"Flash wird ebenso für <a 
href=\"//arstechnica.com/security/2013/10/top-sites-"
-"and-maybe-the-nsa-track-users-with-device-fingerprinting/\" title=\"Top "
-"sites (and maybe the NSA) track users with “device fingerprinting”, 
unter: "
-"arstechnica.com 2013.\">„Fingerabdruck“-Geräte</a> zur Identifizierung 
von "
-"Nutzern verwendet."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
-msgstr ""
-"<a href=\"/philosophy/javascript-trap\" title=\"Die JavaScript-Falle"
-"\">JavaScript</a>-Code ist ein weiteres Mittel bei 
„Fingerabdruck“-Geräten."
-
 #. type: Content of: <div><h3>
 msgid "Spyware in Drones"
 msgstr "Spionageprogramme in Drohnen"
@@ -3465,6 +3473,14 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/javascript-trap\" title=\"Die JavaScript-Falle"
+#~ "\">JavaScript</a>-Code ist ein weiteres Mittel bei „Fingerabdruck“-"
+#~ "Geräten."
+
 #~ msgid "If you use LibreJS, it will block that malicious Javascript code."
 #~ msgstr "Mit LibreJS wird dieser schädliche JavaScript-Code blockiert."
 

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.fr.po      17 Jan 2018 16:00:16 -0000      1.264
+++ proprietary-surveillance.fr.po      25 Jan 2018 18:30:40 -0000      1.265
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: 2018-01-17 16:51+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -185,7 +186,10 @@
 msgstr "<a href=\"#SpywareInChrome\">Chrome</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr "<a href=\"#SpywareInFlash\">Flash</a>"
 
 #. type: Content of: <div><div><ul><li>
@@ -2808,50 +2812,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"Certains logiciels JavaScript malveillants raflent <a href=\"https://www.";
-"theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-"
-"research\">les identifiants provenant des gestionnaires de mots de passe</a> "
-"associés aux navigateurs."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"Certains sites envoient du code JavaScript pour collecter tout ce qui est "
-"saisi par l'utilisateur, <a href=\"https://freedom-to-tinker.com/2017/11/15/";
-"no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">ce "
-"qui permet de reproduire l'ensemble de la session</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr "Si vous utilisez LibreJS, il bloquera ce code JavaScript malveillant."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"De nombreux sites web utilisent du code JavaScript <a href=\"http://gizmodo.";
-"com/before-you-hit-submit-this-company-has-already-logge-1795906081\">pour "
-"récupérer l'information que les utilisateurs ont saisie dans un formulaire "
-"mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont 
"
-"été <a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/";
-"Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">poursuivis</a> pour "
-"cela."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 "sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2955,6 +2915,95 @@
 "d'examiner directement les données des utilisateurs</a>."
 
 #. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"Certains logiciels JavaScript malveillants raflent <a href=\"https://www.";
+"theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-"
+"research\">les identifiants provenant des gestionnaires de mots de passe</a> "
+"associés aux navigateurs."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"Certains sites envoient du code JavaScript pour collecter tout ce qui est "
+"saisi par l'utilisateur, <a href=\"https://freedom-to-tinker.com/2017/11/15/";
+"no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">ce "
+"qui permet de reproduire l'ensemble de la session</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr "Si vous utilisez LibreJS, il bloquera ce code JavaScript malveillant."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"De nombreux sites web utilisent du code JavaScript <a href=\"http://gizmodo.";
+"com/before-you-hit-submit-this-company-has-already-logge-1795906081\">pour "
+"récupérer l'information que les utilisateurs ont saisie dans un formulaire "
+"mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont 
"
+"été <a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/";
+"Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">poursuivis</a> pour "
+"cela."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-";
+"privacy-killer/\">Un cookie du lecteur Flash aide les sites web à suivre "
+"les  visiteurs à la trace</a>)."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# | 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
+# | &ldquo;fingerprinting&rdquo; devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/";
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+"Flash est aussi employé dans <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\">des dispositifs de « profilage » 
<cite>[fingerprinting]</"
+"cite></a> destinés à identifier les utilisateurs."
+
+#. type: Content of: <div><h4>
 msgid "Spyware in Chrome"
 msgstr "Chrome"
 
