www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/basic-freedoms.ca.html philosoph...


From: GNUN
Subject: www philosophy/basic-freedoms.ca.html philosoph...
Date: Sat, 4 Aug 2018 11:59:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/08/04 11:59:31

Modified files:
        philosophy     : basic-freedoms.ca.html basic-freedoms.de.html 
                         basic-freedoms.ja.html basic-freedoms.nl.html 
                         basic-freedoms.pl.html basic-freedoms.sq.html 
                         basic-freedoms.uk.html 
                         surveillance-vs-democracy.sq.html 
                         surveillance-vs-democracy.uk.html 
                         who-does-that-server-really-serve.de.html 
                         who-does-that-server-really-serve.it.html 
                         who-does-that-server-really-serve.sq.html 
                         words-to-avoid.de.html words-to-avoid.sq.html 
        philosophy/po  : basic-freedoms.ca-diff.html 
                         basic-freedoms.nl-diff.html 
                         basic-freedoms.pl-diff.html 
                         basic-freedoms.sq-diff.html 
                         basic-freedoms.uk-diff.html 
                         surveillance-vs-democracy.sq-diff.html 
                         surveillance-vs-democracy.uk-diff.html 
                         who-does-that-server-really-serve.it-diff.html 
                         words-to-avoid.de-diff.html 
                         words-to-avoid.sq-diff.html 
        proprietary    : malware-apple.de.html 
                         malware-appliances.de.html 
                         malware-microsoft.de.html 
                         malware-mobiles.de.html 
                         proprietary-insecurity.de.html 
                         proprietary-sabotage.de.html 
        proprietary/po : malware-apple.de-diff.html 
                         malware-appliances.de-diff.html 
                         malware-microsoft.de-diff.html 
                         malware-mobiles.de-diff.html 
                         proprietary-insecurity.de-diff.html 
                         proprietary-sabotage.de-diff.html 
Added files:
        philosophy/po  : basic-freedoms.de-diff.html 
                         basic-freedoms.ja-diff.html 
                         who-does-that-server-really-serve.de-diff.html 
                         who-does-that-server-really-serve.sq-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.ca.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.de.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.ja.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.nl.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.pl.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.sq.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.uk.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.sq.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.uk.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.de.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.it.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.sq.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.de.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.sq.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.ca-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.nl-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.pl-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.sq-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.uk-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.it-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.sq-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.de-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.ja-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.de-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.sq-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.de.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.de.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.de.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.de.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.9&r2=1.10

Patches:
Index: philosophy/basic-freedoms.ca.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.ca.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- philosophy/basic-freedoms.ca.html   18 Nov 2016 07:32:42 -0000      1.40
+++ philosophy/basic-freedoms.ca.html   4 Aug 2018 15:59:29 -0000       1.41
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.ca.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.ca.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.ca-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.ca.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.ca.html" -->
+<!--#include virtual="/server/outdated.ca.html" -->
 <h2>Llibertat d'expressió, premsa i associació a Internet</h2>
 
 <p>
@@ -129,7 +135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Updated:
 
-$Date: 2016/11/18 07:32:42 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.de.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.de.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- philosophy/basic-freedoms.de.html   3 Dec 2016 23:45:09 -0000       1.51
+++ philosophy/basic-freedoms.de.html   4 Aug 2018 15:59:29 -0000       1.52
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.de.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Rede-, Presse- und Versammlungsfreiheit im Internet</h2>
 
 <p>
@@ -139,7 +145,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2016/12/03 23:45:09 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.ja.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.ja.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/basic-freedoms.ja.html   18 Nov 2016 07:32:42 -0000      1.35
+++ philosophy/basic-freedoms.ja.html   4 Aug 2018 15:59:29 -0000       1.36
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.ja.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>インターネットにおける言論、報道、団結の自由</h2>
 
 <p>
@@ -105,7 +111,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/11/18 07:32:42 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.nl.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.nl.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/basic-freedoms.nl.html   21 Nov 2016 18:27:39 -0000      1.17
+++ philosophy/basic-freedoms.nl.html   4 Aug 2018 15:59:29 -0000       1.18
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.nl.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Vrijheid van meningsuiting op het internet </h2>
 
 <p>
@@ -129,7 +135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2016/11/21 18:27:39 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.pl.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.pl.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- philosophy/basic-freedoms.pl.html   25 Apr 2017 17:00:22 -0000      1.48
+++ philosophy/basic-freedoms.pl.html   4 Aug 2018 15:59:29 -0000       1.49
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.pl.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.pl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.pl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.pl.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.pl.html" -->
+<!--#include virtual="/server/outdated.pl.html" -->
 <h2>Wolność słowa, prasy i&nbsp;stowarzyszania się w&nbsp;Internecie</h2>
 
 <p>
@@ -136,7 +142,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualizowane:
 
-$Date: 2017/04/25 17:00:22 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.sq.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.sq.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/basic-freedoms.sq.html   18 Nov 2016 07:32:42 -0000      1.24
+++ philosophy/basic-freedoms.sq.html   4 Aug 2018 15:59:29 -0000       1.25
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.sq.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.sq.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.sq-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.sq.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.sq.html" -->
+<!--#include virtual="/server/outdated.sq.html" -->
 <h2>Liria e Fjalës, Shtypit, dhe Shoqërimit në Internet</h2>
 
 <p>
@@ -131,7 +137,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2016/11/18 07:32:42 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.uk.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.uk.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/basic-freedoms.uk.html   18 Nov 2016 07:32:42 -0000      1.4
+++ philosophy/basic-freedoms.uk.html   4 Aug 2018 15:59:29 -0000       1.5
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/basic-freedoms.uk.po">
+ https://www.gnu.org/philosophy/po/basic-freedoms.uk.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/basic-freedoms.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/basic-freedoms.uk-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/basic-freedoms.en.html" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/basic-freedoms.translist" -->
 <!--#include virtual="/server/banner.uk.html" -->
+<!--#include virtual="/server/outdated.uk.html" -->
 <h2>Свобода слова, друку і асоціацій в 
Інтернеті</h2>
 
 <p>
@@ -129,7 +135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2016/11/18 07:32:42 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.sq.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.sq.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- philosophy/surveillance-vs-democracy.sq.html        2 May 2018 12:01:18 
-0000       1.30
+++ philosophy/surveillance-vs-democracy.sq.html        4 Aug 2018 15:59:29 
-0000       1.31
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.sq.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.sq.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.sq-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.sq.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -20,6 +25,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.sq.html" -->
+<!--#include virtual="/server/outdated.sq.html" -->
 <h2 class="center">Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
 
 <p class="byline center">nga <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
@@ -650,7 +656,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2018/05/02 12:01:18 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.uk.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.uk.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- philosophy/surveillance-vs-democracy.uk.html        24 May 2018 06:30:22 
-0000      1.27
+++ philosophy/surveillance-vs-democracy.uk.html        4 Aug 2018 15:59:29 
-0000       1.28
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.uk.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.uk.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.uk-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -20,6 +25,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.uk.html" -->
+<!--#include virtual="/server/outdated.uk.html" -->
 <h2 class="center">Скільки стежень може витримати 
демократія?</h2>
 
 <p class="byline center"><a href="http://www.stallman.org/";>Річард 
Столмен</a></p>
@@ -631,7 +637,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2018/05/24 06:30:22 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/who-does-that-server-really-serve.de.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.de.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/who-does-that-server-really-serve.de.html        19 May 2018 
08:30:15 -0000      1.2
+++ philosophy/who-does-that-server-really-serve.de.html        4 Aug 2018 
15:59:29 -0000       1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/who-does-that-server-really-serve.de.po">
+ https://www.gnu.org/philosophy/po/who-does-that-server-really-serve.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/who-does-that-server-really-serve.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/who-does-that-server-really-serve.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Wem dient dieser Server wirklich?</h2>
 
 <p>von <strong>Richard Stallman</strong> | 2010-03-20 (aktualisiert 
2018-03-31)</p>
@@ -561,7 +567,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 08:30:15 $
+$Date: 2018/08/04 15:59:29 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/who-does-that-server-really-serve.it.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.it.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/who-does-that-server-really-serve.it.html        31 May 2018 
20:30:09 -0000      1.12
+++ philosophy/who-does-that-server-really-serve.it.html        4 Aug 2018 
15:59:30 -0000       1.13
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/who-does-that-server-really-serve.it.po">
+ https://www.gnu.org/philosophy/po/who-does-that-server-really-serve.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/who-does-that-server-really-serve.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/who-does-that-server-really-serve.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Quel server in realtà a chi serve?</h2>
 
 <p>di <strong>Richard Stallman</strong></p>
@@ -495,7 +501,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2018/05/31 20:30:09 $
+$Date: 2018/08/04 15:59:30 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/who-does-that-server-really-serve.sq.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.sq.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/who-does-that-server-really-serve.sq.html        1 Apr 2018 
13:30:08 -0000       1.3
+++ philosophy/who-does-that-server-really-serve.sq.html        4 Aug 2018 
15:59:30 -0000       1.4
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/who-does-that-server-really-serve.sq.po">
+ https://www.gnu.org/philosophy/po/who-does-that-server-really-serve.sq.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/who-does-that-server-really-serve.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/who-does-that-server-really-serve.sq-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
 
 <!--#include virtual="/server/header.sq.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
 <!--#include virtual="/server/banner.sq.html" -->
+<!--#include virtual="/server/outdated.sq.html" -->
 <h2>Kujt i shërben në të vërtetë ai shërbyes?</h2>
 
 <p>nga <strong>Richard Stallman</strong></p>
@@ -493,7 +499,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2018/04/01 13:30:08 $
+$Date: 2018/08/04 15:59:30 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/words-to-avoid.de.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.de.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- philosophy/words-to-avoid.de.html   19 May 2018 08:30:15 -0000      1.94
+++ philosophy/words-to-avoid.de.html   4 Aug 2018 15:59:30 -0000       1.95
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/words-to-avoid.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/words-to-avoid.de.po">
+ https://www.gnu.org/philosophy/po/words-to-avoid.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/words-to-avoid.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/words-to-avoid.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/words-to-avoid.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -10,6 +15,7 @@
 
 <!--#include virtual="/philosophy/po/words-to-avoid.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Zu vermeidende Wörter<br />&#8209;&#160;(oder mit Sorgfalt zu 
verwendende),
 weil sie voreingenommen oder irreführend sind</h2>
 
@@ -1574,7 +1580,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 08:30:15 $
+$Date: 2018/08/04 15:59:30 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/words-to-avoid.sq.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.sq.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- philosophy/words-to-avoid.sq.html   2 May 2018 12:01:18 -0000       1.10
+++ philosophy/words-to-avoid.sq.html   4 Aug 2018 15:59:30 -0000       1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/words-to-avoid.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/words-to-avoid.sq.po">
+ https://www.gnu.org/philosophy/po/words-to-avoid.sq.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/words-to-avoid.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/words-to-avoid.sq-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/words-to-avoid.en.html" -->
 
 <!--#include virtual="/server/header.sq.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/words-to-avoid.translist" -->
 <!--#include virtual="/server/banner.sq.html" -->
+<!--#include virtual="/server/outdated.sq.html" -->
 <h2>Fjalë Që Duhen Shmangur (ose Përdorur me Kujdes) Ngaqë Janë Me Spec 
ose
 Ngatërruese</h2>
 
@@ -1431,7 +1437,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2018/05/02 12:01:18 $
+$Date: 2018/08/04 15:59:30 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/basic-freedoms.ca-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.ca-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/basic-freedoms.ca-diff.html   11 Jul 2016 08:35:15 -0000      
1.3
+++ philosophy/po/basic-freedoms.ca-diff.html   4 Aug 2018 15:59:30 -0000       
1.4
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Freedom of Speech, Press and Association on the Internet
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
@@ -24,26 +24,19 @@
 &lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    The</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.ciec.org/"&gt; 
Citizens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens</em></ins></span>
-    Internet Empowerment Coalition&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived April
-    24, 1999)</em></ins></span> came together to oppose Congress' first 
attempt to regulate
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
     material published on the Internet, the Communications Decency Act, which
     the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
-    is being preserved as a resource on the landmark CDA <span 
class="removed"><del><strong>case.
-  &lt;/li&gt;
-
-  &lt;!-- removing</strong></del></span> <span 
class="inserted"><ins><em>case.&lt;/li&gt;
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
 
-  &lt;li&gt;&lt;!-- activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;The</strong></del></span> <span class="inserted"><ins><em>July 09, 
1998 --&gt;
-    The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/"&gt;Voters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters</em></ins></span>
-    Telecommunications Watch&lt;/a&gt; <span class="inserted"><ins><em>at the 
Wayback Machine (archived July 09,
-    1998)</em></ins></span> and their excellent announcement electronic 
mailing list.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
 
   &lt;li&gt;
     &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
@@ -53,7 +46,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;a href="http://www.factnet.org/"&gt;F.A.C.T.Net Inc.&lt;/a&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -64,18 +57,14 @@
     for Online Freedom of Speech, Press and Association.
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;!-- removing</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;!-- 
activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;You</strong></del></span> <span class="inserted"><ins><em>December 
01, 2001 --&gt;
-    You</em></ins></span> can read &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/speech/index.html#decision"&gt;the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the</em></ins></span>
-    June 1996 appeals court decision&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived
-    December 01, 2001)</em></ins></span> rejecting censorship of the Internet. 
But remember, this
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
     decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
     disagree; then Congress gets a chance to look for another method of
     censorship.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
 
   &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
 
@@ -117,19 +106,17 @@
 &lt;/div&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-2007, <span class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2016</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/07/11 08:35:15 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/basic-freedoms.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.nl-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- philosophy/po/basic-freedoms.nl-diff.html   18 Nov 2016 07:32:53 -0000      
1.10
+++ philosophy/po/basic-freedoms.nl-diff.html   4 Aug 2018 15:59:30 -0000       
1.11
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Freedom of Speech, Press and Association on the Internet
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
@@ -24,26 +24,19 @@
 &lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    The</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.ciec.org/"&gt; 
Citizens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens</em></ins></span>
-    Internet Empowerment Coalition&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived April
-    24, 1999)</em></ins></span> came together to oppose Congress' first 
attempt to regulate
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
     material published on the Internet, the Communications Decency Act, which
     the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
-    is being preserved as a resource on the landmark CDA <span 
class="removed"><del><strong>case.
-  &lt;/li&gt;
-
-  &lt;!-- removing</strong></del></span> <span 
class="inserted"><ins><em>case.&lt;/li&gt;
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
 
-  &lt;li&gt;&lt;!-- activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;The</strong></del></span> <span class="inserted"><ins><em>July 09, 
1998 --&gt;
-    The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/"&gt;Voters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters</em></ins></span>
-    Telecommunications Watch&lt;/a&gt; <span class="inserted"><ins><em>at the 
Wayback Machine (archived July 09,
-    1998)</em></ins></span> and their excellent announcement electronic 
mailing list.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
 
