www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-google.de.html malware-...


From: GNUN
Subject: www/proprietary malware-google.de.html malware-...
Date: Mon, 9 Apr 2018 19:59:25 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/04/09 19:59:24

Modified files:
        proprietary    : malware-google.de.html malware-google.fr.html 
                         malware-google.ru.html 
        proprietary/po : malware-google.de-en.html 
                         malware-google.fr-en.html 
                         malware-google.ru-en.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.de.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.342&r2=1.343

Patches:
Index: malware-google.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.de.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-google.de.html      18 Mar 2018 02:59:37 -0000      1.7
+++ malware-google.de.html      9 Apr 2018 23:59:23 -0000       1.8
@@ -275,7 +275,7 @@
 
 <h3 id="drm">DRM</h3>
 <ul>
-<li><p>Die Netflix Android App <a
+<li id="netflix-app-geolocation-drm"><p>Die Netflix Android App <a
 
href="//torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">erzwingt
 die Verwendung von Google DNS</a>. Dies ist eine der Methoden, mit denen
 Netflix die von den Filmstudios vorgegebene Ortungsbeschränkungen
@@ -406,7 +406,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/04/09 23:59:23 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-google.fr.html      26 Feb 2018 13:00:13 -0000      1.17
+++ malware-google.fr.html      9 Apr 2018 23:59:23 -0000       1.18
@@ -247,7 +247,7 @@
 
 <h3 id="drm">DRM</h3>
 <ul>
-<li><p>L'appli Netflix pour Android <a
+<li id="netflix-app-geolocation-drm"><p>L'appli Netflix pour Android <a
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>force
 la connexion à utiliser les DNS de Google</a>. C'est l'une des méthodes
 employées par Netflix pour faire appliquer les restrictions géographiques
@@ -371,7 +371,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/02/26 13:00:13 $
+$Date: 2018/04/09 23:59:23 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-google.ru.html      26 Feb 2018 16:00:19 -0000      1.17
+++ malware-google.ru.html      9 Apr 2018 23:59:23 -0000       1.18
@@ -235,7 +235,7 @@
 
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 <ul>
-<li><p>Приложение Android Netflix <a
+<li id="netflix-app-geolocation-drm"><p>Приложение Android Netflix <a
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 принудительно использует Google DNS</a>. Это 
один из методов, применяемых
 Netflix, чтобы осуществлять ограничения по 
местонахождению пользователя,
@@ -361,7 +361,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/02/26 16:00:19 $
+$Date: 2018/04/09 23:59:23 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-google.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-google.de-en.html        18 Mar 2018 02:59:37 -0000      1.5
+++ po/malware-google.de-en.html        9 Apr 2018 23:59:24 -0000       1.6
@@ -219,7 +219,7 @@
 
 <h3 id="drm">Google DRM</h3>
 <ul>
-<li><p>The Netflix Android app <a 
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a 
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix
 uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/04/09 23:59:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-google.fr-en.html        26 Feb 2018 13:00:13 -0000      1.16
+++ po/malware-google.fr-en.html        9 Apr 2018 23:59:24 -0000       1.17
@@ -219,7 +219,7 @@
 
 <h3 id="drm">Google DRM</h3>
 <ul>
-<li><p>The Netflix Android app <a 
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a 
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix
 uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/02/26 13:00:13 $
+$Date: 2018/04/09 23:59:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/malware-google.ru-en.html        26 Feb 2018 16:00:19 -0000      1.17
+++ po/malware-google.ru-en.html        9 Apr 2018 23:59:24 -0000       1.18
@@ -219,7 +219,7 @@
 
 <h3 id="drm">Google DRM</h3>
 <ul>
-<li><p>The Netflix Android app <a 
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a 
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix
 uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/02/26 16:00:19 $
+$Date: 2018/04/09 23:59:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/proprietary-back-doors.de.po     18 Mar 2018 02:59:38 -0000      1.100
+++ po/proprietary-back-doors.de.po     9 Apr 2018 23:59:24 -0000       1.101
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-03-10 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -408,6 +409,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Baidu's proprietary Android library, Moplus, has a back door that <a href="
 "\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-";
 "remote-hijacking-baidu-wrote-code-google-made\"> can &ldquo;upload "