@@ -3010,47 +3059,6 @@
 "\">espionner en détail la navigation de l'utilisateur</a>, et beaucoup ne "
 "s'en privent pas. "
 
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-";
-"privacy-killer/\">Un cookie du lecteur Flash aide les sites web à suivre "
-"les  visiteurs à la trace</a>)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-";
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> &ldquo;"
-"fingerprinting&rdquo; devices </a> to identify users."
-msgstr ""
-"Flash est aussi employé dans <a href=\"http://arstechnica.com/";
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\">des dispositifs de « profilage » 
<cite>[fingerprinting]</"
-"cite></a> destinés à identifier les utilisateurs."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
-msgstr ""
-"Une autre méthode de profilage fait usage de <a href=\"/philosophy/"
-"javascript-trap.html\">code JavaScript</a>. "
-
 #. type: Content of: <div><h3>
 msgid "Spyware in Drones"
 msgstr "Espions dans les drones"
@@ -3223,3 +3231,10 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgstr ""
+#~ "Une autre méthode de profilage fait usage de <a href=\"/philosophy/"
+#~ "javascript-trap.html\">code JavaScript</a>. "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-surveillance.it-diff.html       17 Jan 2018 17:02:53 -0000      
1.44
+++ proprietary-surveillance.it-diff.html       25 Jan 2018 18:30:40 -0000      
1.45
@@ -112,7 +112,7 @@
     &lt;li&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the Web&lt;/a&gt;
       &lt;ul&gt;
         &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in 
Flash&lt;/a&gt;&lt;/li&gt;
+        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in <span 
class="inserted"><ins><em>JavaScript and</em></ins></span> 
Flash&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Spyware in 
Drones&lt;/a&gt;&lt;/li&gt; 
@@ -389,7 +389,7 @@
   &lt;p&gt;Apps</strong></del></span> <span class="inserted"><ins><em>no 
systematic way</em></ins></span> for <span class="removed"><del><strong>BART
     &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>Google, 
or Android
+  &lt;p&gt;With proprietary apps, one</strong></del></span> <span 
class="inserted"><ins><em>Google, or Android
     users, to inspect executable proprietary apps to see what they
     do.&lt;/p&gt;
 
@@ -468,7 +468,7 @@
   &lt;p&gt;Apps for BART
     &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</em></ins></span> proprietary apps, one can only hope that 
they don't.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one</em></ins></span> can only hope that 
they don't.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -887,46 +887,44 @@
       weakness of the reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
       app send any information to anyone?  A free software flashlight
-      app would <span class="removed"><del><strong>not.&lt;/p&gt;
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Spyware</em></ins></span> in 
<span class="removed"><del><strong>Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
+  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage to spy through it too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
+&lt;ul&gt;</strong></del></span>
 
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;A remote-control sex toy was 
found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</em></ins></span>
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
       &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
@@ -1330,35 +1328,37 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose for 
&lt;a
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing 
Bose</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>&lt;a
 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
+distributing</strong></del></span> a <span 
class="removed"><del><strong>spyware app for its headphones&lt;/a&gt;.
 Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-&lt;/p&gt;</strong></del></span>
+users listen</strong></del></span> <span class="inserted"><ins><em>certain 
gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</em></ins></span>
+        to <span class="removed"><del><strong>along with the headphone's 
unique serial number.
+&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>suit accuses that this was 
done without the users' consent.
-If the fine print of the app said that users gave 
consent</strong></del></span> <span 
class="inserted"><ins><em>driver</em></ins></span> for <span 
class="removed"><del><strong>this,
-would that make it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
-        to China&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If the fine print of the app said that</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span>
-      <span class="inserted"><ins><em>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</em></ins></span>
+      users <span class="removed"><del><strong>gave 
consent</strong></del></span> <span class="inserted"><ins><em>identify 
themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy through 
it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      spies</em></ins></span> for <span class="removed"><del><strong>this,
+would that make</strong></del></span> <span 
class="inserted"><ins><em>companies, and the NSA takes advantage to spy 
through</em></ins></span> it <span class="removed"><del><strong>acceptable? No 
way! It should be flat out</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.
+      Here's information on</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design the</strong></del></span> <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA</em></ins></span> app <span 
class="removed"><del><strong>to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many 
@@ -1380,7 +1380,7 @@
       companies.&lt;/p&gt;
 