   &lt;li&gt;
     &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
@@ -53,7 +46,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;a href="http://www.factnet.org/"&gt;F.A.C.T.Net Inc.&lt;/a&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -64,18 +57,14 @@
     for Online Freedom of Speech, Press and Association.
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;!-- removing</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;!-- 
activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;You</strong></del></span> <span class="inserted"><ins><em>December 
01, 2001 --&gt;
-    You</em></ins></span> can read &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/speech/index.html#decision"&gt;the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the</em></ins></span>
-    June 1996 appeals court decision&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived
-    December 01, 2001)</em></ins></span> rejecting censorship of the Internet. 
But remember, this
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
     decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
     disagree; then Congress gets a chance to look for another method of
     censorship.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
 
   &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
 
@@ -117,19 +106,17 @@
 &lt;/div&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-2007, <span class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2016</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/11/18 07:32:53 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/basic-freedoms.pl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.pl-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/basic-freedoms.pl-diff.html   18 Nov 2016 07:32:53 -0000      
1.2
+++ philosophy/po/basic-freedoms.pl-diff.html   4 Aug 2018 15:59:30 -0000       
1.3
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Freedom of Speech, Press and Association on the Internet
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
@@ -24,26 +24,19 @@
 &lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    The</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.ciec.org/"&gt; 
Citizens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens</em></ins></span>
-    Internet Empowerment Coalition&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived April
-    24, 1999)</em></ins></span> came together to oppose Congress' first 
attempt to regulate
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
     material published on the Internet, the Communications Decency Act, which
     the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
-    is being preserved as a resource on the landmark CDA <span 
class="removed"><del><strong>case.
-  &lt;/li&gt;
-
-  &lt;!-- removing</strong></del></span> <span 
class="inserted"><ins><em>case.&lt;/li&gt;
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
 
-  &lt;li&gt;&lt;!-- activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;The</strong></del></span> <span class="inserted"><ins><em>July 09, 
1998 --&gt;
-    The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/"&gt;Voters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters</em></ins></span>
-    Telecommunications Watch&lt;/a&gt; <span class="inserted"><ins><em>at the 
Wayback Machine (archived July 09,
-    1998)</em></ins></span> and their excellent announcement electronic 
mailing list.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
 
   &lt;li&gt;
     &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
@@ -53,7 +46,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;a href="http://www.factnet.org/"&gt;F.A.C.T.Net Inc.&lt;/a&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -64,18 +57,14 @@
     for Online Freedom of Speech, Press and Association.
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;!-- removing</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;!-- 
activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;You</strong></del></span> <span class="inserted"><ins><em>December 
01, 2001 --&gt;
-    You</em></ins></span> can read &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/speech/index.html#decision"&gt;the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the</em></ins></span>
-    June 1996 appeals court decision&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived
-    December 01, 2001)</em></ins></span> rejecting censorship of the Internet. 
But remember, this
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
     decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
     disagree; then Congress gets a chance to look for another method of
     censorship.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
 
   &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
 
@@ -117,19 +106,17 @@
 &lt;/div&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-2007, <span class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2016</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/11/18 07:32:53 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/basic-freedoms.sq-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.sq-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/basic-freedoms.sq-diff.html   4 Jun 2014 00:29:36 -0000       
1.1
+++ philosophy/po/basic-freedoms.sq-diff.html   4 Aug 2018 15:59:30 -0000       
1.2
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.76</strong></del></span> <span 
class="inserted"><ins><em>1.77</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Freedom of Speech, Press and Association on the Internet
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
@@ -24,19 +24,19 @@
 &lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    The &lt;a href="http://www.ciec.org/"&gt; Citizens Internet Empowerment
-    Coalition&lt;/a&gt; came together to oppose Congress' first attempt to
-    regulate material published on the Internet, the Communications
-    Decency Act, which the U.S. Supreme Court found unconstitutional
-    on June 26, 1997.  Their site is being preserved as a resource on
-    the landmark CDA case.
-  &lt;/li&gt;
-
-  &lt;!-- removing this link.. site is dead as of June 07 2004
-  &lt;li&gt;The &lt;a href="http://www.vtw.org/"&gt;Voters Telecommunications 
Watch&lt;/a&gt;
-       and their excellent announcement electronic mailing list.&lt;/li&gt;
-    --&gt;
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
+    material published on the Internet, the Communications Decency Act, which
+    the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
+
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
     
   &lt;li&gt;
     &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
@@ -46,7 +46,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;a href="http://www.factnet.org/"&gt;F.A.C.T.Net Inc.&lt;/a&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -57,13 +57,14 @@
     for Online Freedom of Speech, Press and Association.
   &lt;/li&gt;
 
-  &lt;!-- removing this link.. site is dead as of June 07 2004
-  &lt;li&gt;You can read &lt;a 
href="http://www.vtw.org/speech/index.html#decision"&gt;the
-       June 1996 appeals court decision&lt;/a&gt;
-       rejecting censorship of the Internet.  But remember, this decision
-       is &lt;em&gt;not&lt;/em&gt; final!  First, the Supreme Court will agree 
or disagree;
-       then Congress gets a chance to look for another method of 
censorship.&lt;/li&gt;
-    --&gt;
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
+    decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
+    disagree; then Congress gets a chance to look for another method of
+    censorship.&lt;/li&gt;
 
   &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
 
@@ -105,21 +106,17 @@
 &lt;/div&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-<span class="removed"><del><strong>2007</strong></del></span>
-<span class="inserted"><ins><em>2007, 2014</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
-Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.
-&lt;/p&gt;
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
-<span 
class="removed"><del><strong>&lt;p&gt;&lt;/p&gt;&lt;p</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p</em></ins></span> 
class="unprintable"&gt;Updated:
+&lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2014/06/04 00:29:36 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/basic-freedoms.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.uk-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/basic-freedoms.uk-diff.html   1 Jul 2016 12:29:26 -0000       
1.1
+++ philosophy/po/basic-freedoms.uk-diff.html   4 Aug 2018 15:59:30 -0000       
1.2
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Freedom of Speech, Press and Association on the Internet
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
@@ -24,26 +24,19 @@
 &lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    The</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.ciec.org/"&gt; 
Citizens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens</em></ins></span>
-    Internet Empowerment Coalition&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived April
-    24, 1999)</em></ins></span> came together to oppose Congress' first 
attempt to regulate
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
     material published on the Internet, the Communications Decency Act, which
     the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
-    is being preserved as a resource on the landmark CDA <span 
class="removed"><del><strong>case.
-  &lt;/li&gt;
-
-  &lt;!-- removing</strong></del></span> <span 
class="inserted"><ins><em>case.&lt;/li&gt;
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
 
-  &lt;li&gt;&lt;!-- activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;The</strong></del></span> <span class="inserted"><ins><em>July 09, 
1998 --&gt;
-    The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/"&gt;Voters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters</em></ins></span>
-    Telecommunications Watch&lt;/a&gt; <span class="inserted"><ins><em>at the 
Wayback Machine (archived July 09,
-    1998)</em></ins></span> and their excellent announcement electronic 
mailing list.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
 
   &lt;li&gt;
     &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
@@ -53,7 +46,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;a href="http://www.factnet.org/"&gt;F.A.C.T.Net Inc.&lt;/a&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -64,18 +57,14 @@
     for Online Freedom of Speech, Press and Association.
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;!-- removing</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;!-- 
activating</em></ins></span> this <span 
class="removed"><del><strong>link..</strong></del></span> <span 
class="inserted"><ins><em>link…</em></ins></span> site is <span 
class="removed"><del><strong>dead</strong></del></span> <span 
class="inserted"><ins><em>archived</em></ins></span> as of <span 
class="removed"><del><strong>June 07 2004
-  &lt;li&gt;You</strong></del></span> <span class="inserted"><ins><em>December 
01, 2001 --&gt;
-    You</em></ins></span> can read &lt;a <span 
class="removed"><del><strong>href="http://www.vtw.org/speech/index.html#decision"&gt;the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the</em></ins></span>
-    June 1996 appeals court decision&lt;/a&gt; <span 
class="inserted"><ins><em>at the Wayback Machine (archived
-    December 01, 2001)</em></ins></span> rejecting censorship of the Internet. 
But remember, this
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
     decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
     disagree; then Congress gets a chance to look for another method of
     censorship.&lt;/li&gt;
-    <span class="removed"><del><strong>--&gt;</strong></del></span>
 
   &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
 
@@ -117,19 +106,17 @@
 &lt;/div&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-2007, <span class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2016</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/07/01 12:29:26 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.sq-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/surveillance-vs-democracy.sq-diff.html        9 Nov 2017 
19:29:05 -0000       1.2
+++ philosophy/po/surveillance-vs-democracy.sq-diff.html        4 Aug 2018 
15:59:30 -0000       1.3
@@ -11,11 +11,11 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-#intro { margin: 1.5em auto; }
+#intro { margin: 2em auto 1.5em; }
 .pict.wide { width: 23em; }
 .pict p { margin-top: .2em; }
 @media (min-width: 55em) {
@@ -32,8 +32,12 @@
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote class="center"&gt;&lt;p&gt;A version of this article was first 
published in Wired
-in October 2013.&lt;/p&gt;&lt;/blockquote&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;A version of this article was first 
published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
+Also consider reading &ldquo;&lt;a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
+radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/p&gt;&lt;/blockquote&gt;
 
 &lt;div class="article"&gt;
 
@@ -105,7 +109,7 @@
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
-time, &lt;a 
href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
+time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
 and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
 other companies too&lt;/a&gt;.&lt;/p&gt;
@@ -135,6 +139,14 @@
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
 excuse to access the accumulated material.&lt;/p&gt;
 
+&lt;p&gt;In practice, we can't expect state agencies even to make up excuses
+to satisfy the rules for using surveillance data&mdash;because US
+agencies
+already &lt;a 
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/"&gt;
+lie to cover up breaking the rules&lt;/a&gt;.  These rules are not seriously
+meant to be obeyed; rather, they are a fairy-tale we can believe if we
+like.&lt;/p&gt;
+
 &lt;p&gt;In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
 agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
@@ -161,9 +173,14 @@
 this is prohibited.  Once the data has been accumulated and the state
 has the possibility of access to it, it can misuse that data in
 dreadful ways, as shown by examples
-from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;
-and &lt;a 
href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
-US &lt;/a&gt;.&lt;/p&gt;
+from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
+&lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
+US&lt;/a&gt;, and most
+recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+(Turkey's confusion about who had really used the Bylock program only
+exacerbated the basic deliberate injustice of arbitrarily punishing
+people for having used it.)
+&lt;/p&gt;
 
 &lt;p&gt;Personal data collected by the state is also likely to be obtained
 by outside crackers that break the security of the servers, even
@@ -228,15 +245,14 @@
 files, with free software on your own computer before uploading
 it.&lt;/p&gt;
 
-&lt;p&gt;For privacy's sake, you must avoid nonfree software since, as a
-consequence of giving others control of your computing, it
-is &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;likely</strong></del></span>
 <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html"&gt;likely</em></ins></span>
 to spy
-on you&lt;/a&gt;.
+&lt;p&gt;For privacy's sake, you must avoid nonfree software; if you give
+control of your computer's operations to companies, they
+are &lt;a href="/malware/proprietary-surveillance.html"&gt;likely to make it
+spy on you&lt;/a&gt;.
 Avoid &lt;a 
href="/philosophy/who-does-that-server-really-serve.html"&gt;service
-as a software substitute&lt;/a&gt;; <span class="removed"><del><strong>as well 
as</strong></del></span> <span class="inserted"><ins><em>in addition 
to</em></ins></span> giving others control of <span 
class="inserted"><ins><em>how</em></ins></span> your
-<span class="removed"><del><strong>computing,</strong></del></span>
-<span class="inserted"><ins><em>computing is done,</em></ins></span> it 
requires you to hand over all the pertinent data to the
-server.&lt;/p&gt;
+as a software substitute&lt;/a&gt;; in addition to giving others control of
+how your computing is done, it requires you to hand over all the
+pertinent data to the company's server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
 too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
@@ -245,7 +261,7 @@
 Don't tell a company such as Facebook anything about your friends that
 they might not wish to publish in a newspaper.  Better yet, don't be
 used by Facebook at all.  Reject communication systems that require
-users to give their real names, even if you are going to give yours,
+users to give their real names, even if you are happy to divulge yours,
 since they pressure other people to surrender their privacy.&lt;/p&gt;
 
 &lt;p&gt;Self-protection is essential, but even the most rigorous
@@ -294,14 +310,18 @@
 
 &lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
-center and saved forever.  This is already dangerous, but it is going
+center and saved forever.  In Detroit, the cops pressure businesses to
+give them &lt;a <span 
class="removed"><del><strong>href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited</em></ins></span>
+access to their surveillance cameras&lt;/a&gt; so that they can look through
+them at any and all times.  This is already dangerous, but it is going
 to get worse.  Advances in face recognition may bring the day when
 suspected journalists can be tracked on the street all the time to see
 who they talk with.&lt;/p&gt;
 
 &lt;p&gt;Internet-connected cameras often have lousy digital security
-themselves, which
-means &lt;a 
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone
+themselves, which means &lt;a <span 
class="removed"><del><strong>href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone</em></ins></span>
 can watch what those cameras see&lt;/a&gt;.  This makes internet-connected
 cameras a major threat to security as well as privacy.  For privacy's
 sake, we should ban the use of Internet-connected cameras aimed where
@@ -369,10 +389,10 @@
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Another possible method for anonymous 
payments would
+&lt;p&gt;Another possible method for anonymous payments would
 use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
-implement.&lt;/p&gt;</em></ins></span>
+implement.&lt;/p&gt;
 
 &lt;p&gt;A further threat from sites' collection of personal data is that
 security breakers might get in, take it, and misuse it.  This includes
@@ -499,7 +519,7 @@
 police have their own jargon term for perjury,
 &ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
 since they do it so frequently, particularly about protesters
-and &lt;a 
href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)
+and &lt;a <span 
class="removed"><del><strong>href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.themaven.net/pinacnews/"&gt;photographers&lt;/a&gt;.)</em></ins></span>
 One city in California that required police to wear video cameras all
 the time
 found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
@@ -591,7 +611,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -601,7 +621,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/09 19:29:05 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/surveillance-vs-democracy.uk-diff.html        18 Apr 2018 
21:28:56 -0000      1.7
+++ philosophy/po/surveillance-vs-democracy.uk-diff.html        4 Aug 2018 
15:59:30 -0000       1.8
@@ -15,7 +15,7 @@
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-#intro { margin: <span class="removed"><del><strong>1.5em 
auto;</strong></del></span> <span class="inserted"><ins><em>2em auto 
1.5em;</em></ins></span> }
+#intro { margin: 2em auto 1.5em; }
 .pict.wide { width: 23em; }
 .pict p { margin-top: .2em; }
 @media (min-width: 55em) {
@@ -32,12 +32,12 @@
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote class="center"&gt;&lt;p&gt;A version of this article was first 
published in <span class="removed"><del><strong>Wired</strong></del></span>
-<span 
class="inserted"><ins><em>&lt;cite&gt;Wired&lt;/cite&gt;</em></ins></span> in 
<span class="removed"><del><strong>October 
2013.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span> <span 
class="inserted"><ins><em>October&nbsp;2013.&lt;br /&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;A version of this article was first 
published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
 Also consider reading &ldquo;&lt;a
 