Index: po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- po/proprietary-back-doors.fr.po     24 Feb 2018 14:02:21 -0000      1.89
+++ po/proprietary-back-doors.fr.po     9 Apr 2018 23:59:24 -0000       1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-02-24 15:01+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -382,6 +383,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Baidu's proprietary Android library, Moplus, has a back door that <a href="
 "\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-";
 "remote-hijacking-baidu-wrote-code-google-made\"> can &ldquo;upload "

Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary-back-doors.it-diff.html      24 Feb 2018 13:34:19 -0000      
1.18
+++ po/proprietary-back-doors.it-diff.html      9 Apr 2018 23:59:24 -0000       
1.19
@@ -313,25 +313,33 @@
       
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
       remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
       enabling it without <span class="removed"><del><strong>understanding.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for the state&lt;/a&gt;.
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+&lt;h3 id="install-delete"&gt;Installing or deleting programs&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; TVs
+      automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones</strong></del></span> <span 
class="inserted"><ins><em>href="https://news.ycombinator.com/item?id=16727319"&gt;load
+      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
   &lt;p&gt;This may have improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but
-  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It is too bad
+      that the article finishes by advocating the moral weakness of
+      surrendering to Netflix. The Netflix
+      app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-&lt;h3 id="install-delete"&gt;Installing or deleting programs&lt;/h3&gt;
 
-&lt;ul&gt;</em></ins></span>
   &lt;li&gt;
 <span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
 Windows 8 also</strong></del></span>
@@ -526,9 +534,9 @@
       processor</em></ins></span> does not <span 
class="removed"><del><strong>give HP
 access</strong></del></span> <span class="inserted"><ins><em>control the 
microphone, and so that it can't
       change the software in the main processor.  They still have the
-      back door, but at least it is unable to turn the phone unto a
+      back door, but at least it is unable</em></ins></span> to <span 
class="inserted"><ins><em>turn the phone unto a
       listening device.&lt;/p&gt;
-    &lt;p&gt;The universal back door is apparently also used</em></ins></span> 
to <span class="inserted"><ins><em>make phones &lt;a
+    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
       
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
       transmit even when they are turned off&lt;/a&gt;.  This means their
       movements are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>listening feature
@@ -685,7 +693,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/02/24 13:34:19 $
+$Date: 2018/04/09 23:59:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/proprietary-back-doors.it.po     24 Feb 2018 13:34:19 -0000      1.98
+++ po/proprietary-back-doors.it.po     9 Apr 2018 23:59:24 -0000       1.99
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -455,6 +455,21 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Baidu's proprietary Android library, Moplus, has a back door that <a
 # | 
href=\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made\";>{+
 # | +}can &ldquo;upload files&rdquo; as well as forcibly install apps</a>.

Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-back-doors.ja-diff.html      24 Feb 2018 13:34:19 -0000      
1.16
+++ po/proprietary-back-doors.ja-diff.html      9 Apr 2018 23:59:24 -0000       
1.17
@@ -246,18 +246,29 @@
 
   &lt;li&gt;
 <span class="removed"><del><strong>&lt;p&gt;Most mobile phones 
have</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The iPhone has</em></ins></span> 
a <span class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-      <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;The iPhone has</em></ins></span> 
a <span class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used</strong></del></span> 
<span class="inserted"><ins><em>door for &lt;a
+      
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
       remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-      enabling it without understanding.&lt;/p&gt;</em></ins></span>
+      enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;h3 id="install-delete"&gt;Installing or deleting programs&lt;/h3&gt;
 
-&lt;ul&gt;</em></ins></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; TVs
+      automatically &lt;a 
href="https://news.ycombinator.com/item?id=16727319"&gt;load
+      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It is too bad
+      that the article finishes by advocating the moral weakness of
+      surrendering</em></ins></span> to <span 
class="inserted"><ins><em>Netflix. The Netflix
+      app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
   &lt;li&gt;
 <span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
 A Chinese version of</strong></del></span>
@@ -281,12 +292,13 @@
       merged into Google Play.)&lt;/p&gt;
     &lt;p&gt;Google</em></ins></span> can <span 
class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
-&lt;p&gt;More information on when</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
+be</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
       <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
       forcibly</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
@@ -362,9 +374,14 @@
 Google</strong></del></span>
     <span class="inserted"><ins><em>&lt;p&gt;The iPhone</em></ins></span> has 
a back door <span class="inserted"><ins><em>&lt;a
       