       &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      for &ldquo;whales&rdquo; who can be led to <span 
class="removed"><del><strong>spend a lot</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They 
       also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
 
       &lt;p&gt;While the article describes gratis games, games that cost money 
@@ -1388,7 +1388,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- <span class="inserted"><ins><em>#SpywareAtRecreation --&gt;
+&lt;!-- #SpywareAtRecreation --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtRecreation"&gt;Spyware at Recreation&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;
@@ -1404,15 +1404,19 @@
       users listen to along with the headphone's unique serial number.
     &lt;/p&gt;
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of the app said that users gave consent for this,
-      would that make it acceptable? No way! It should be flat out
+      If the fine print</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use a back door to manipulate</strong></del></span> the <span 
class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent</em></ins></span> 
for <span class="removed"><del><strong>specific players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, 
games</strong></del></span> <span class="inserted"><ins><em>this,
+      would</em></ins></span> that <span class="removed"><del><strong>cost 
money 
+      can use</strong></del></span> <span class="inserted"><ins><em>make it 
acceptable? No way! It should be flat out
       &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design the app to snoop at all&lt;/a&gt;.
-    &lt;/p&gt;
+       illegal to design</em></ins></span> the <span 
class="removed"><del><strong>same tactics.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app to snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!--</em></ins></span> #SpywareOnTheWeb --&gt;
+&lt;!-- #SpywareOnTheWeb --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
@@ -1427,29 +1431,6 @@
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
-    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Some websites send JavaScript code to collect all the user's
-    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
-        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a form but not
-    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-
   &lt;li&gt;&lt;p&gt;When a page uses Disqus for
   comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
   proprietary Disqus software loads a Facebook software package into
@@ -1498,7 +1479,48 @@
 
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
+  &lt;h4 <span class="inserted"><ins><em>id="SpywareInFlash"&gt;Spyware in 
JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Some websites send JavaScript code to collect all the user's
+    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
+        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a form but not
+    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash Player's
+      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash and JavaScript are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4</em></ins></span> id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -1526,43 +1548,33 @@
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+<span class="inserted"><ins><em>&lt;!-- #SpywareInDrones 
--&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
+  &lt;h3 id="SpywareInDrones"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Drones&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="inserted"><ins><em>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</em></ins></span>
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash Player's
       &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
       cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash is also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;While you're using a DJI drone to snoop on other people, 
DJI</em></ins></span> is <span class="removed"><del><strong>also used 
for</strong></del></span> <span class="inserted"><ins><em>in many
+      cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/javascript-trap.html"&gt;Javascript</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/javascript-trap.html"&gt;JavaScript</em></ins></span>
 code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
-
-
-&lt;!-- <span class="inserted"><ins><em>#SpywareInDrones --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInDrones"&gt;Spyware in Drones&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
-      cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
+is another method of &ldquo;fingerprinting&rdquo; 
devices.&lt;/p&gt;</strong></del></span>
 
 
-&lt;!--</em></ins></span> #SpywareEverywhere --&gt;
+&lt;!-- #SpywareEverywhere --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
@@ -1661,7 +1673,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/25 18:30:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.it.po      17 Jan 2018 14:04:28 -0000      1.217
+++ proprietary-surveillance.it.po      25 Jan 2018 18:30:40 -0000      1.218
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -195,7 +195,10 @@
 msgstr "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
 
 #. type: Content of: <div><div><ul><li>
@@ -2735,35 +2738,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 "sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2865,6 +2839,80 @@
 "direttamente i dati degli utenti</a>."
 