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
 radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
-&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/p&gt;&lt;/blockquote&gt;
 
 &lt;div class="article"&gt;
 
@@ -109,7 +109,7 @@
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
-time, &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</em></ins></span>
+time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
 and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
 other companies too&lt;/a&gt;.&lt;/p&gt;
@@ -310,18 +310,18 @@
 
 &lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
-center and saved forever.  <span class="inserted"><ins><em>In Detroit, the 
cops pressure businesses to
-give
-them &lt;a 
href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited
+center and saved forever.  In Detroit, the cops pressure businesses to
+give them &lt;a <span 
class="removed"><del><strong>href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited</em></ins></span>
 access to their surveillance cameras&lt;/a&gt; so that they can look through
-them at any and all times.</em></ins></span>  This is already dangerous, but 
it is going
+them at any and all times.  This is already dangerous, but it is going
 to get worse.  Advances in face recognition may bring the day when
 suspected journalists can be tracked on the street all the time to see
 who they talk with.&lt;/p&gt;
 
 &lt;p&gt;Internet-connected cameras often have lousy digital security
-themselves, which
-means &lt;a 
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone
+themselves, which means &lt;a <span 
class="removed"><del><strong>href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone</em></ins></span>
 can watch what those cameras see&lt;/a&gt;.  This makes internet-connected
 cameras a major threat to security as well as privacy.  For privacy's
 sake, we should ban the use of Internet-connected cameras aimed where
@@ -519,7 +519,7 @@
 police have their own jargon term for perjury,
 &ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
 since they do it so frequently, particularly about protesters
-and &lt;a 
href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)
+and &lt;a <span 
class="removed"><del><strong>href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.themaven.net/pinacnews/"&gt;photographers&lt;/a&gt;.)</em></ins></span>
 One city in California that required police to wear video cameras all
 the time
 found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
@@ -621,7 +621,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/04/18 21:28:56 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/who-does-that-server-really-serve.it-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/who-does-that-server-really-serve.it-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/who-does-that-server-really-serve.it-diff.html        30 May 
2018 02:01:06 -0000      1.1
+++ philosophy/po/who-does-that-server-really-serve.it-diff.html        4 Aug 
2018 15:59:30 -0000       1.2
@@ -212,7 +212,7 @@
 &ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
 source &lt;a href="/philosophy/free-open-overlap.html"&gt;is, nearly always,
 free&lt;/a&gt;.  However, the idea of
-an &lt;a href="http://opendefinition.org/software-service"&gt;&ldquo;open
+an &lt;a <span 
class="removed"><del><strong>href="http://opendefinition.org/software-service"&gt;&ldquo;open</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://opendefinition.org/ossd/"&gt;&ldquo;open</em></ins></span>
 software&rdquo; service&lt;/a&gt;, meaning one whose server software is open
 source and/or free, fails to address the issue of SaaSS.&lt;/p&gt;
 
@@ -364,9 +364,9 @@
 if you had the server at home, but that is a separate issue from
 SaaSS.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;This kind of server rental is 
sometimes called &ldquo;IaaS,&rdquo;
+&lt;p&gt;This kind of server rental is sometimes called &ldquo;IaaS,&rdquo;
 but that term fits into a conceptual structure that downplays the issues
-that we consider important.&lt;/p&gt;</em></ins></span>
+that we consider important.&lt;/p&gt;
 
 &lt;h3&gt;Dealing with the SaaSS Problem&lt;/h3&gt;
 
@@ -466,7 +466,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2010, 2013, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2018</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2010, 2013, 2015, 2016, 2018 Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -476,7 +476,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/05/30 02:01:06 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/words-to-avoid.de-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/words-to-avoid.de-diff.html   21 Apr 2018 20:00:51 -0000      
1.6
+++ philosophy/po/words-to-avoid.de-diff.html   4 Aug 2018 15:59:30 -0000       
1.7
@@ -116,8 +116,8 @@
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#SellSoftware"&gt;Sell software&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
-       <span class="inserted"><ins><em>href="#SharingPersonalData"&gt;Sharing 
(personal data)&lt;/a&gt;&rdquo;
-|&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a</em></ins></span>
+       href="#SharingPersonalData"&gt;Sharing (personal data)&lt;/a&gt;&rdquo;
+|&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#SharingEconomy"&gt;Sharing economy&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#Skype"&gt;Skype&lt;/a&gt;&rdquo;
@@ -304,7 +304,7 @@
 &lt;/p&gt;
 
 &lt;p&gt;
-The &lt;a 
href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf"&gt;
+The &lt;a <span 
class="removed"><del><strong>href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://csrc.nist.gov/publications/detail/sp/800-145/final"&gt;</em></ins></span>
 NIST definition of "cloud computing"&lt;/a&gt; mentions three scenarios that
 raise different ethical issues: Software as a Service, Platform as a
 Service, and Infrastructure as a Service.  However, that definition
@@ -407,14 +407,9 @@
 gasoline that your car burns today versus another drop that it burned
 last week.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Do we want 
people</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;What does it mean</em></ins></span> 
to think of <span class="removed"><del><strong>writings (software, news, any 
other
-kind)</strong></del></span> <span class="inserted"><ins><em>works of 
authorship</em></ins></span> as a commodity,
+&lt;p&gt;What does it mean to think of works of authorship as a commodity,
 with the assumption that there is nothing special about any one story,
-article, program, or song?  <span class="removed"><del><strong>Should we
-treat them as fungible?</strong></del></span>  That is the twisted viewpoint 
of <span class="removed"><del><strong>an
-economist,</strong></del></span> <span class="inserted"><ins><em>the 
owner</em></ins></span>
+article, program, or song?  That is the twisted viewpoint of the owner
 or the accountant of a publishing company.  It is no surprise that
 proprietary software would like you to think of the use of software as
 a commodity.  Their twisted viewpoint comes through clearly
@@ -431,50 +426,39 @@
 they may see such restrictions as natural.&lt;/p&gt;
 
 &lt;p&gt;
-It also encourages the <span 
class="removed"><del><strong>acceptation</strong></del></span> <span 
class="inserted"><ins><em>acceptance</em></ins></span> of 
&ldquo;streaming&rdquo; services,
-which use DRM to perversely limit listening to <span 
class="removed"><del><strong>music so that
-it fits</strong></del></span> <span class="inserted"><ins><em>music, or 
watching
-video, to squeeze those activities into</em></ins></span> the assumptions of 
the word
+It also encourages the acceptance of &ldquo;streaming&rdquo; services,
+which use DRM to perversely limit listening to music, or watching
+video, to squeeze those activities into the assumptions of the word
 &ldquo;consume.&rdquo;&lt;/p&gt;
 
 &lt;p&gt;
 Why is this perverse usage spreading?  Some may feel that the term
 sounds sophisticated, but rejecting it with cogent reasons can appear
-even more sophisticated.  <span class="inserted"><ins><em>Some want to 
generalize about all kinds of
+even more sophisticated.  Some want to generalize about all kinds of
 media, but the usual English verbs (&ldquo;read,&rdquo; &ldquo;listen
-to,&rdquo; &ldquo;watch&rdquo;) don't do this.</em></ins></span>  Others may 
be acting
+to,&rdquo; &ldquo;watch&rdquo;) don't do this.  Others may be acting
 from business interests (their own, or their employers').  Their use
 of the term in prestigious forums gives the impression that it's the
 &ldquo;correct&rdquo; term.&lt;/p&gt;
 
 &lt;p&gt;
 To speak of &ldquo;consuming&rdquo; music, fiction, or any other
-artistic works is to treat them as <span 
class="removed"><del><strong>products</strong></del></span> <span 
class="inserted"><ins><em>commodities</em></ins></span> rather than as art.  
<span class="removed"><del><strong>If
-you don't</strong></del></span>  <span class="inserted"><ins><em>Do
-we</em></ins></span> want to <span 
class="removed"><del><strong>spread</strong></del></span> <span 
class="inserted"><ins><em>think of published works</em></ins></span> that <span 
class="removed"><del><strong>attitude, you would do well</strong></del></span> 
<span class="inserted"><ins><em>way?  Do we want</em></ins></span> to <span 
class="removed"><del><strong>avoid
-using</strong></del></span> <span class="inserted"><ins><em>encourage
+artistic works is to treat them as commodities rather than as art.  Do
+we want to think of published works that way?  Do we want to encourage
 the public to do so?&lt;/p&gt;
 
-&lt;p&gt;Those who answer no, please join me in shunning</em></ins></span> the 
term
-&ldquo;consume&rdquo; for <span class="removed"><del><strong>them.  
What</strong></del></span> <span class="inserted"><ins><em>this.&lt;/p&gt;
+&lt;p&gt;Those who answer no, please join me in shunning the term
+&ldquo;consume&rdquo; for this.&lt;/p&gt;
 
-&lt;p&gt;What</em></ins></span> to use instead?
-<span class="removed"><del><strong>We prefer</strong></del></span>  <span 
class="inserted"><ins><em>You can use</em></ins></span> specific verbs such as
-<span class="inserted"><ins><em>&ldquo;read,&rdquo;</em></ins></span> 
&ldquo;listen <span class="removed"><del><strong>to&rdquo;,
-&ldquo;watch&rdquo;, &ldquo;read&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>to,&rdquo; &ldquo;watch&rdquo;</em></ins></span> or
-&ldquo;look <span 
class="removed"><del><strong>at&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>at,&rdquo;</em></ins></span> since they help to 
restrain the tendency to
+&lt;p&gt;What to use instead?  You can use specific verbs such as
+&ldquo;read,&rdquo; &ldquo;listen to,&rdquo; &ldquo;watch&rdquo; or
+&ldquo;look at,&rdquo; since they help to restrain the tendency to
 overgeneralize.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;When it is absolutely necessary to 
generalize about all kinds</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;If you insist on generalizing, you 
can use the expression
-&ldquo;attend to,&rdquo; which requires less</em></ins></span> of
-<span class="removed"><del><strong>works and all media, we recommend 
&ldquo;experience&rdquo; or
-&ldquo;give attention to&rdquo; for an artistic work or</strong></del></span> 
a <span class="removed"><del><strong>work to
-present</strong></del></span> <span class="inserted"><ins><em>stretch than
-&ldquo;consume.&rdquo;  For</em></ins></span> a <span 
class="removed"><del><strong>point of view, and 
&ldquo;use&rdquo;</strong></del></span> <span class="inserted"><ins><em>work 
meant</em></ins></span> for <span class="removed"><del><strong>a practically
-useful work.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>practical use,
-&ldquo;use&rdquo; is best.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;If you insist on generalizing, you can use the expression
+&ldquo;attend to,&rdquo; which requires less of a stretch than
+&ldquo;consume.&rdquo;  For a work meant for practical use,
+&ldquo;use&rdquo; is best.&lt;/p&gt;
 
 &lt;p&gt;See also the following entry.&lt;/p&gt;
 
@@ -1155,7 +1139,7 @@
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
-&lt;h3 <span 
class="inserted"><ins><em>id="SharingPersonalData"&gt;&ldquo;Sharing (personal 
data)&rdquo;&lt;/h3&gt;
+&lt;h3 id="SharingPersonalData"&gt;&ldquo;Sharing (personal 
data)&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
 When companies manipulate or lure people into revealing personal data
@@ -1167,7 +1151,7 @@
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
-&lt;h3</em></ins></span> id="SharingEconomy"&gt;&ldquo;Sharing 
economy&rdquo;&lt;/h3&gt;
+&lt;h3 id="SharingEconomy"&gt;&ldquo;Sharing economy&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
 The term &ldquo;sharing economy&rdquo; is not a good way to refer to
@@ -1367,7 +1351,7 @@
      Information document, www.gnu.org/prep/maintain. --&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2001, 2002, 2003, 2004, 2007,
-2008, 2009, 2010, 2011, 2012, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2008, 2009, 2010, 2011, 2012, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -1377,7 +1361,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/04/21 20:00:51 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/words-to-avoid.sq-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.sq-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/words-to-avoid.sq-diff.html   2 Oct 2017 14:59:43 -0000       
1.5
+++ philosophy/po/words-to-avoid.sq-diff.html   4 Aug 2018 15:59:30 -0000       
1.6
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Words to Avoid (or Use with Care) Because They Are Loaded or 
Confusing
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/words-to-avoid.translist" --&gt;
@@ -106,8 +106,8 @@
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#PowerPoint"&gt;PowerPoint&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
-       <span 
class="inserted"><ins><em>href="#Product"&gt;Product&lt;/a&gt;&rdquo;
-|&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a</em></ins></span>
+       href="#Product"&gt;Product&lt;/a&gt;&rdquo;
+|&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#Protection"&gt;Protection&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#RAND"&gt;RAND&lt;/a&gt;&rdquo;
@@ -116,6 +116,8 @@
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#SellSoftware"&gt;Sell software&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
+       href="#SharingPersonalData"&gt;Sharing (personal data)&lt;/a&gt;&rdquo;
+|&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#SharingEconomy"&gt;Sharing economy&lt;/a&gt;&rdquo;
 |&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!-- GNUN-SORT-NEXT-ITEM 
--&gt; &ldquo;&lt;a
        href="#Skype"&gt;Skype&lt;/a&gt;&rdquo;
@@ -185,12 +187,12 @@
 applies to the special case in which the user already has a copy of
 the program in non-source form.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;blockquote&gt;&lt;p&gt;Instead of 
&lt;b&gt;with free software,
+&lt;blockquote&gt;&lt;p&gt;Instead of &lt;b&gt;with free software,
 the public has access to the program&lt;/b&gt;,
 we say, &lt;b&gt;with free software, the users have the essential
 freedoms&lt;/b&gt; and &lt;b&gt;with free software, the users have control
 of what the program does for them&lt;/b&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</em></ins></span>
+&lt;/blockquote&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
@@ -258,10 +260,9 @@
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
 &lt;h3 id="CloudComputing"&gt;&ldquo;Cloud Computing&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
-<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;p id="Cloud"&gt;</em></ins></span>
+&lt;p id="Cloud"&gt;
 The term &ldquo;cloud computing&rdquo; (or
-just <span class="removed"><del><strong>&lt;a 
name="Cloud"&gt;&ldquo;cloud&rdquo;&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;cloud&rdquo;,</em></ins></span> in the context 
of
+just &ldquo;cloud&rdquo;, in the context of
 computing) is a marketing buzzword with no coherent meaning.  It is
 used for a range of different activities whose only common
 characteristic is that they use the Internet for something beyond
@@ -303,7 +304,7 @@
 &lt;/p&gt;
 