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-      that allows Apple</em></ins></span> to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It is in</strong></del></span> 
<span class="inserted"><ins><em>apps&lt;/a&gt; which Apple considers
+      that allows Apple</em></ins></span> to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It is in a program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google</strong></del></span> <span class="inserted"><ins><em>apps&lt;/a&gt; 
which Apple considers
       &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have this
-      power because of course we can trust Apple.&lt;/p&gt;
+      power because of course we</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>trust Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -373,11 +390,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;ChromeOS has</em></ins></span> a <span 
class="removed"><del><strong>program
-called GTalkService).
-&lt;/p&gt;
-
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>universal back 
door. At least,</em></ins></span> Google <span class="removed"><del><strong>can 
also</strong></del></span> <span class="inserted"><ins><em>says
+    &lt;p&gt;ChromeOS has a universal back door. At least, Google says
       it does&mdash;in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
 forcibly</strong></del></span>
       <span 
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
@@ -408,7 +421,7 @@
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole
       battery capacity did</em></ins></span> not <span 
class="removed"><del><strong>equivalent</strong></del></span> <span 
class="inserted"><ins><em>do them any harm, the same back door would
       permit Tesla (perhaps under the command of some government) to
-      remotely order the car to use none of its battery. Or 
perhaps</em></ins></span> to <span class="inserted"><ins><em>drive
+      remotely order the car to use none of its battery. Or perhaps to drive
       its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -419,7 +432,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;The Amazon Echo appears to have</em></ins></span> a universal 
back door, <span class="removed"><del><strong>but permits various
+    &lt;p&gt;The Amazon Echo appears</em></ins></span> to <span 
class="inserted"><ins><em>have</em></ins></span> a universal back door, <span 
class="removed"><del><strong>but permits various
 dirty tricks.
 &lt;/p&gt;
 
@@ -670,7 +683,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/02/24 13:34:19 $
+$Date: 2018/04/09 23:59:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- po/proprietary-back-doors.ja.po     24 Feb 2018 13:34:19 -0000      1.78
+++ po/proprietary-back-doors.ja.po     9 Apr 2018 23:59:24 -0000       1.79
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -367,6 +367,21 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Baidu's proprietary Android library, Moplus, has a back door that <a href="

Index: po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-back-doors.pot       24 Feb 2018 13:34:19 -0000      1.49
+++ po/proprietary-back-doors.pot       9 Apr 2018 23:59:24 -0000       1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -269,6 +269,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a "
+"href=\"https://news.ycombinator.com/item?id=16727319\";>load downgrades that "
+"install a surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a "
+"href=\"/proprietary/malware-google.html#netflix-app-geolocation-drm\">is "
+"malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Baidu's proprietary Android library, Moplus, has a back door that <a "
 
"href=\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made\";>
 "
 "can &ldquo;upload files&rdquo; as well as forcibly install apps</a>."

Index: po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/proprietary-back-doors.ru.po     25 Feb 2018 09:32:13 -0000      1.131
+++ po/proprietary-back-doors.ru.po     9 Apr 2018 23:59:24 -0000       1.132
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-02-25 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -373,6 +374,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Baidu's proprietary Android library, Moplus, has a back door that <a href="
 "\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-";
 "remote-hijacking-baidu-wrote-code-google-made\"> can &ldquo;upload "

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary-surveillance.de.po   5 Apr 2018 10:00:15 -0000       1.202
+++ po/proprietary-surveillance.de.po   9 Apr 2018 23:59:24 -0000       1.203
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-03-10 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -2547,6 +2547,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a href=\"https://www.ftc.gov/news-events/blogs/";
 "business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
 "everything that is viewed on them, and not just broadcasts and cable</a>. "