 #. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Spyware in Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-";
+"privacy-killer/\">I cookie del Flash Player permettono ai siti web di "
+"tracciare i visitatori</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# | 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
+# | &ldquo;fingerprinting&rdquo; devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/";
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+"Flash viene anche usato per <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\">il &ldquo;fingerprinting&rdquo; (la raccolta di impronte "
+"digitali virtuali) dei dispositivi</a> allo scopo di identificare gli utenti."
+
+#. type: Content of: <div><h4>
 msgid "Spyware in Chrome"
 msgstr "Spyware in Chrome"
 
@@ -2916,53 +2964,6 @@
 "\">spionaggio completo sulle attività dell'utente</a>, e molte estensioni lo 
"
 "fanno."
 
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Spyware in Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-";
-"privacy-killer/\">I cookie del Flash Player permettono ai siti web di "
-"tracciare i visitatori</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-";
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> &ldquo;"
-"fingerprinting&rdquo; devices </a> to identify users."
-msgstr ""
-"Flash viene anche usato per <a href=\"http://arstechnica.com/";
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\">il &ldquo;fingerprinting&rdquo; (la raccolta di impronte "
-"digitali virtuali) dei dispositivi</a> allo scopo di identificare gli utenti."
-
-#. type: Content of: <p>
-# | <a href=\"/philosophy/javascript-trap.html\">Java[-s-]{+S+}cript code</a>
-# | is another method of &ldquo;fingerprinting&rdquo; devices.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
-#| "another method of &ldquo;fingerprinting&rdquo; devices."
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
-msgstr ""
-"Il <a href=\"/philosophy/javascript-trap.html\">codice Javascript</a> è un "
-"altro metodo usato per il &ldquo;fingerprinting&rdquo; dei dispositivi."
-
 #. type: Content of: <div><h3>
 # | Spyware in [-Chrome-] {+Drones+}
 #, fuzzy
@@ -3141,6 +3142,17 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
+#~| "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgstr ""
+#~ "Il <a href=\"/philosophy/javascript-trap.html\">codice Javascript</a> è "
+#~ "un altro metodo usato per il &ldquo;fingerprinting&rdquo; dei dispositivi."
+
 #~ msgid "Copyright &copy; 2015, 2016, 2017 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-surveillance.ja-diff.html       17 Jan 2018 17:02:53 -0000      
1.55
+++ proprietary-surveillance.ja-diff.html       25 Jan 2018 18:30:40 -0000      
1.56
@@ -112,7 +112,7 @@
     &lt;li&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the Web&lt;/a&gt;
       &lt;ul&gt;
         &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in 
Flash&lt;/a&gt;&lt;/li&gt;
+        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in <span 
class="inserted"><ins><em>JavaScript and</em></ins></span> 
Flash&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Spyware in 
Drones&lt;/a&gt;&lt;/li&gt; 
@@ -388,9 +388,9 @@
   <span class="removed"><del><strong>legitimate, but is that valid?  Software 
developers</strong></del></span> <span 
class="inserted"><ins><em>malicious&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;Could Google</em></ins></span> have <span 
class="inserted"><ins><em>done a better job of preventing apps from
-    cheating?  There is</em></ins></span> no <span 
class="removed"><del><strong>right to
-  analyze what users are doing</strong></del></span> <span 
class="inserted"><ins><em>systematic way for Google, or Android
-    users, to inspect executable proprietary apps to see what they
+    cheating?  There is</em></ins></span> no <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>systematic way for Google, or Android
+    users,</em></ins></span> to
+  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they
     do.&lt;/p&gt;
 
   &lt;p&gt;Google could demand the source code for these apps, and study the
@@ -530,7 +530,7 @@
 
   &lt;p&gt;The article takes for granted that the usual analytics tools are
   legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing</em></ins></span> or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  analyze what</em></ins></span> users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
@@ -734,7 +734,7 @@
       remote command and users cannot stop them:
       &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
+      (The US says it <span class="removed"><del><strong>will eventually 
require all new portable phones</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable phones
       to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -753,7 +753,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;AI-powered driving apps 
can
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
     &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -769,38 +769,52 @@
   &lt;li&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
     on what people are listening to or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    be analyzing people's conversations</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
        &lt;/li&gt;
 