 &lt;p&gt;
-The &lt;a 
href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf"&gt;
+The &lt;a <span 
class="removed"><del><strong>href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://csrc.nist.gov/publications/detail/sp/800-145/final"&gt;</em></ins></span>
 NIST definition of "cloud computing"&lt;/a&gt; mentions three scenarios that
 raise different ethical issues: Software as a Service, Platform as a
 Service, and Infrastructure as a Service.  However, that definition
@@ -406,14 +407,12 @@
 gasoline that your car burns today versus another drop that it burned
 last week.&lt;/p&gt;
 
-&lt;p&gt;Do we want people to think of writings (software, news, any other
-kind) as a commodity, with the assumption that there is nothing
-special about any one story, article, program, or song?  Should we
-treat them as fungible?  That is the twisted viewpoint of an
-economist, or the accountant of a publishing company.  It is no
-surprise that proprietary software would like you to think of the use
-of software as a commodity.  Their twisted viewpoint comes through
-clearly
+&lt;p&gt;What does it mean to think of works of authorship as a commodity,
+with the assumption that there is nothing special about any one story,
+article, program, or song?  That is the twisted viewpoint of the owner
+or the accountant of a publishing company.  It is no surprise that
+proprietary software would like you to think of the use of software as
+a commodity.  Their twisted viewpoint comes through clearly
 in &lt;a 
href="http://www.businessinsider.com/former-google-exec-launches-sourcepoint-with-10-million-series-a-funding-2015-6"&gt;this
 article&lt;/a&gt;, which also refers to publications as
 &ldquo;&lt;a href="#Content"&gt;content&lt;/a&gt;.&rdquo;&lt;/p&gt;
@@ -427,32 +426,39 @@
 they may see such restrictions as natural.&lt;/p&gt;
 
 &lt;p&gt;
-It also encourages the acceptation of &ldquo;streaming&rdquo;
-services, which use DRM to perversely limit listening to music so that
-it fits the assumptions of the word &ldquo;consume.&rdquo;&lt;/p&gt;
+It also encourages the acceptance of &ldquo;streaming&rdquo; services,
+which use DRM to perversely limit listening to music, or watching
+video, to squeeze those activities into the assumptions of the word
+&ldquo;consume.&rdquo;&lt;/p&gt;
 
 &lt;p&gt;
 Why is this perverse usage spreading?  Some may feel that the term
 sounds sophisticated, but rejecting it with cogent reasons can appear
-even more sophisticated.  Others may be acting from business interests
-(their own, or their employers').  Their use of the term in
-prestigious forums gives the impression that it's the
+even more sophisticated.  Some want to generalize about all kinds of
+media, but the usual English verbs (&ldquo;read,&rdquo; &ldquo;listen
+to,&rdquo; &ldquo;watch&rdquo;) don't do this.  Others may be acting
+from business interests (their own, or their employers').  Their use
+of the term in prestigious forums gives the impression that it's the
 &ldquo;correct&rdquo; term.&lt;/p&gt;
 
 &lt;p&gt;
 To speak of &ldquo;consuming&rdquo; music, fiction, or any other
-artistic works is to treat them as products rather than as art.  If
-you don't want to spread that attitude, you would do well to avoid
-using the term &ldquo;consume&rdquo; for them.  What to use instead?
-We prefer specific verbs such as &ldquo;listen to&rdquo;,
-&ldquo;watch&rdquo;, &ldquo;read&rdquo; or &ldquo;look at&rdquo;,
-since they help to restrain the tendency to overgeneralize.&lt;/p&gt;
-
-&lt;p&gt;When it is absolutely necessary to generalize about all kinds of
-works and all media, we recommend &ldquo;experience&rdquo; or
-&ldquo;give attention to&rdquo; for an artistic work or a work to
-present a point of view, and &ldquo;use&rdquo; for a practically
-useful work.&lt;/p&gt;
+artistic works is to treat them as commodities rather than as art.  Do
+we want to think of published works that way?  Do we want to encourage
+the public to do so?&lt;/p&gt;
+
+&lt;p&gt;Those who answer no, please join me in shunning the term
+&ldquo;consume&rdquo; for this.&lt;/p&gt;
+
+&lt;p&gt;What to use instead?  You can use specific verbs such as
+&ldquo;read,&rdquo; &ldquo;listen to,&rdquo; &ldquo;watch&rdquo; or
+&ldquo;look at,&rdquo; since they help to restrain the tendency to
+overgeneralize.&lt;/p&gt;
+
+&lt;p&gt;If you insist on generalizing, you can use the expression
+&ldquo;attend to,&rdquo; which requires less of a stretch than
+&ldquo;consume.&rdquo;  For a work meant for practical use,
+&ldquo;use&rdquo; is best.&lt;/p&gt;
 
 &lt;p&gt;See also the following entry.&lt;/p&gt;
 
@@ -513,11 +519,11 @@
 mill.
 &lt;/p&gt;&lt;/blockquote&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;
+&lt;p&gt;
 In other words, &ldquo;content&rdquo; reduces publications and
 writings to a sort of pap fit to be piped through the
 &ldquo;tubes&rdquo; of the internet.
-&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;
 
 &lt;p&gt;See also &lt;a 
href="http://www.salon.com/2000/06/14/love_7/"&gt;Courtney
 Love's open letter to Steve Case&lt;/a&gt; and search for &ldquo;content
@@ -712,9 +718,9 @@
 neutrality is your goal, &ldquo;FLOSS&rdquo; is better.  But if you
 want to show you stand for freedom, don't use a neutral term.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;blockquote&gt;&lt;p&gt;Instead of 
&lt;b&gt;FOSS&lt;/b&gt;,
+&lt;blockquote&gt;&lt;p&gt;Instead of &lt;b&gt;FOSS&lt;/b&gt;,
 we say, &lt;b&gt;free software&lt;/b&gt; or &lt;b&gt;free (libre) 
software&lt;/b&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</em></ins></span>
+&lt;/blockquote&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
@@ -776,9 +782,9 @@
 name of one particular search engine among others. We suggest to use
 the term &ldquo;search the web&rdquo; or (in some contexts) just
 &ldquo;search&rdquo;. Try to use a search engine that respects your
-privacy; <span class="inserted"><ins><em>for instance,</em></ins></span> &lt;a 
href="https://duckduckgo.com/"&gt;DuckDuckGo&lt;/a&gt;
-claims not to track its <span class="removed"><del><strong>users, although we 
cannot confirm.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users.  (There is no way for outsiders to
-verify claims of that kind.)&lt;/p&gt;</em></ins></span>
+privacy; for instance, &lt;a 
href="https://duckduckgo.com/"&gt;DuckDuckGo&lt;/a&gt;
+claims not to track its users.  (There is no way for outsiders to
+verify claims of that kind.)&lt;/p&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
@@ -905,28 +911,24 @@
 &lt;h3 id="MP3Player"&gt;&ldquo;MP3 Player&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
-<span class="inserted"><ins><em>&lt;!-- The MP3 patents will reportedly expire 
by 2018.  --&gt;</em></ins></span>
+&lt;!-- The MP3 patents will reportedly expire by 2018.  --&gt;
 
 In the late 1990s it became feasible to make portable, solid-state
-digital audio players.  Most <span 
class="removed"><del><strong>support</strong></del></span> <span 
class="inserted"><ins><em>players supported</em></ins></span> the patented MP3 
codec, <span class="removed"><del><strong>but not
-all.</strong></del></span>
-<span class="inserted"><ins><em>and that is still the case.</em></ins></span>  
Some <span class="removed"><del><strong>support</strong></del></span> <span 
class="inserted"><ins><em>players also supported</em></ins></span> the
-patent-free audio codecs Ogg Vorbis and FLAC, and <span 
class="removed"><del><strong>may not even support</strong></del></span> <span 
class="inserted"><ins><em>a few couldn't play</em></ins></span>
-MP3-encoded files at <span class="removed"><del><strong>all, 
precisely</strong></del></span> <span class="inserted"><ins><em>all because 
their developers needed</em></ins></span> to <span 
class="removed"><del><strong>avoid
-these patents.  To call such players</strong></del></span> <span 
class="inserted"><ins><em>protect
+digital audio players.  Most players supported the patented MP3 codec,
+and that is still the case.  Some players also supported the
+patent-free audio codecs Ogg Vorbis and FLAC, and a few couldn't play
+MP3-encoded files at all because their developers needed to protect
 themselves from the patents on MP3 format.&lt;/p&gt;
 
-&lt;p&gt;Using the term</em></ins></span> &ldquo;MP3 players&rdquo; <span 
class="removed"><del><strong>is not
-only confusing, it also privileges</strong></del></span> <span 
class="inserted"><ins><em>for audio players in
-general has the effect of promoting</em></ins></span> the MP3 <span 
class="removed"><del><strong>that we ought</strong></del></span> <span 
class="inserted"><ins><em>format and discouraging
+&lt;p&gt;Using the term &ldquo;MP3 players&rdquo; for audio players in
+general has the effect of promoting the MP3 format and discouraging
 the other formats (some of which are technically superior as well).
-Even though the MP3 patents have expired, it is still 
undesirable</em></ins></span> to <span class="removed"><del><strong>reject.
-We</strong></del></span>
-<span class="inserted"><ins><em>do that.&lt;/p&gt;
-
-&lt;p&gt;We</em></ins></span> suggest the <span 
class="removed"><del><strong>terms</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &ldquo;digital audio 
player,&rdquo; or simply
-&ldquo;audio player&rdquo; <span class="removed"><del><strong>if context 
permits.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>when 
that's clear enough, instead of
-&ldquo;MP3 player.&rdquo;&lt;/p&gt;</em></ins></span>
+Even though the MP3 patents have expired, it is still undesirable to
+do that.&lt;/p&gt;
+
+&lt;p&gt;We suggest the term &ldquo;digital audio player,&rdquo; or simply
+&ldquo;audio player&rdquo; when that's clear enough, instead of
+&ldquo;MP3 player.&rdquo;&lt;/p&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
@@ -946,10 +948,10 @@
 software, or our views&mdash;that leads people to suppose our views
 are similar to theirs.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;blockquote&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Instead of &lt;b&gt;open source&lt;/b&gt;,
 we say, &lt;b&gt;free software&lt;/b&gt; or &lt;b&gt;free (libre) 
software&lt;/b&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</em></ins></span>
+&lt;/blockquote&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
@@ -1013,14 +1015,13 @@
 of slide presentation.  &ldquo;PowerPoint&rdquo; is just the name of
 one particular proprietary program to make presentations.  For your
 freedom's sake, you should use only free software to make your
-<span class="removed"><del><strong>presentations.</strong></del></span>
-<span class="inserted"><ins><em>presentations&mdash;which means, &lt;em&gt;not 
PowerPoint&lt;/em&gt;.</em></ins></span>  Recommended
+presentations&mdash;which means, &lt;em&gt;not PowerPoint&lt;/em&gt;.  
Recommended
 options include TeX's &lt;tt&gt;beamer&lt;/tt&gt; class and LibreOffice.org's
 Impress.&lt;/p&gt;
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
-&lt;h3 <span 
class="inserted"><ins><em>id="Product"&gt;&ldquo;Product&rdquo;&lt;/h3&gt;
+&lt;h3 id="Product"&gt;&ldquo;Product&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
 If you're talking about a product, by all means call it that.
@@ -1034,7 +1035,7 @@
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
-&lt;h3</em></ins></span> id="Protection"&gt;&ldquo;Protection&rdquo;&lt;/h3&gt;
+&lt;h3 id="Protection"&gt;&ldquo;Protection&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
 Publishers' lawyers love to use the term &ldquo;protection&rdquo; to
@@ -1138,6 +1139,18 @@
 
 &lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
 &lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
+&lt;h3 id="SharingPersonalData"&gt;&ldquo;Sharing (personal 
data)&rdquo;&lt;/h3&gt;
+&lt;!-- GNUN-SORT-END-KEY --&gt;
+&lt;p&gt;
+When companies manipulate or lure people into revealing personal data
+and thus ceding their privacy, please don't refer to this as
+&ldquo;sharing.&rdquo;  We use the term &ldquo;sharing&rdquo; to refer
+to noncommercial cooperation, including noncommercial redistribution
+of exact copies of published works, and we say this is 
&lt;em&gt;good&lt;/em&gt;.
+Please don't apply that word to a practice which is harmful and 
dangerous.&lt;/p&gt;
+
+&lt;!-- GNUN-SORT-NEXT-ITEM --&gt;
+&lt;!-- GNUN-SORT-BEGIN-KEY --&gt;
 &lt;h3 id="SharingEconomy"&gt;&ldquo;Sharing economy&rdquo;&lt;/h3&gt;
 &lt;!-- GNUN-SORT-END-KEY --&gt;
 &lt;p&gt;
@@ -1338,7 +1351,7 @@
      Information document, www.gnu.org/prep/maintain. --&gt;
 
 &lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2001, 2002, 2003, 2004, 2007,
-2008, 2009, 2010, 2011, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+2008, 2009, 2010, 2011, 2012, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -1348,7 +1361,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/10/02 14:59:43 $
+$Date: 2018/08/04 15:59:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/malware-apple.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.de.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/malware-apple.de.html   19 May 2018 11:33:05 -0000      1.27
+++ proprietary/malware-apple.de.html   4 Aug 2018 15:59:31 -0000       1.28
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-apple.de.po">
+ https://www.gnu.org/proprietary/po/malware-apple.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/proprietary/po/malware-apple.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Apples Betriebssysteme sind Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -753,7 +759,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-appliances.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.de.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/malware-appliances.de.html      18 Mar 2018 02:59:37 -0000      
1.11
+++ proprietary/malware-appliances.de.html      4 Aug 2018 15:59:31 -0000       
1.12
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-appliances.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-appliances.de.po">
+ https://www.gnu.org/proprietary/po/malware-appliances.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-appliances.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-appliances.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-appliances.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-appliances.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadsoftware in Geräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -709,7 +715,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.de.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/malware-microsoft.de.html       19 May 2018 11:33:05 -0000      
1.26
+++ proprietary/malware-microsoft.de.html       4 Aug 2018 15:59:31 -0000       
1.27
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.de.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Microsofts Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -688,7 +694,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/malware-mobiles.de.html 18 Mar 2018 02:59:37 -0000      1.21
+++ proprietary/malware-mobiles.de.html 4 Aug 2018 15:59:31 -0000       1.22
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.85 -->
@@ -14,6 +19,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadprogramme auf Mobilgeräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -703,7 +709,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/proprietary-insecurity.de.html  19 May 2018 11:33:05 -0000      
1.24
+++ proprietary/proprietary-insecurity.de.html  4 Aug 2018 15:59:31 -0000       
1.25
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-insecurity.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-insecurity.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Unsicherheit</h2>
 