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- po/proprietary-surveillance.fr.po   5 Apr 2018 13:26:33 -0000       1.271
+++ po/proprietary-surveillance.fr.po   9 Apr 2018 23:59:24 -0000       1.272
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-04-05 15:25+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -2442,6 +2443,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a href=\"https://www.ftc.gov/news-events/blogs/";
 "business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
 "everything that is viewed on them, and not just broadcasts and cable</a>. "

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/proprietary-surveillance.it-diff.html    5 Apr 2018 10:00:15 -0000       
1.47
+++ po/proprietary-surveillance.it-diff.html    9 Apr 2018 23:59:24 -0000       
1.48
@@ -739,9 +739,9 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
-      the <span class="removed"><del><strong>use of data 
on</strong></del></span> <span class="inserted"><ins><em>use of data on the 
user's computer, but it does surveillance
+      the use of data on the user's computer, but it does surveillance
       too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
+      it <span class="removed"><del><strong>tries to get the user's list of 
other</strong></del></span> <span class="inserted"><ins><em>tries to get the 
user's list of other people's phone
       numbers.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -786,10 +786,8 @@
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>time,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>or watching&lt;/a&gt;. In addition, it may
+    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
     be analyzing</em></ins></span> people's <span 
class="removed"><del><strong>phone
       numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversations to serve them with targeted
     advertisements.&lt;/p&gt;</em></ins></span>
@@ -1259,6 +1257,17 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; 
TVs
+      automatically &lt;a 
href="https://news.ycombinator.com/item?id=16727319"&gt;load
+      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It is too bad
+      that the article finishes by advocating the moral weakness of
+      surrendering to Netflix. The Netflix
+      app &lt;a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
   &lt;li&gt;
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
@@ -1704,7 +1713,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/04/05 10:00:15 $
+$Date: 2018/04/09 23:59:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary-surveillance.it.po   5 Apr 2018 10:00:16 -0000       1.220
+++ po/proprietary-surveillance.it.po   9 Apr 2018 23:59:24 -0000       1.221
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -2350,6 +2350,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a href=\"https://www.ftc.gov/news-events/blogs/";
 "business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
 "everything that is viewed on them, and not just broadcasts and cable</a>. "

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/proprietary-surveillance.ja-diff.html    5 Apr 2018 10:00:16 -0000       
1.58
+++ po/proprietary-surveillance.ja-diff.html    9 Apr 2018 23:59:24 -0000       
1.59
@@ -557,10 +557,7 @@
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
@@ -575,7 +572,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The DMCA and the EU 
Copyright Directive make it &lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
       illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
       would require circumventing the iOS DRM.&lt;/p&gt;
@@ -592,19 +589,8 @@
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;</strong></del></span>
-      <span 
class="inserted"><ins><em>them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
   &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
       lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
@@ -686,7 +672,18 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
       Several &ldquo;features&rdquo; of iOS seem to exist for no
       possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
       Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -698,7 +695,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Tracking software in 
popular Android apps is pervasive and
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
       sometimes very clever. Some trackers can &lt;a
 