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+               &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>restrict
+      the use</strong></del></span> <span class="inserted"><ins><em>do 
lots</em></ins></span> of <span class="inserted"><ins><em>surveillance, judging 
by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               how much access it demands to personal</em></ins></span> data 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
+   &lt;p&gt;Verizon</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that</em></ins></span> it 
<span class="removed"><del><strong>tries to get</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>same
    information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
    &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the
     user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</em></ins></span> of <span class="removed"><del><strong>other people's 
phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
   can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone, and in server accounts, it can
+  on many sorts of data</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;</strong></del></span> <span class="inserted"><ins><em>the phone, 
and in server accounts, it can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
@@ -885,15 +899,14 @@
       approve sending personal data to the app developer but did not
       ask about sending it to other companies.  This shows the
       weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should <span 
class="removed"><del><strong>a flashlight
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
       app send any information to anyone?  A free software flashlight
       app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -910,14 +923,13 @@
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA</strong></del></span> <span class="inserted"><ins><em>a 
flashlight</em></ins></span>
-      app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>send any information to anyone?  A free 
software flashlight
-      app would not.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4</strong></del></span> id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -961,7 +973,7 @@
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
       their products, rather than free software which users <span 
class="removed"><del><strong>can check</strong></del></span> <span 
class="inserted"><ins><em>could have
-      checked and changed.&lt;/p&gt;
+      checked</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
     
     &lt;p&gt;The company that made the vibrator
       &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
@@ -976,20 +988,20 @@
     &lt;p&gt;Following this lawsuit,
       &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
        the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+      to its customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; 
toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
        manufacturer&lt;/a&gt;. Guess what?
       &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
       collected by the manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1008,14 +1020,13 @@
   &lt;li&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
       &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span>
-      &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;The article says this is a back door, but that could be a
       misunderstanding.  However, it is certainly surveillance, at
       least.&lt;/p&gt;</em></ins></span>
@@ -1336,20 +1347,20 @@
       &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
<span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>record.&lt;/a&gt;&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareInGames --&gt;
+&lt;!-- <span 
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span 
class="inserted"><ins><em>#SpywareInGames</em></ins></span> --&gt;
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
 
-  &lt;li&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
         to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1366,18 +1377,8 @@
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;</strong></del></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
@@ -1401,12 +1402,12 @@
       for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
       also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
 
-      &lt;p&gt;While the article describes gratis games, games that cost money 
+      &lt;p&gt;While the <span class="removed"><del><strong>article describes 
gratis games, games</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money 
       can use the same tactics.&lt;/p&gt;    
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- <span class="inserted"><ins><em>#SpywareAtRecreation --&gt;
+&lt;!-- #SpywareAtRecreation --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtRecreation"&gt;Spyware at Recreation&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;
@@ -1422,15 +1423,16 @@
       users listen to along with the headphone's unique serial number.
     &lt;/p&gt;
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of the app said that users gave consent for this,
+      If the fine print of the app said</em></ins></span> that <span 
class="removed"><del><strong>cost money 
+      can use</strong></del></span> <span class="inserted"><ins><em>users gave 
consent for this,
       would that make it acceptable? No way! It should be flat out
       &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design the app to snoop at all&lt;/a&gt;.
-    &lt;/p&gt;
+       illegal to design</em></ins></span> the <span 
class="removed"><del><strong>same tactics.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app to snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!--</em></ins></span> #SpywareOnTheWeb --&gt;
+&lt;!-- #SpywareOnTheWeb --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
@@ -1445,30 +1447,7 @@
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
-    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Some websites send JavaScript code to collect all the user's
-    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
-        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a form but not
-    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;When a page uses Disqus for
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;When a page uses Disqus 
for
   comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
   proprietary Disqus software loads a Facebook software package into
   the browser of every anonymous visitor to the page, and makes the
@@ -1516,7 +1495,48 @@
 