 <a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a>
@@ -757,7 +763,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.de.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/proprietary-sabotage.de.html    18 Mar 2018 02:59:37 -0000      
1.28
+++ proprietary/proprietary-sabotage.de.html    4 Aug 2018 15:59:31 -0000       
1.29
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-sabotage.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-sabotage.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-sabotage.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-sabotage.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-05" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Sabotage</h2>
 
 <a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a>
@@ -529,7 +535,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/08/04 15:59:31 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-apple.de-diff.html   29 Sep 2017 05:59:41 -0000      
1.4
+++ proprietary/po/malware-apple.de-diff.html   4 Aug 2018 15:59:31 -0000       
1.5
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Apple's Operating Systems are Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-apple.translist" --&gt;
@@ -39,6 +39,11 @@
 because the developer's awareness that the users would be powerless to fix
 any malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;div class="summary" style="margin-top: 2em"&gt;
@@ -51,6 +56,7 @@
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#incompatibility"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can do with the data in their computers.&lt;/li&gt;
@@ -87,75 +93,10 @@
 &lt;/ul&gt;
 
 &lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
-&lt;ul&gt;
-
-<span class="inserted"><ins><em>&lt;li&gt;
-&lt;p&gt;Apple &lt;a
-href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-deleted several VPNs from its app store for China&lt;/a&gt;, 
-thus using its own censorship power to strengthen that of the Chinese 
-government.
-&lt;/p&gt;
-
-&lt;p&gt;If Apple had not designed the iMonsters to let Apple censor
-applications, 
-&lt;a href="/proprietary/proprietary-jails.html"&gt;
-Apple would not have had the power to stop users from installing
-VPNs&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
-
-&lt;li&gt;&lt;p&gt;
-Apple used its censorship system to enforce Russian
-surveillance &lt;a
-href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;This is ironic because LinkedIn is a surveillance system
-itself. While subjecting its users to its own surveillance, it tries
-to protect its users from Russian surveillance, and is therefore
-subject to Russian censorship.&lt;/p&gt;
-
-&lt;p&gt;However, the point here is the wrong of Apple's censorship of
-apps.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple used its censorship system to enforce
-China's censorship &lt;a 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;by
-blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple censors
-games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from the cr&hellip;app store&lt;/a&gt; because of which political
-points they suggest. Some political points are apparently considered
-acceptable.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-banned a program from the App Store&lt;/a&gt; because its developers
-committed the enormity of disassembling some iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple rejected an app that displayed the locations of US drone
-assassinations, giving various excuses. Each time the developers
-fixed one &ldquo;problem&rdquo;, Apple complained about another.
-After the fifth rejection,
-Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring the app based on the subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other Apple services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+&lt;p&gt;Apple mainly uses iOS, which is a typical jail, to impose censorship
+through the Apple Store. Please refer to &lt;a href="#jails"&gt;Apple 
Jails&lt;/a&gt;
+section for more information.&lt;/p&gt;
 
 &lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
@@ -168,7 +109,7 @@
   &lt;li&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
     to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses this API to render
+    malicious code from any application which uses this API to render
     a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -205,13 +146,31 @@
 
 &lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;The wrongs in this section are not precisely malware, since they do
-not involve making the program that runs in a way that hurts the user.
-But they are a lot like malware, since they are technical Apple
-actions that harm to the users of specific Apple software.&lt;/p&gt;
+&lt;p&gt;These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Apple has &lt;a 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to
+    block Telegram in Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client is free software on other platforms, but
+      not on iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+      are jails&lt;/a&gt;, they don't permit any app to be free
+      software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+ to APFS&lt;/a&gt;, which cannot be 
accessed
+    from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
     &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
@@ -221,7 +180,8 @@
 
   &lt;li&gt;
   &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</strong></del></span>
+  <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</em></ins></span>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
 
@@ -277,7 +237,7 @@
       taken. Users would have no way to tell whether the phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
       lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
         get them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -378,10 +338,60 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
+
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+
+&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can liberate the device
+the software runs on.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Apple devices lock users in &lt;a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely to Apple services&lt;/a&gt; by being designed to be incompatible with 
all
+other options, ethical or unethical.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means
+of converting them to or from Open Document Formats&lt;/a&gt;. iWork formats
+have changed several times since they were first introduced. This may have
+had the effect of thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
+
+&lt;p&gt;iWork formats are considered &lt;a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;In MacOS and iOS, the procedure for &lt;a
+href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images from the Photos format&lt;/a&gt; to a free format is so 
tedious
+and time-consuming that users just give up if they have a lot of 
them.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
 &lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+  href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its customers 
can
+  watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  <span 
class="removed"><del><strong>href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
+  <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
   Apple uses DRM software to prevent people from charging an iThing with a 
   generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
   
@@ -400,33 +410,123 @@
 &lt;/ul&gt;
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+
+&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+iOS, the operating system of the Apple iThings, is the prototype
+of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here is an article about the &lt;a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+
+&lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+walls of the iThing jail: users can now install apps built from
+source code, provided the source code is written in Swift.  Users
+cannot do this freely because they are required to identify
+themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+
+&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
-  iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
-
-  &lt;p&gt;Apple has used this power to
-  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
-
-  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
-  computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Here is an article about the &lt;a
-  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
-
-  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
-  walls of the the iThing jail: users can now install apps built from
-  source code, provided the source code is written in Swift.  Users
-  cannot do this freely because they are required to identify themselves.
-  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+      
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+      deleted several VPNs from its app store for China&lt;/a&gt;, thus using
+      its own censorship power to strengthen that of the Chinese
+      government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple is &lt;a
+      
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+      censoring apps for the US government too&lt;/a&gt;. Specifically, it
+      is deleting apps developed by Iranians.&lt;/p&gt;
+    &lt;p&gt;The root of these wrongs are in Apple. If Apple had not designed
+      the iMonsters to let Apple censor applications, Apple would not have
+      had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian surveillance 
&lt;a
+      
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+      by blocking distribution of the LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
+      While subjecting its users to its own surveillance, it tries to
+      protect its users from Russian surveillance, and is therefore
+      subject to Russian censorship.&lt;/p&gt;
+    &lt;p&gt;However, the point here is the wrong of Apple's censorship of
+      apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a 
+      
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+      by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+      banned a program from the App Store&lt;/a&gt; because its developers
+      committed the enormity of disassembling some iThings.&lt;/p&gt;
+    &lt;/li&gt;
 
-  &lt;p&gt;While this is a crack in the prison walls, it is not big enough to
-  mean that the iThings are no longer jails.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;As of 2015, Apple &lt;a
+      
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+      systematically bans apps that endorse abortion rights or would help
+      women find abortions&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This particular political slant &lt;a
+      
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+      affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple has banned iThing applications that show the confederate 
flag.
+      &lt;a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+      Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+      strategic games that use it to represent confederate army units
+      fighting in the Civil War.&lt;/p&gt;
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should 
not
+      be allowed to censor apps.  Even if Apple carried out this act of
+      censorship with some care, it would still be wrong.  Whether racism
+      is bad, whether educating people about drone attacks is bad, are not
+      the real issue.  Apple should not have the power to impose its views
+      about either of these questions, or any other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations of US drone
+      assassinations, giving various excuses. Each time the developers
+      fixed one &ldquo;problem&rdquo;, Apple complained about another.
+      After the fifth rejection, Apple &lt;a 
+      href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+      admitted it was censoring the app based on the subject
+      matter&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+      
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+      ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+      
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+      banned a game about growing marijuana&lt;/a&gt;, while permitting games
+      about other crimes such as killing people.  Perhaps Apple considers
+      killing more acceptable than marijuana.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
   More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -507,17 +607,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/29 05:59:41 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/malware-appliances.de-diff.html      18 Jan 2018 08:33:37 
-0000      1.2
+++ proprietary/po/malware-appliances.de-diff.html      4 Aug 2018 15:59:31 
-0000       1.3
@@ -38,17 +38,28 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;p&gt;Here are examples of malware in appliances.&lt;/p&gt;
 
 &lt;ul&gt;
+  &lt;li id="nest-thermometers"&gt;
+    &lt;p&gt;Nest thermometers
+      send &lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+      lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;A remote-control sex toy was 
found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
         of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
       is a surveillance device. &lt;a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -114,9 +125,9 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;For example, a cracker can gain access to the dishwasher's filesystem,
  infect it with malware, and force the dishwasher to launch attacks on
  other devices in the network. Since these dishwashers are used in hospitals,
@@ -199,7 +210,7 @@
 &lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
 &ldquo;Left Hand&rdquo; operating system have back doors that give HP
 &lt;a
-href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
 remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
 access to the customer's data, but if the back door allows
 installation of software changes, a change could be installed that
@@ -214,7 +225,7 @@
 dlink of an eye.&lt;/p&gt;
 
 &lt;p&gt;
-&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
 have back doors&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -315,7 +326,8 @@
 &lt;li&gt;
 &lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
 proprietary firmware so you can't trust it.  Western Digital's &lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
 &ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -358,7 +370,8 @@
 information in &lt;a
 href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
 &lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;</em></ins></span>
 IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -545,17 +558,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2016, 2017 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2016, 2017, 2018 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/18 08:33:37 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-microsoft.de-diff.html       13 Mar 2018 02:30:28 
-0000      1.8
+++ proprietary/po/malware-microsoft.de-diff.html       4 Aug 2018 15:59:31 
-0000       1.9
@@ -40,6 +40,12 @@
 because the developer's awareness that the users would be powerless to fix
 any malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;div class="summary" style="margin-top: 2em"&gt;
@@ -59,7 +65,7 @@
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
-<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#subscriptions"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#subscriptions"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -162,7 +168,7 @@
   &lt;li&gt;
     &lt;p&gt;Microsoft has made Windows 7 and 8 cease to function on certain
       new computers,
-      &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      &lt;a <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively</em></ins></span>
       forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -243,6 +249,12 @@
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft is planning to make Windows &lt;a
+      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
+      impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The reason Microsoft can force things on users is that Windows is
+      nonfree.&lt;/p&gt;&lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Windows displays
       &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
        intrusive ads for Microsoft products and its
@@ -291,15 +303,16 @@
 Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
 surveillance &lt;a
 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-    by force setting the telemetry mode to <span 
class="removed"><del><strong>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The &lt;a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;
+<span 
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;</em></ins></span>
  &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
  engineers to access, among other things, registry keys
  &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
  can contain sensitive information like administrator's login
- password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+ password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Windows DRM
 files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
@@ -354,7 +367,7 @@
 
   &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
   Windows Update snoops on the user.&lt;/a&gt;
-  &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
+  &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
   Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
   &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
   secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
@@ -406,18 +419,21 @@
 &lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;
-       &lt;p&gt;Windows 10 S ought to be called Windows 10 J, for 
&ldquo;Jail&rdquo;:
-       &lt;a 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;only
 programs from the Windows Store can be
-       downloaded and executed&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Windows 10 S was a jail: &lt;a
+      
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
+      only programs from the Windows Store could be installed and
+      executed&lt;/a&gt;. It was however possible to &lt;a
+      
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide"&gt;
+      upgrade to Windows 10 Pro&lt;/a&gt;. The successor of Windows 10 S is a
+      special configuration of Windows 10 called &lt;a
+      
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq"&gt;
+      S mode&lt;/a&gt;. The major difference with Windows 10 S is that there
+      is an easy way to switch out of S mode.&lt;/p&gt;&lt;/li&gt;
 
-       &lt;p&gt;If the history of iOS as a jail is any indication, Windows 10 J
-       will be no better.&lt;/p&gt;
-
-       &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
-  user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
+      Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
+      jail&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="tyrants"&gt;Microsoft Tyrants&lt;/h3&gt;
@@ -438,15 +454,15 @@
   users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;h3 id="subscriptions"&gt;Microsoft 
Subscriptions&lt;/h3&gt;
+&lt;h3 id="subscriptions"&gt;Microsoft Subscriptions&lt;/h3&gt;
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Microsoft Office forces
       users &lt;a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-      subscribe to Office 360 to be able to create/edit
+      subscribe to Office 365 to be able to create/edit
       documents&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 &lt;p&gt;As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.&lt;/p&gt;
@@ -498,17 +514,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/03/13 02:30:28 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-mobiles.de-diff.html 13 Mar 2018 11:59:16 -0000      
1.7
+++ proprietary/po/malware-mobiles.de-diff.html 4 Aug 2018 15:59:31 -0000       
1.8
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.85 --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
@@ -44,12 +44,18 @@
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Nearly all mobile phones do two 
grievous wrongs to their users:
+&lt;p&gt;Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
-is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;</em></ins></span>
+is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The phone network
     &lt;a href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
       tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
@@ -84,7 +90,7 @@
       transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
       are tracked, and may also make the listening feature work.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 &lt;p&gt;Here are examples of malware in mobile devices.  See also
 the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
@@ -113,17 +119,9 @@
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="removed"><del><strong>&lt;p&gt;The</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span>
-      <span class="inserted"><ins><em>door&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>portable phones
-      &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;Most</strong></del></span> <span 
class="inserted"><ins><em>essentially all</em></ins></span> mobile <span 
class="removed"><del><strong>phones have this universal back 
door,</strong></del></span> <span 
class="inserted"><ins><em>phones,</em></ins></span> which <span 
class="removed"><del><strong>has been
-      used to
-      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn</strong></del></span> <span class="inserted"><ins><em>permits 
converting</em></ins></span>
-      them <span class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>into full-time listening 
devices.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;See above for the &lt;a href="#universal-back-door"&gt;general 
universal back
+      door&lt;/a&gt; in essentially all mobile phones, which permits converting
+      them into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -139,22 +137,17 @@
   &lt;li&gt;
   &lt;p&gt;In Android,
   &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps&lt;/a&gt; (it is</strong></del></span> <span 
class="inserted"><ins><em>apps.&lt;/a&gt;  (It was</em></ins></span> in a
-  program called <span 
class="removed"><del><strong>GTalkService).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService, which seems since then to have been
-  merged into Google Play.)</em></ins></span>
+  Google has a back door to remotely delete apps.&lt;/a&gt;  (It was in a
+  program called GTalkService, which seems since then to have been
+  merged into Google Play.)
   &lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;p&gt;
-  Google</em></ins></span> can also
-  &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at the Wayback Machine (archived May 20, 
2015)"&gt;forcibly</strong></del></span> <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-  forcibly</em></ins></span> and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which seems, since that article, to 
have
-been merged into</strong></del></span> Google <span 
class="removed"><del><strong>Play).</strong></del></span> <span 
class="inserted"><ins><em>Play.</em></ins></span>
-  This <span class="removed"><del><strong>adds up</strong></del></span> <span 
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal 
back <span class="removed"><del><strong>door.</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various
-  dirty tricks.</em></ins></span>
+  &lt;p&gt;
+  Google can also
+  &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+  forcibly and remotely install apps&lt;/a&gt; through Google Play.
+  This is not equivalent to a universal back door, but permits various
+  dirty tricks.
   &lt;/p&gt;
 