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
       follow a user's movements around a physical store by noticing WiFi
@@ -748,14 +745,21 @@
       remote command and users cannot stop them:
       &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it <span class="removed"><del><strong>will eventually 
require all new portable phones</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable phones
+      (The US says it will eventually require all new portable phones
       to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
       the use of data on the user's computer, but it does surveillance
       too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
+      it tries to get the user's list of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
       numbers.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -802,42 +806,32 @@
   &lt;li&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
     on what people are listening to or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
        &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;
-               &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>restrict
-      the use</strong></del></span> <span class="inserted"><ins><em>do 
lots</em></ins></span> of <span class="inserted"><ins><em>surveillance, judging 
by 
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal</em></ins></span> data 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-   &lt;p&gt;Verizon</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</em></ins></span> it 
<span class="removed"><del><strong>tries to get</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt;
-        pre-install on some of its phones. The app will give 
Verizon</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>same
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
    information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
    &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the
     user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</em></ins></span> of <span class="removed"><del><strong>other people's 
phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spyware is
-    still spyware.&lt;/p&gt;</em></ins></span>
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -939,98 +933,103 @@
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Spyware</em></ins></span> in 
<span class="removed"><del><strong>Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information</strong></del></span> <span 
class="inserted"><ins><em>listen in</em></ins></span> on <span 
class="inserted"><ins><em>a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More about NSA</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4</strong></del></span> id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A company that makes 
internet-controlled vibrators</strong></del></span>
+   &lt;li&gt;&lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>was reporting the temperature of the vibrator minute 
by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</em></ins></span>
-        of <span class="removed"><del><strong>personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it anonymizes the data may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The</em></ins></span> company that <span 
class="removed"><del><strong>makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>made the 
vibrator</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was</em></ins></span> sued for collecting lots of personal information 
about how
+       people <span class="removed"><del><strong>use</strong></del></span> 
<span class="inserted"><ins><em>used</em></ins></span> it&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span>
-      a
-        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>speech recognition company based 
in</em></ins></span> the <span class="removed"><del><strong>data 
broker</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-      can <span class="removed"><del><strong>figure out 
who</strong></del></span> <span class="inserted"><ins><em>remotely 
control</em></ins></span> the <span class="removed"><del><strong>user 
is.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>toys with a 
mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The company's statement that it <span 
class="removed"><del><strong>anonymizes</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
+      true, but it doesn't really matter. If it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>had sold</em></ins></span> the data to a
+      data broker, the data broker <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
+      who the user <span class="removed"><del><strong>is.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A</strong></del></span>
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;A</em></ins></span> computerized vibrator
-      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</em></ins></span> on its users through the proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of 
the vibrator minute by
-      minute (thus, indirectly, whether it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
-      body), <span class="removed"><del><strong>and</strong></del></span> 
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration 
frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users <span 
class="removed"><del><strong>can check</strong></del></span> <span 
class="inserted"><ins><em>could have
-      checked</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the data to a
-      data broker, the data broker would have been able to figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+       the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>company has been ordered to pay a 
total</em></ins></span> of <span class="inserted"><ins><em>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; 
toys with microphones
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
        manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>data&lt;/a&gt;
+      collected</em></ins></span> by <span class="removed"><del><strong>a 
person's
+      body), and</strong></del></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users can 
check</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>the FBI 
could listen to these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
   
   &lt;li&gt;&lt;p&gt;Barbie
@@ -1246,7 +1245,20 @@
       store this information, but if the state orders it to get the data
       and hand it over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
@@ -1259,7 +1271,7 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Lots of 
&ldquo;smart&rdquo; products are
+  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
         designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
         listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
@@ -1291,7 +1303,18 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; 
TVs
+      automatically &lt;a 
href="https://news.ycombinator.com/item?id=16727319"&gt;load
+      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It is too bad
+      that the article finishes by advocating the moral weakness of
+      surrendering to Netflix. The Netflix
+      app &lt;a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts
@@ -1722,7 +1745,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/04/05 10:00:16 $
+$Date: 2018/04/09 23:59:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- po/proprietary-surveillance.ja.po   5 Apr 2018 10:00:16 -0000       1.193
+++ po/proprietary-surveillance.ja.po   9 Apr 2018 23:59:24 -0000       1.194
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -2188,6 +2188,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a href=\"https://www.ftc.gov/news-events/blogs/";
 "business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
 "everything that is viewed on them, and not just broadcasts and cable</a>. "

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- po/proprietary-surveillance.pot     5 Apr 2018 10:00:16 -0000       1.142
+++ po/proprietary-surveillance.pot     9 Apr 2018 23:59:24 -0000       1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1696,6 +1696,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a "
+"href=\"https://news.ycombinator.com/item?id=16727319\";>load downgrades that "
+"install a surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a "
+"href=\"/proprietary/malware-google.html#netflix-app-geolocation-drm\">is "
+"malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a "
 
"href=\"https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\";>TVs
 "
 "report everything that is viewed on them, and not just broadcasts and "

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/proprietary-surveillance.ru.po   5 Apr 2018 16:29:16 -0000       1.342
+++ po/proprietary-surveillance.ru.po   9 Apr 2018 23:59:24 -0000       1.343
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
 "PO-Revision-Date: 2018-04-05 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -2413,6 +2414,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://news.";
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Vizio &ldquo;smart&rdquo; <a href=\"https://www.ftc.gov/news-events/blogs/";
 "business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
 "everything that is viewed on them, and not just broadcasts and cable</a>. "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]