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
+  &lt;h4 <span class="inserted"><ins><em>id="SpywareInFlash"&gt;Spyware in 
JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Some websites send JavaScript code to collect all the user's
+    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
+        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a form but not
+    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash Player's
+      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash and JavaScript are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4</em></ins></span> id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -1544,43 +1564,33 @@
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+<span class="inserted"><ins><em>&lt;!-- #SpywareInDrones 
--&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
+  &lt;h3 id="SpywareInDrones"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Drones&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="inserted"><ins><em>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</em></ins></span>
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash Player's
       &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
       cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash is also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;While you're using a DJI drone to snoop on other people, 
DJI</em></ins></span> is <span class="removed"><del><strong>also used 
for</strong></del></span> <span class="inserted"><ins><em>in many
+      cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/javascript-trap.html"&gt;Javascript</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/javascript-trap.html"&gt;JavaScript</em></ins></span>
 code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
-
-
-&lt;!-- <span class="inserted"><ins><em>#SpywareInDrones --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInDrones"&gt;Spyware in Drones&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
-      cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
+is another method of &ldquo;fingerprinting&rdquo; 
devices.&lt;/p&gt;</strong></del></span>
 
 
-&lt;!--</em></ins></span> #SpywareEverywhere --&gt;
+&lt;!-- #SpywareEverywhere --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
@@ -1679,7 +1689,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/25 18:30:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-surveillance.ja.po      17 Jan 2018 14:04:28 -0000      1.190
+++ proprietary-surveillance.ja.po      25 Jan 2018 18:30:40 -0000      1.191
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -185,7 +185,9 @@
 msgstr "<a href=\"#SpywareInChrome\">Chromeのスパイウェア</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr "<a href=\"#SpywareInFlash\">フラッシュのスパイウェア</a>"
 
 #. type: Content of: <div><div><ul><li>
@@ -2542,35 +2544,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 "sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2665,6 +2638,75 @@
 "査することを認めています。</a>"
 
 #. type: Content of: <div><h4>
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "フラッシュのスパイウェア"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"フラッシュ・プレイヤーの<a 
href=\"http://www.imasuper.com/66/technology/";
+"flash-cookies-the-silent-privacy-killer/\">クッキーの機能は訪問者
をウェブサイ"
+"トが追跡するのを手助けします</a>。"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/";
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+"フラッシュは<a 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-";
+"maybe-the-nsa-track-users-with-device-fingerprinting/\">デバイスの「指紋」</"
+"a>を使ってユーザを同定するのにも使われます。"
+
+#. type: Content of: <div><h4>
 msgid "Spyware in Chrome"
 msgstr "Chromeのスパイウェア"
 
@@ -2708,50 +2750,6 @@
 
"i-disabled-your-chrome-security-extensions/\">ユーザのブラウズ行為を完å
…¨ã«è¦—"
 
"き見する</a>ことを容易にし、多くの拡張機能がそうしています。"
 
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "フラッシュのスパイウェア"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"フラッシュ・プレイヤーの<a 
href=\"http://www.imasuper.com/66/technology/";
-"flash-cookies-the-silent-privacy-killer/\">クッキーの機能は訪問者
をウェブサイ"
-"トが追跡するのを手助けします</a>。"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-";
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> &ldquo;"
-"fingerprinting&rdquo; devices </a> to identify users."
-msgstr ""
-"フラッシュは<a 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-";
-"maybe-the-nsa-track-users-with-device-fingerprinting/\">デバイスの「指紋」</"
-"a>を使ってユーザを同定するのにも使われます。"
-
-#. type: Content of: <p>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
-#| "another method of &ldquo;fingerprinting&rdquo; devices."
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
-msgstr ""
-"<a 
href=\"/philosophy/javascript-trap.html\">Javascriptのコード</a>はデバイス"
-"の「指紋」の別の方式です。"
-
 #. type: Content of: <div><h3>
 #, fuzzy
 #| msgid "Spyware in Chrome"
@@ -2916,6 +2914,17 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
+#~| "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgstr ""
+#~ "<a 
href=\"/philosophy/javascript-trap.html\">Javascriptのコード</a>はデバ"
+#~ "イスの「指紋」の別の方式です。"
+
 #~ msgid "Copyright &copy; 2015, 2016, 2017 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2015, 2016, 2017 Free Software Foundation, Inc."
 