   &lt;p&gt;
@@ -211,7 +204,7 @@
   BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
   does not operate via the universal back door that we know nearly all
   portable phones have. It may involve exploiting various bugs. There are
-   &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;</em></ins></span>
+   &lt;a href="#universal-back-door"&gt;
   lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -466,7 +459,8 @@
 
   &lt;li&gt;
   &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</strong></del></span>
+  <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</em></ins></span>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
 
@@ -545,17 +539,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/03/13 11:59:16 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-insecurity.de-diff.html  17 Jul 2017 04:30:33 
-0000      1.5
+++ proprietary/po/proprietary-insecurity.de-diff.html  4 Aug 2018 15:59:31 
-0000       1.6
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Proprietary Insecurity
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary-insecurity.translist" 
--&gt;
@@ -46,8 +46,69 @@
 &lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
+
 &lt;ul&gt;
-<span class="inserted"><ins><em>&lt;li id="break-security-smarttv"&gt;
+&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Some Samsung phones
+    randomly &lt;a 
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
+    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo; is that, 
if
+    you lose your internet service, you also &lt;a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;For your safety, don't use any appliance with a connection to the 
real
+    internet.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you 
know it,
+    the system has a grave security flaw.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back door has 
&lt;a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
+    unintended back doors&lt;/a&gt; too.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Bad security in some cars makes it possible
+    to &lt;a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
+      remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals is connected to the internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note that this article misuses the term &lt;a
+href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring to crackers.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+     href="/philosophy/words-to-avoid.html#Monetize"&gt;
+     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
+  &lt;a
+href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+  hijacked by programs that play commands in ultrasound that humans can't
+  hear&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+       
+&lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
       Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
@@ -90,19 +151,19 @@
        &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
        of Windows computers with ransomware&lt;/a&gt;.
        &lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
-&lt;li&gt;
+&lt;li  id="intel-me-10-year-vulnerability"&gt;
   &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
        &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
        vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;p&gt;The vulnerability allowed a cracker 
to access the computer's Intel Active
+  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
       Management Technology
       (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
       web interface with an empty password and gave administrative
       access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
-      among other privileges.&lt;/p&gt;</em></ins></span>
+      among other privileges.&lt;/p&gt;
 
        &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
        to turn off the Intel Management Engine. Thus, even users who are 
@@ -118,9 +179,9 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;For example, a cracker can gain access to the dishwasher's 
filesystem, 
 infect it with malware, and force the dishwasher to launch attacks on other
@@ -169,7 +230,7 @@
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-ransomeware&lt;/a&gt;.&lt;/p&gt;
+ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -185,8 +246,9 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
-been developed for a thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Ransomware &lt;a <span 
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;
+has</em></ins></span> been developed for a thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -206,7 +268,7 @@
 &lt;li&gt;
 &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to
 &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code from any application which uses this API to render a
+  malicious code from any application which uses this API to render a
   certain kind of image file&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
@@ -306,7 +368,7 @@
 &ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary
 firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo;
 drives
-&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
+&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</em></ins></span>
 a back door&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -414,7 +476,8 @@
 It is possible to kill people by taking control of medical implants by
 radio&lt;/a&gt;.  Here
 is &lt;a href="http://www.bbc.co.uk/news/technology-17631838"&gt;more
-information&lt;/a&gt;.  And &lt;a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.
+information&lt;/a&gt;.  And &lt;a <span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -522,17 +585,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/07/17 04:30:33 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-sabotage.de-diff.html    30 Sep 2017 10:00:55 
-0000      1.9
+++ proprietary/po/proprietary-sabotage.de-diff.html    4 Aug 2018 15:59:31 
-0000       1.10
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
 &lt;title&gt;Proprietary Sabotage - GNU Project - Free Software 
Foundation&lt;/title&gt;
 &lt;!--#include virtual="/proprietary/po/proprietary-sabotage.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -26,12 +26,48 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of proprietary software that has something
 worse than a back door.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Tesla used software to limit 
customers to using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;part
 of the battery of some
+    <span class="inserted"><ins><em>&lt;p&gt;Apple has &lt;a 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to
+    block Telegram in Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client is free software on other platforms, but
+      not on iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+      are jails&lt;/a&gt;, they don't permit any app to be free
+      software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+ to APFS&lt;/a&gt;, which cannot be 
accessed
+    from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Logitech will sabotage all Harmony Link household control devices 
by
+&lt;a 
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+      turning off the server through which the products' supposed owners
+      communicate with them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
+      they are wise, they will learn, rather, to distrust any product that
+      requires users to talk with them through some specialized 
service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Tesla used software to limit customers to using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;part
 of the battery of some
     cars&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -56,7 +92,7 @@
       company the power to convert it into a $300 out-of-warranty brick, for
       your &ldquo;dumb home&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
@@ -81,7 +117,8 @@
 
   &lt;li&gt;
   &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</strong></del></span>
+  <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;</em></ins></span>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
 
@@ -94,7 +131,7 @@
   &lt;li&gt;
     &lt;p&gt;Microsoft has made Windows 7 and 8 cease to
       function on certain new computers,
-      &lt;a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      &lt;a <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively</em></ins></span>
       forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -370,17 +407,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/30 10:00:55 $
+$Date: 2018/08/04 15:59:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/basic-freedoms.de-diff.html
===================================================================
RCS file: philosophy/po/basic-freedoms.de-diff.html
diff -N philosophy/po/basic-freedoms.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/basic-freedoms.de-diff.html   4 Aug 2018 15:59:30 -0000       
1.1
@@ -0,0 +1,126 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/basic-freedoms.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Freedom of Speech, Press and Association on the Internet
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Freedom of Speech, Press, and Association on the Internet&lt;/h2&gt;
+
+&lt;p&gt;
+  The Free Software Foundation supports the freedoms of speech, press, and
+  association on the Internet.  Please check out:
+&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
+    material published on the Internet, the Communications Decency Act, which
+    the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
+
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
+    describes how the Communications Decency Act required the GNU
+    Project to censor GNU Emacs&mdash;and how this paradoxically had
+    the opposite of the effect that the censors wanted.
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
+    is a non-profit Internet digest, news service, library, dialogue
+    center, and archive dedicated to the promotion and defense of
+    international free thought, free speech, and privacy rights.
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    The &lt;a href="http://www.eff.org/blueribbon.html"&gt;Blue Ribbon 
Campaign&lt;/a&gt;
+    for Online Freedom of Speech, Press and Association.
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
+    decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
+    disagree; then Congress gets a chance to look for another method of
+    censorship.&lt;/li&gt;
+
+  &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a 
href="/links/links.html#FreedomOrganizations"&gt;Organizations&lt;/a&gt;
+    that work for freedom in computer development and electronic
+    communications.
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/08/04 15:59:30 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: philosophy/po/basic-freedoms.ja-diff.html
===================================================================
RCS file: philosophy/po/basic-freedoms.ja-diff.html
diff -N philosophy/po/basic-freedoms.ja-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/basic-freedoms.ja-diff.html   4 Aug 2018 15:59:30 -0000       
1.1
@@ -0,0 +1,126 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/basic-freedoms.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Freedom of Speech, Press and Association on the Internet
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/basic-freedoms.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Freedom of Speech, Press, and Association on the Internet&lt;/h2&gt;
+
+&lt;p&gt;
+  The Free Software Foundation supports the freedoms of speech, press, and
+  association on the Internet.  Please check out:
+&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;The &lt;a
+    
href="https://web.archive.org/web/19990424100121/http://www.ciec.org/"&gt;Citizens
+    Internet Empowerment Coalition&lt;/a&gt; at the Wayback Machine (archived 
April
+    24, 1999) came together to oppose Congress' first attempt to regulate
+    material published on the Internet, the Communications Decency Act, which
+    the U.S. Supreme Court found unconstitutional on June 26, 1997. Their site
+    is being preserved as a resource on the landmark CDA case.&lt;/li&gt;
+
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of July 09, 
1998 --&gt;
+    The &lt;a
+    href="https://web.archive.org/web/19980709161803/http://vtw.org/"&gt;Voters
+    Telecommunications Watch&lt;/a&gt; at the Wayback Machine (archived July 
09,
+    1998) and their excellent announcement electronic mailing list.&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a href="/philosophy/censoring-emacs.html"&gt;Censoring GNU 
Emacs&lt;/a&gt;
+    describes how the Communications Decency Act required the GNU
+    Project to censor GNU Emacs&mdash;and how this paradoxically had
+    the opposite of the effect that the censors wanted.
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://www.factnet.org/"&gt;F.A.C.T.Net</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.factnetglobal.org/"&gt;F.A.C.T.Net</em></ins></span>
 Inc.&lt;/a&gt;
+    is a non-profit Internet digest, news service, library, dialogue
+    center, and archive dedicated to the promotion and defense of
+    international free thought, free speech, and privacy rights.
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    The &lt;a href="http://www.eff.org/blueribbon.html"&gt;Blue Ribbon 
Campaign&lt;/a&gt;
+    for Online Freedom of Speech, Press and Association.
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;!-- activating this link… site is archived as of December 
01, 2001 --&gt;
+    You can read &lt;a
+    
href="https://web.archive.org/web/20011201050533/http://www.vtw.org/speech/"&gt;the
+    June 1996 appeals court decision&lt;/a&gt; at the Wayback Machine (archived
+    December 01, 2001) rejecting censorship of the Internet. But remember, this
+    decision is &lt;em&gt;not&lt;/em&gt; final! First, the Supreme Court will 
agree or
+    disagree; then Congress gets a chance to look for another method of
+    censorship.&lt;/li&gt;
+
+  &lt;li&gt;&lt;a href="/philosophy/savingeurope.html"&gt;Saving Europe from 
Software Patents&lt;/a&gt;&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;a 
href="/links/links.html#FreedomOrganizations"&gt;Organizations&lt;/a&gt;
+    that work for freedom in computer development and electronic
+    communications.
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
+2007, 2014, <span class="removed"><del><strong>2016</strong></del></span> 
<span class="inserted"><ins><em>2016, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/08/04 15:59:30 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: philosophy/po/who-does-that-server-really-serve.de-diff.html
===================================================================
RCS file: philosophy/po/who-does-that-server-really-serve.de-diff.html
diff -N philosophy/po/who-does-that-server-really-serve.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/who-does-that-server-really-serve.de-diff.html        4 Aug 
2018 15:59:30 -0000       1.1
@@ -0,0 +1,486 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/who-does-that-server-really-serve.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Who Does That Server Really Serve?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+
+&lt;!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+   
+&lt;h2&gt;Who does that server really serve?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;strong&gt;Richard Stallman&lt;/strong&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;(The first version was published
+in &lt;a 
href="http://www.bostonreview.net/richard-stallman-free-software-DRM"&gt;
+Boston Review&lt;/a&gt;.)&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;&lt;strong&gt;On the Internet, proprietary software isn't the only 
way to
+lose your freedom.  Service as a Software Substitute, or SaaSS, is
+another way to give someone else power over your 
computing.&lt;/strong&gt;&lt;/p&gt;
+
+&lt;p&gt;The basic point is, you can have control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.&lt;/p&gt;
+
+
+&lt;p&gt;SaaSS means using a service implemented by someone else as a
+substitute for running your copy of a program.  The term is ours;
+articles and ads won't use it, and they won't tell you whether a
+service is SaaSS.  Instead they will probably use the vague and
+distracting term &ldquo;cloud&rdquo;, which lumps SaaSS together with
+various other practices, some abusive and some ok.  With the
+explanation and examples in this page, you can tell whether a service
+is SaaSS.&lt;/p&gt;
+
+&lt;h3&gt;Background: How Proprietary Software Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Digital technology can give you freedom; it can also take your
+freedom away.  The first threat to our control over our computing came
+from &lt;em&gt;proprietary software&lt;/em&gt;: software that the users cannot
+control because the owner (a company such as Apple or Microsoft)
+controls it.  The owner often takes advantage of this unjust power by
+inserting malicious features such as spyware, back doors, and &lt;a
+href="http://DefectiveByDesign.org"&gt;Digital Restrictions Management
+(DRM)&lt;/a&gt; (referred to as &ldquo;Digital Rights Management&rdquo; in
+their propaganda).&lt;/p&gt;
+
+&lt;p&gt;Our solution to this problem is developing &lt;em&gt;free 
software&lt;/em&gt;
+and rejecting proprietary software.  Free software means that you, as
+a user, have four essential freedoms: (0)&nbsp;to run the program as
+you wish, (1)&nbsp;to study and change the source code so it does what
+you wish, (2)&nbsp;to redistribute exact copies, and (3)&nbsp;to
+redistribute copies of your modified versions.  (See
+the &lt;a href="/philosophy/free-sw.html"&gt;free software
+definition&lt;/a&gt;.)&lt;/p&gt;
+
+&lt;p&gt;With free software, we, the users, take back control of our
+computing.  Proprietary software still exists, but we can exclude it
+from our lives and many of us have done so.  However, we are now
+offered another tempting way to cede control over our computing:
+Service as a Software Substitute (SaaSS).  For our freedom's sake, we
+have to reject that too.&lt;/p&gt;
+
+&lt;h3&gt;How Service as a Software Substitute Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Service as a Software Substitute (SaaSS) means using a service as a
+substitute for running your copy of a program.  Concretely, it means
+that someone sets up a network server that does certain computing
+tasks&mdash;for instance, modifying a photo, translating text into
+another language, etc.&mdash;then invites users to do computing via
+that server.  A user of the server would send her data to the server,
+which does &lt;em&gt;her own computing&lt;/em&gt; on the data thus provided, 
then
+sends the results back to her or acts directly on her behalf.&lt;/p&gt;
+
+&lt;p&gt;The computing is &lt;em&gt;her own&lt;/em&gt; because, by assumption, 
she
+could, in principle, have done it by running a program on her own
+computer (whether or not that program is available to her at
+present).  In cases where this assumption is not so, it isn't SaaSS.&lt;/p&gt;
+
+&lt;p&gt;These servers wrest control from the users even more inexorably
+than proprietary software.  With proprietary software, users typically
+get an executable file but not the source code.  That makes it hard to
+study the code that is running, so it's hard to determine what the
+program really does, and hard to change it.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the users do not have even the executable file that
+does their computing: it is on someone else's server, where the users
+can't see or touch it.  Thus it is impossible for them to ascertain
+what it really does, and impossible to change it.&lt;/p&gt;
+
+&lt;p&gt;Furthermore, SaaSS automatically leads to consequences equivalent
+to the malicious features of certain proprietary software.&lt;/p&gt;
+
+&lt;p&gt; For instance, some proprietary programs are &ldquo;spyware&rdquo;:
+the program &lt;a href="/philosophy/proprietary-surveillance.html"&gt;
+sends out data about users' computing activities&lt;/a&gt;.
+Microsoft Windows sends information about users' activities to
+Microsoft.  Windows Media Player reports what each user watches or
+listens to.  The Amazon Kindle reports which pages of which books the
+user looks at, and when.  Angry Birds reports the user's geolocation
+history.&lt;/p&gt;
+
+&lt;p&gt;Unlike proprietary software, SaaSS does not require covert code to
+obtain the user's data.  Instead, users must send their data to the
+server in order to use it.  This has the same effect as spyware: the
+server operator gets the data&mdash;with no special effort, by the
+nature of SaaSS.  Amy Webb, who intended never to post any photos of
+her daughter, made the mistake of using SaaSS (Instagram) to edit
+photos of her.  Eventually
+&lt;a 
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html"&gt;
 they
+leaked from there&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;Theoretically, homomorphic encryption might some day advance to the
+point where future SaaSS services might be constructed to be unable to
+understand some of the data that users send them.  Such
+services &lt;em&gt;could&lt;/em&gt; be set up not to snoop on users; this does 
not
+mean they &lt;em&gt;will&lt;/em&gt; do no snooping.&lt;/p&gt;
+
+&lt;p&gt;Some proprietary operating systems have a universal back door,
+permitting someone to remotely install software changes.  For
+instance, Windows has a universal back door with which Microsoft can
+forcibly change any software on the machine.  Nearly all portable
+phones have them, too.  Some proprietary applications also have
+universal back doors; for instance, the Steam client for GNU/Linux
+allows the developer to remotely install modified versions.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the server operator can change the software in use on
+the server.  He ought to be able to do this, since it's his computer;
+but the result is the same as using a proprietary application program
+with a universal back door: someone has the power to silently impose
+changes in how the user's computing gets done.&lt;/p&gt;
+
+&lt;p&gt;Thus, SaaSS is equivalent to running proprietary software with
+spyware and a universal back door.  It gives the server operator
+unjust power over the user, and that power is something we must
+resist.&lt;/p&gt;
+
+&lt;h3&gt;SaaSS and SaaS&lt;/h3&gt;
+
+&lt;p&gt;Originally we referred to this problematical practice as
+&ldquo;SaaS&rdquo;, which stands for &ldquo;Software as a
+Service&rdquo;.  It's a commonly used term for setting up software on a
+server rather than offering copies of it to users, and we thought it
+described precisely the cases where this problem occurs.&lt;/p&gt;
+
+&lt;p&gt;Subsequently we became aware that the term SaaS is sometimes used for
+communication services&mdash;activities for which this issue is not
+applicable.  In addition, the term &ldquo;Software as a Service&rdquo;
+doesn't explain &lt;em&gt;why&lt;/em&gt; the practice is bad.  So we coined 
the term
+&ldquo;Service as a Software Substitute&rdquo;, which defines the bad
+practice more clearly and says what is bad about it.&lt;/p&gt;
+
+&lt;h3&gt;Untangling the SaaSS Issue from the Proprietary Software 
Issue&lt;/h3&gt;
+
+&lt;p&gt;SaaSS and proprietary software lead to similar harmful results, but
+the mechanisms are different.  With proprietary software, the
+mechanism is that you have and use a copy which is difficult and/or
+illegal to change.  With SaaSS, the mechanism is that you don't have
+the copy that's doing your computing.&lt;/p&gt;
+
+&lt;p&gt;These two issues are often confused, and not only by accident.  Web
+developers use the vague term &ldquo;web application&rdquo; to lump
+the server software together with programs run on your machine in your
+browser.  Some web pages install nontrivial, even large JavaScript
+programs into your browser without informing
+you.  &lt;a href="/philosophy/javascript-trap.html"&gt;When these JavaScript
+programs are nonfree&lt;/a&gt;, they cause the same sort of injustice as any
+other nonfree software.  Here, however, we are concerned with the
+issue of using the service itself.&lt;/p&gt;
+
+&lt;p&gt;Many free software supporters assume that the problem of SaaSS will
+be solved by developing free software for servers.  For the server
+operator's sake, the programs on the server had better be free; if
+they are proprietary, their developers/owners have power over the
+server.  That's unfair to the server operator, and doesn't help the
+server's users at all.  But if the programs on the server are free,
+that doesn't protect &lt;em&gt;the server's users&lt;/em&gt; from the effects 
of
+SaaSS.  These programs liberate the server operator, but not the
+server's users.&lt;/p&gt;
+
+&lt;p&gt;Releasing the server software source code does benefit the
+community: it enables suitably skilled users to set up similar
+servers, perhaps changing the
+software.  &lt;a href="/licenses/license-recommendations.html"&gt; We
+recommend using the GNU Affero GPL&lt;/a&gt; as the license for programs
+often used on servers.&lt;/p&gt;
+
+&lt;p&gt;But none of these servers would give you control over computing you
+do on it, unless it's &lt;em&gt;your&lt;/em&gt; server (one whose software load
+you control, regardless of whether the machine is your property).  It
+may be OK to trust your friend's server for some jobs, just as you
+might let your friend maintain the software on your own computer.
+Outside of that, all these servers would be SaaSS for you.  SaaSS
+always subjects you to the power of the server operator, and the only
+remedy is, &lt;em&gt;Don't use SaaSS!&lt;/em&gt;  Don't use someone else's 
server
+to do your own computing on data provided by you.&lt;/p&gt;
+
+&lt;p&gt;This issue demonstrates the depth of the difference between
+&ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
+source &lt;a href="/philosophy/free-open-overlap.html"&gt;is, nearly always,
+free&lt;/a&gt;.  However, the idea of
+an &lt;a <span 
class="removed"><del><strong>href="http://opendefinition.org/software-service"&gt;&ldquo;open</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://opendefinition.org/ossd/"&gt;&ldquo;open</em></ins></span>
+software&rdquo; service&lt;/a&gt;, meaning one whose server software is open
+source and/or free, fails to address the issue of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Services are fundamentally different from programs, and the ethical
+issues that services raise are fundamentally different from the issues
+that programs raise.  To avoid confusion,
+we &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+avoid describing a service as &ldquo;free&rdquo; or
+&ldquo;proprietary.&rdquo;&lt;/a&gt;&lt;/p&gt;
+
+&lt;h3&gt;Distinguishing SaaSS from Other Network Services&lt;/h3&gt;
+
+&lt;p&gt;Which online services are SaaSS?  The clearest example is a
+translation service, which translates (say) English text into Spanish
+text.  Translating a text for you is computing that is purely yours.
+You could do it by running a program on your own computer, if only you
+had the right program.  (To be ethical, that program should be free.)
+The translation service substitutes for that program, so it is Service
+as a Software Substitute, or SaaSS.  Since it denies you control
+over your computing, it does you wrong.&lt;/p&gt;
+
+&lt;p&gt;Another clear example is using a service such as Flickr or
+Instagram to modify a photo.  Modifying photos is an activity that
+people have done in their own computers for decades; doing it in a
+server you don't control, rather than your own computer, is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Rejecting SaaSS does not mean refusing to use any network servers
+run by anyone other than you.  Most servers are not SaaSS because the
+jobs they do are some sort of communication, rather than the user's
+own computing.&lt;/p&gt;
+
+&lt;p&gt;The original idea of web servers wasn't to do computing for you, it
+was to publish information for you to access.  Even today this is what
+most web sites do, and it doesn't pose the SaaSS problem, because
+accessing someone's published information isn't doing your own
+computing.  Neither is use of a blog site to publish your own works,
+or using a microblogging service such as Twitter or StatusNet.  (These
+services may or may not have other problems, depending on details.)
+The same goes for other communication not meant to be private, such as
+chat groups.&lt;/p&gt;
+
+&lt;p&gt;In its essence, social networking is a form of communication and
+publication, not SaaSS.  However, a service whose main facility is
+social networking can have features or extensions which are SaaSS.&lt;/p&gt;
+
+&lt;p&gt;If a service is not SaaSS, that does not mean it is OK.  There are
+other ethical issues about services.  For instance, Facebook
+distributes video in Flash, which pressures users to run nonfree
+software; it requires running nonfree JavaScript code; and it gives
+users a misleading impression of privacy while luring them into baring
+their lives to Facebook.  Those are important issues, different from
+the SaaSS issue.
+&lt;/p&gt;
+
+&lt;p&gt;Services such as search engines collect data from around the web
+and let you examine it.  Looking through their collection of data
+isn't your own computing in the usual sense&mdash;you didn't provide
+that collection&mdash;so using such a service to search the web is not
+SaaSS.  However, using someone else's server to implement a search
+facility for your own site &lt;em&gt;is&lt;/em&gt; SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Purchasing online is not SaaSS, because the computing
+isn't &lt;em&gt;your own&lt;/em&gt; activity; rather, it is done jointly by and
+for you and the store.  The real issue in online shopping is whether
+you trust the other party with your money and other personal
+information (starting with your name).&lt;/p&gt;
+
+&lt;p&gt;Repository sites such as Savannah and SourceForge are not
+inherently SaaSS, because a repository's job is publication of data
+supplied to it.&lt;/p&gt;
+
+&lt;p&gt;Using a joint project's servers isn't SaaSS because the computing
+you do in this way isn't your own.  For instance, if you edit pages on
+Wikipedia, you are not doing your own computing; rather, you are
+collaborating in Wikipedia's computing.  Wikipedia controls its own
+servers, but organizations as well as individuals encounter the
+problem of SaaSS if they do their computing in someone else's
+server.&lt;/p&gt;
+
+&lt;p&gt;Some sites offer multiple services, and if one is not SaaSS,