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.pot        17 Jan 2018 14:04:28 -0000      1.139
+++ proprietary-surveillance.pot        25 Jan 2018 18:30:40 -0000      1.140
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -169,7 +169,7 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
@@ -1944,34 +1944,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a "
-"href=\"https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research\";>
 "
-"swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a "
-"href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\";>which
 "
-"can then be used to reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a "
-"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
 "
-"to snoop on information that users have typed into a form but not sent</a>, "
-"in order to learn their identity. Some are <a "
-"href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
 "
-"getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a "
 
"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook\";>the
 "
 "proprietary Disqus software loads a Facebook software package into the "
@@ -2035,71 +2007,93 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
-msgid "Spyware in Chrome"
+msgid "Spyware in JavaScript and Flash"
 msgstr ""
 
 #. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a "
-"href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>"
+"href=\"#SpywareInFlash\">#SpywareInFlash</a>)</span>"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google Chrome <a "
-"href=\"https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/\";> spies "
-"on browser history, affiliations</a>, and other installed software."
+"Some JavaScript malware <a "
+"href=\"https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research\";>
 "
+"swipes usernames from browser-based password managers</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google Chrome contains a key logger that <a "
-"href=\"http://www.favbrowser.com/google-chrome-spyware-confirmed/\";> sends "
-"Google every URL typed in</a>, one key at a time."
+"Some websites send JavaScript code to collect all the user's input, <a "
+"href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\";>which
 "
+"can then be used to reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google Chrome includes a module that <a "
-"href=\"https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/\";>
 "
-"activates microphones and transmits audio to its servers</a>."
+"Many web sites use JavaScript code <a "
+"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
 "
+"to snoop on information that users have typed into a form but not sent</a>, "
+"in order to learn their identity. Some are <a "
+"href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
 "
+"getting sued</a> for this."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Google Chrome makes it easy for an extension to do <a "
-"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\";>total
 "
-"snooping on the user's browsing</a>, and many of them do so."
+"Flash Player's <a "
+"href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/\";>
 "
+"cookie feature helps web sites track visitors</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are also used for <a "
+"href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
 "
+"&ldquo;fingerprinting&rdquo; devices</a> to identify users."
 msgstr ""
 
 #. type: Content of: <div><h4>
-msgid "Spyware in Flash"
+msgid "Spyware in Chrome"
 msgstr ""
 
 #. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a "
-"href=\"#SpywareInFlash\">#SpywareInFlash</a>)</span>"
+"href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>"
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Flash Player's <a "
-"href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/\";>
 "
-"cookie feature helps web sites track visitors</a>."
+"Google Chrome <a "
+"href=\"https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/\";> spies "
+"on browser history, affiliations</a>, and other installed software."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Flash is also used for <a "
-"href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
 "
-"&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+"Google Chrome contains a key logger that <a "
+"href=\"http://www.favbrowser.com/google-chrome-spyware-confirmed/\";> sends "
+"Google every URL typed in</a>, one key at a time."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
+"Google Chrome includes a module that <a "
+"href=\"https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/\";>
 "
+"activates microphones and transmits audio to its servers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Google Chrome makes it easy for an extension to do <a "
+"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\";>total
 "
+"snooping on the user's browsing</a>, and many of them do so."
 msgstr ""
 
 #. type: Content of: <div><h3>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary-surveillance.ru.po      17 Jan 2018 17:02:53 -0000      1.333
+++ proprietary-surveillance.ru.po      25 Jan 2018 18:30:40 -0000      1.334
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
 "PO-Revision-Date: 2018-01-17 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -185,7 +186,10 @@
 msgstr "<a href=\"#SpywareInChrome\">Программы-шпионы в 
Chrome</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
 msgstr "<a href=\"#SpywareInFlash\">Программы-шпионы в 
Flash</a>"
 
 #. type: Content of: <div><div><ul><li>
@@ -2773,51 +2777,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"Некоторые вредоносные программы на JavaScript 
<a href=\"https://www.theverge.";
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> списывают имена пользователей из 
программ хранения паролей на базе "
-"браузера</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"Некоторые сайты посылают программы на 
JavaScript, собирающие все, что вводит "
-"пользователь, <a 
href=\"https://freedom-to-tinker.com/2017/11/15/no-";
-"boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">а "
-"затем с помощью этого можно воспроизвести 
весь сеанс работы</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-"Если пользоваться LibreJS, то эти вредоносные 
программы на JavaScript "
-"блокируются."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"Многие сайты пользуются программами на 
JavaScript, чтобы <a href=\"http://";
-"gizmodo.com/before-you-hit-submit-this-company-has-already-"
-"logge-1795906081\">подглядывать, что пользователи 
ввели в форму, но не "
-"отправили</a>, чтобы определить их 
личность. На некоторых <a href=\"https://";
-"www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-"
-"Consumers-New-Suits-Allege\"> подали за это в суд</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 "sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2919,6 +2878,96 @@
 "просматривать данные пользователя</a>."
 
 #. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Программы-шпионы в Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"Некоторые вредоносные программы на JavaScript 
<a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> списывают имена пользователей из 
программ хранения паролей на базе "
+"браузера</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"Некоторые сайты посылают программы на 
JavaScript, собирающие все, что вводит "
+"пользователь, <a 
href=\"https://freedom-to-tinker.com/2017/11/15/no-";
+"boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">а "
+"затем с помощью этого можно воспроизвести 
весь сеанс работы</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+"Если пользоваться LibreJS, то эти вредоносные 
программы на JavaScript "
+"блокируются."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Многие сайты пользуются программами на 
JavaScript, чтобы <a href=\"http://";
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\">подглядывать, что пользователи 
ввели в форму, но не "
+"отправили</a>, чтобы определить их 
личность. На некоторых <a href=\"https://";
+"www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-"
+"Consumers-New-Suits-Allege\"> подали за это в суд</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"Функция проигрывателя <a 
href=\"http://www.imasuper.com/66/technology/flash-";
+"cookies-the-silent-privacy-killer/\"> Flash помогает сайтам 
отслеживать "
+"посетителей</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# | 
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
+# | &ldquo;fingerprinting&rdquo; devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/";
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "&ldquo;fingerprinting&rdquo; devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+"Flash также могут применять для <a 
href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> снятия &ldquo;отпечатков 
пальцев&rdquo; устройств </a> с "
+"целью идентификации пользователей."
+
+#. type: Content of: <div><h4>
 msgid "Spyware in Chrome"
 msgstr "Программы-шпионы в Chrome"
 
@@ -2972,48 +3021,6 @@
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">полную слежку за пользованием 
браузером</a>, и многие из них так и делают."
 
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Программы-шпионы в Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"Функция проигрывателя <a 
href=\"http://www.imasuper.com/66/technology/flash-";
-"cookies-the-silent-privacy-killer/\"> Flash помогает сайтам 
отслеживать "
-"посетителей</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-";
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> &ldquo;"
-"fingerprinting&rdquo; devices </a> to identify users."
-msgstr ""
-"Flash также могут применять для <a 
href=\"http://arstechnica.com/";
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\"> снятия &ldquo;отпечатков 
пальцев&rdquo; устройств </a> с "
-"целью идентификации пользователей."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of &ldquo;fingerprinting&rdquo; devices."
-msgstr ""
-"<a href=\"/philosophy/javascript-trap.html\">Программы на 
JavaScript</"
-"a>&nbsp;&mdash; другой метод &ldquo;снятия 
отпечатков пальцев&rdquo; "
-"устройств."
-
 #. type: Content of: <div><h3>
 msgid "Spyware in Drones"
 msgstr "Программы-шпионы в беспилотниках"
@@ -3186,6 +3193,14 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of &ldquo;fingerprinting&rdquo; devices."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">Программы на 
JavaScript</"
+#~ "a>&nbsp;&mdash; другой метод &ldquo;снятия 
отпечатков пальцев&rdquo; "
+#~ "устройств."
+
 #~ msgid "Copyright &copy; 2015, 2016, 2017 Free Software Foundation, Inc."
 #~ msgstr ""
 #~ "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]