+another may be SaaSS.  For instance, the main service of Facebook is
+social networking, and that is not SaaSS; however, it supports
+third-party applications, some of which are SaaSS.  Flickr's main
+service is distributing photos, which is not SaaSS, but it also has
+features for editing photos, which is SaaSS.  Likewise, using
+Instagram to post a photo is not SaaSS, but using it to transform the
+photo is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Google Docs shows how complex the evaluation of a single service
+can become.  It invites people to edit a document by running a
+large &lt;a href="/philosophy/javascript-trap.html"&gt;nonfree JavaScript
+program&lt;/a&gt;, clearly wrong.  However, it offers an API for uploading
+and downloading documents in standard formats.  A free software editor
+can do so through this API.  This usage scenario is not SaaSS, because
+it uses Google Docs as a mere repository.  Showing all your data to a
+company is bad, but that is a matter of privacy, not SaaSS; depending
+on a service for access to your data is bad, but that is a matter of
+risk, not SaaSS.  On the other hand, using the service for converting
+document formats &lt;em&gt;is&lt;/em&gt; SaaSS, because it's something you 
could
+have done by running a suitable program (free, one hopes) in your own
+computer.&lt;/p&gt;
+
+&lt;p&gt;Using Google Docs through a free editor is rare, of course.  Most
+often, people use it through the nonfree JavaScript program, which is
+bad like any nonfree program.  This scenario might involve SaaSS, too;
+that depends on what part of the editing is done in the JavaScript
+program and what part in the server.  We don't know, but since SaaSS
+and proprietary software do similar wrong to the user, it is not
+crucial to know.&lt;/p&gt;
+
+&lt;p&gt;Publishing via someone else's repository does not raise privacy
+issues, but publishing through Google Docs has a special problem: it
+is impossible even to &lt;em&gt;view the text&lt;/em&gt; of a Google Docs 
document
+in a browser without running the nonfree JavaScript code.  Thus, you
+should not use Google Docs to publish anything&mdash;but the reason
+is not a matter of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;The IT industry discourages users from making these distinctions.
+That's what the buzzword &ldquo;cloud computing&rdquo; is for.  This
+term is so nebulous that it could refer to almost any use of the
+Internet.  It includes SaaSS as well as many other network usage
+practices.  In any given context, an author who writes
+&ldquo;cloud&rdquo; (if a technical person) probably has a specific
+meaning in mind, but usually does not explain that in other articles
+the term has other specific meanings.  The term leads people to
+generalize about practices they ought to consider individually.&lt;/p&gt;
+
+&lt;p&gt;If &ldquo;cloud computing&rdquo; has a meaning, it is not a way of
+doing computing, but rather a way of thinking about computing: a
+devil-may-care approach which says, &ldquo;Don't ask questions.  Don't
+worry about who controls your computing or who holds your data.  Don't
+check for a hook hidden inside our service before you swallow it.
+Trust companies without hesitation.&rdquo; In other words, &ldquo;Be a
+sucker.&rdquo; A cloud in the mind is an obstacle to clear thinking.
+For the sake of clear thinking about computing, let's avoid the term
+&ldquo;cloud.&rdquo;&lt;/p&gt;
+
+&lt;h3 id="renting"&gt;Renting a Server Distinguished from SaaSS&lt;/h3&gt;
+
+&lt;p&gt;If you rent a server (real or virtual), whose software load you
+have control over, that's not SaaSS.  In SaaSS, someone else decides
+what software runs on the server and therefore controls the computing
+it does for you.  In the case where you install the software on the
+server, you control what computing it does for you.  Thus, the rented
+server is virtually your computer.  For this issue, it counts as
+yours.&lt;/p&gt;
+
+&lt;p&gt;The &lt;em&gt;data&lt;/em&gt; on the rented remote server is less 
secure than
+if you had the server at home, but that is a separate issue from
+SaaSS.&lt;/p&gt;
+
+&lt;p&gt;This kind of server rental is sometimes called &ldquo;IaaS,&rdquo;
+but that term fits into a conceptual structure that downplays the issues
+that we consider important.&lt;/p&gt;
+
+&lt;h3&gt;Dealing with the SaaSS Problem&lt;/h3&gt;
+
+&lt;p&gt;Only a small fraction of all web sites do SaaSS; most don't raise
+the issue.  But what should we do about the ones that raise it?&lt;/p&gt;
+
+&lt;p&gt;For the simple case, where you are doing your own computing on data
+in your own hands, the solution is simple: use your own copy of a free
+software application.  Do your text editing with your copy of a free
+text editor such as GNU Emacs or a free word processor.  Do your photo
+editing with your copy of free software such as GIMP.  What if there
+is no free program available?  A proprietary program or SaaSS would
+take away your freedom, so you shouldn't use those.  You can contribute
+your time or your money to development of a free replacement.&lt;/p&gt;
+
+&lt;p&gt;What about collaborating with other individuals as a group?  It may
+be hard to do this at present without using a server, and your group
+may not know how to run its own server.  If you use someone else's
+server, at least don't trust a server run by a company.  A mere
+contract as a customer is no protection unless you could detect a
+breach and could really sue, and the company probably writes its
+contracts to permit a broad range of abuses.  The state can subpoena
+your data from the company along with everyone else's, as Obama has
+done to phone companies, supposing the company doesn't volunteer them
+like the US phone companies that illegally wiretapped their customers
+for Bush.  If you must use a server, use a server whose operators give
+you a basis for trust beyond a mere commercial relationship.&lt;/p&gt;
+
+&lt;p&gt;However, on a longer time scale, we can create alternatives to
+using servers.  For instance, we can create a peer-to-peer program
+through which collaborators can share data encrypted.  The free
+software community should develop distributed peer-to-peer
+replacements for important &ldquo;web applications&rdquo;.  It may be
+wise to release them under
+the &lt;a href="/licenses/why-affero-gpl.html"&gt; GNU Affero GPL&lt;/a&gt;, 
since
+they are likely candidates for being converted into server-based
+programs by someone else.  The &lt;a href="/"&gt;GNU project&lt;/a&gt; is 
looking
+for volunteers to work on such replacements.  We also invite other
+free software projects to consider this issue in their design.&lt;/p&gt;
+
+&lt;p&gt;In the meantime, if a company invites you to use its server to do
+your own computing tasks, don't yield; don't use SaaSS.  Don't buy or
+install &ldquo;thin clients&rdquo;, which are simply computers so weak
+they make you do the real work on a server, unless you're going to use
+them with &lt;em&gt;your&lt;/em&gt; server.  Use a real computer and keep your
+data there.  Do your own computing with your own copy of a free
+program, for your freedom's sake.&lt;/p&gt;
+
+&lt;h3&gt;See also:&lt;/h3&gt;
+&lt;p&gt;&lt;a href="/philosophy/bug-nobody-allowed-to-understand.html"&gt;The
+Bug Nobody is Allowed to Understand&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2010, 2013, 2015, 2016, 2018 Richard 
Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/08/04 15:59:30 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: philosophy/po/who-does-that-server-really-serve.sq-diff.html
===================================================================
RCS file: philosophy/po/who-does-that-server-really-serve.sq-diff.html
diff -N philosophy/po/who-does-that-server-really-serve.sq-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/who-does-that-server-really-serve.sq-diff.html        4 Aug 
2018 15:59:30 -0000       1.1
@@ -0,0 +1,486 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/who-does-that-server-really-serve.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Who Does That Server Really Serve?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+
+&lt;!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+   
+&lt;h2&gt;Who does that server really serve?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;strong&gt;Richard Stallman&lt;/strong&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;(The first version was published
+in &lt;a 
href="http://www.bostonreview.net/richard-stallman-free-software-DRM"&gt;
+Boston Review&lt;/a&gt;.)&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;&lt;strong&gt;On the Internet, proprietary software isn't the only 
way to
+lose your freedom.  Service as a Software Substitute, or SaaSS, is
+another way to give someone else power over your 
computing.&lt;/strong&gt;&lt;/p&gt;
+
+&lt;p&gt;The basic point is, you can have control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.&lt;/p&gt;
+
+
+&lt;p&gt;SaaSS means using a service implemented by someone else as a
+substitute for running your copy of a program.  The term is ours;
+articles and ads won't use it, and they won't tell you whether a
+service is SaaSS.  Instead they will probably use the vague and
+distracting term &ldquo;cloud&rdquo;, which lumps SaaSS together with
+various other practices, some abusive and some ok.  With the
+explanation and examples in this page, you can tell whether a service
+is SaaSS.&lt;/p&gt;
+
+&lt;h3&gt;Background: How Proprietary Software Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Digital technology can give you freedom; it can also take your
+freedom away.  The first threat to our control over our computing came
+from &lt;em&gt;proprietary software&lt;/em&gt;: software that the users cannot
+control because the owner (a company such as Apple or Microsoft)
+controls it.  The owner often takes advantage of this unjust power by
+inserting malicious features such as spyware, back doors, and &lt;a
+href="http://DefectiveByDesign.org"&gt;Digital Restrictions Management
+(DRM)&lt;/a&gt; (referred to as &ldquo;Digital Rights Management&rdquo; in
+their propaganda).&lt;/p&gt;
+
+&lt;p&gt;Our solution to this problem is developing &lt;em&gt;free 
software&lt;/em&gt;
+and rejecting proprietary software.  Free software means that you, as
+a user, have four essential freedoms: (0)&nbsp;to run the program as
+you wish, (1)&nbsp;to study and change the source code so it does what
+you wish, (2)&nbsp;to redistribute exact copies, and (3)&nbsp;to
+redistribute copies of your modified versions.  (See
+the &lt;a href="/philosophy/free-sw.html"&gt;free software
+definition&lt;/a&gt;.)&lt;/p&gt;
+
+&lt;p&gt;With free software, we, the users, take back control of our
+computing.  Proprietary software still exists, but we can exclude it
+from our lives and many of us have done so.  However, we are now
+offered another tempting way to cede control over our computing:
+Service as a Software Substitute (SaaSS).  For our freedom's sake, we
+have to reject that too.&lt;/p&gt;
+
+&lt;h3&gt;How Service as a Software Substitute Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Service as a Software Substitute (SaaSS) means using a service as a
+substitute for running your copy of a program.  Concretely, it means
+that someone sets up a network server that does certain computing
+tasks&mdash;for instance, modifying a photo, translating text into
+another language, etc.&mdash;then invites users to do computing via
+that server.  A user of the server would send her data to the server,
+which does &lt;em&gt;her own computing&lt;/em&gt; on the data thus provided, 
then
+sends the results back to her or acts directly on her behalf.&lt;/p&gt;
+
+&lt;p&gt;The computing is &lt;em&gt;her own&lt;/em&gt; because, by assumption, 
she
+could, in principle, have done it by running a program on her own
+computer (whether or not that program is available to her at
+present).  In cases where this assumption is not so, it isn't SaaSS.&lt;/p&gt;
+
+&lt;p&gt;These servers wrest control from the users even more inexorably
+than proprietary software.  With proprietary software, users typically
+get an executable file but not the source code.  That makes it hard to
+study the code that is running, so it's hard to determine what the
+program really does, and hard to change it.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the users do not have even the executable file that
+does their computing: it is on someone else's server, where the users
+can't see or touch it.  Thus it is impossible for them to ascertain
+what it really does, and impossible to change it.&lt;/p&gt;
+
+&lt;p&gt;Furthermore, SaaSS automatically leads to consequences equivalent
+to the malicious features of certain proprietary software.&lt;/p&gt;
+
+&lt;p&gt; For instance, some proprietary programs are &ldquo;spyware&rdquo;:
+the program &lt;a href="/philosophy/proprietary-surveillance.html"&gt;
+sends out data about users' computing activities&lt;/a&gt;.
+Microsoft Windows sends information about users' activities to
+Microsoft.  Windows Media Player reports what each user watches or
+listens to.  The Amazon Kindle reports which pages of which books the
+user looks at, and when.  Angry Birds reports the user's geolocation
+history.&lt;/p&gt;
+
+&lt;p&gt;Unlike proprietary software, SaaSS does not require covert code to
+obtain the user's data.  Instead, users must send their data to the
+server in order to use it.  This has the same effect as spyware: the
+server operator gets the data&mdash;with no special effort, by the
+nature of SaaSS.  Amy Webb, who intended never to post any photos of
+her daughter, made the mistake of using SaaSS (Instagram) to edit
+photos of her.  Eventually
+&lt;a 
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html"&gt;
 they
+leaked from there&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;Theoretically, homomorphic encryption might some day advance to the
+point where future SaaSS services might be constructed to be unable to
+understand some of the data that users send them.  Such
+services &lt;em&gt;could&lt;/em&gt; be set up not to snoop on users; this does 
not
+mean they &lt;em&gt;will&lt;/em&gt; do no snooping.&lt;/p&gt;
+
+&lt;p&gt;Some proprietary operating systems have a universal back door,
+permitting someone to remotely install software changes.  For
+instance, Windows has a universal back door with which Microsoft can
+forcibly change any software on the machine.  Nearly all portable
+phones have them, too.  Some proprietary applications also have
+universal back doors; for instance, the Steam client for GNU/Linux
+allows the developer to remotely install modified versions.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the server operator can change the software in use on
+the server.  He ought to be able to do this, since it's his computer;
+but the result is the same as using a proprietary application program
+with a universal back door: someone has the power to silently impose
+changes in how the user's computing gets done.&lt;/p&gt;
+
+&lt;p&gt;Thus, SaaSS is equivalent to running proprietary software with
+spyware and a universal back door.  It gives the server operator
+unjust power over the user, and that power is something we must
+resist.&lt;/p&gt;
+
+&lt;h3&gt;SaaSS and SaaS&lt;/h3&gt;
+
+&lt;p&gt;Originally we referred to this problematical practice as
+&ldquo;SaaS&rdquo;, which stands for &ldquo;Software as a
+Service&rdquo;.  It's a commonly used term for setting up software on a
+server rather than offering copies of it to users, and we thought it
+described precisely the cases where this problem occurs.&lt;/p&gt;
+
+&lt;p&gt;Subsequently we became aware that the term SaaS is sometimes used for
+communication services&mdash;activities for which this issue is not
+applicable.  In addition, the term &ldquo;Software as a Service&rdquo;
+doesn't explain &lt;em&gt;why&lt;/em&gt; the practice is bad.  So we coined 
the term
+&ldquo;Service as a Software Substitute&rdquo;, which defines the bad
+practice more clearly and says what is bad about it.&lt;/p&gt;
+
+&lt;h3&gt;Untangling the SaaSS Issue from the Proprietary Software 
Issue&lt;/h3&gt;
+
+&lt;p&gt;SaaSS and proprietary software lead to similar harmful results, but
+the mechanisms are different.  With proprietary software, the
+mechanism is that you have and use a copy which is difficult and/or
+illegal to change.  With SaaSS, the mechanism is that you don't have
+the copy that's doing your computing.&lt;/p&gt;
+
+&lt;p&gt;These two issues are often confused, and not only by accident.  Web
+developers use the vague term &ldquo;web application&rdquo; to lump
+the server software together with programs run on your machine in your
+browser.  Some web pages install nontrivial, even large JavaScript
+programs into your browser without informing
+you.  &lt;a href="/philosophy/javascript-trap.html"&gt;When these JavaScript
+programs are nonfree&lt;/a&gt;, they cause the same sort of injustice as any
+other nonfree software.  Here, however, we are concerned with the
+issue of using the service itself.&lt;/p&gt;
+
+&lt;p&gt;Many free software supporters assume that the problem of SaaSS will
+be solved by developing free software for servers.  For the server
+operator's sake, the programs on the server had better be free; if
+they are proprietary, their developers/owners have power over the
+server.  That's unfair to the server operator, and doesn't help the
+server's users at all.  But if the programs on the server are free,
+that doesn't protect &lt;em&gt;the server's users&lt;/em&gt; from the effects 
of
+SaaSS.  These programs liberate the server operator, but not the
+server's users.&lt;/p&gt;
+
+&lt;p&gt;Releasing the server software source code does benefit the
+community: it enables suitably skilled users to set up similar
+servers, perhaps changing the
+software.  &lt;a href="/licenses/license-recommendations.html"&gt; We
+recommend using the GNU Affero GPL&lt;/a&gt; as the license for programs
+often used on servers.&lt;/p&gt;
+
+&lt;p&gt;But none of these servers would give you control over computing you
+do on it, unless it's &lt;em&gt;your&lt;/em&gt; server (one whose software load
+you control, regardless of whether the machine is your property).  It
+may be OK to trust your friend's server for some jobs, just as you
+might let your friend maintain the software on your own computer.
+Outside of that, all these servers would be SaaSS for you.  SaaSS
+always subjects you to the power of the server operator, and the only
+remedy is, &lt;em&gt;Don't use SaaSS!&lt;/em&gt;  Don't use someone else's 
server
+to do your own computing on data provided by you.&lt;/p&gt;
+
+&lt;p&gt;This issue demonstrates the depth of the difference between
+&ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
+source &lt;a href="/philosophy/free-open-overlap.html"&gt;is, nearly always,
+free&lt;/a&gt;.  However, the idea of
+an &lt;a <span 
class="removed"><del><strong>href="http://opendefinition.org/software-service"&gt;&ldquo;open</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://opendefinition.org/ossd/"&gt;&ldquo;open</em></ins></span>
+software&rdquo; service&lt;/a&gt;, meaning one whose server software is open
+source and/or free, fails to address the issue of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Services are fundamentally different from programs, and the ethical
+issues that services raise are fundamentally different from the issues
+that programs raise.  To avoid confusion,
+we &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+avoid describing a service as &ldquo;free&rdquo; or
+&ldquo;proprietary.&rdquo;&lt;/a&gt;&lt;/p&gt;
+
+&lt;h3&gt;Distinguishing SaaSS from Other Network Services&lt;/h3&gt;
+
+&lt;p&gt;Which online services are SaaSS?  The clearest example is a
+translation service, which translates (say) English text into Spanish
+text.  Translating a text for you is computing that is purely yours.
+You could do it by running a program on your own computer, if only you
+had the right program.  (To be ethical, that program should be free.)
+The translation service substitutes for that program, so it is Service
+as a Software Substitute, or SaaSS.  Since it denies you control
+over your computing, it does you wrong.&lt;/p&gt;
+
+&lt;p&gt;Another clear example is using a service such as Flickr or
+Instagram to modify a photo.  Modifying photos is an activity that
+people have done in their own computers for decades; doing it in a
+server you don't control, rather than your own computer, is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Rejecting SaaSS does not mean refusing to use any network servers
+run by anyone other than you.  Most servers are not SaaSS because the
+jobs they do are some sort of communication, rather than the user's
+own computing.&lt;/p&gt;
+
+&lt;p&gt;The original idea of web servers wasn't to do computing for you, it
+was to publish information for you to access.  Even today this is what
+most web sites do, and it doesn't pose the SaaSS problem, because
+accessing someone's published information isn't doing your own
+computing.  Neither is use of a blog site to publish your own works,
+or using a microblogging service such as Twitter or StatusNet.  (These
+services may or may not have other problems, depending on details.)
+The same goes for other communication not meant to be private, such as
+chat groups.&lt;/p&gt;
+
+&lt;p&gt;In its essence, social networking is a form of communication and
+publication, not SaaSS.  However, a service whose main facility is
+social networking can have features or extensions which are SaaSS.&lt;/p&gt;
+
+&lt;p&gt;If a service is not SaaSS, that does not mean it is OK.  There are
+other ethical issues about services.  For instance, Facebook
+distributes video in Flash, which pressures users to run nonfree
+software; it requires running nonfree JavaScript code; and it gives
+users a misleading impression of privacy while luring them into baring
+their lives to Facebook.  Those are important issues, different from
+the SaaSS issue.
+&lt;/p&gt;
+
+&lt;p&gt;Services such as search engines collect data from around the web
+and let you examine it.  Looking through their collection of data
+isn't your own computing in the usual sense&mdash;you didn't provide
+that collection&mdash;so using such a service to search the web is not
+SaaSS.  However, using someone else's server to implement a search
+facility for your own site &lt;em&gt;is&lt;/em&gt; SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Purchasing online is not SaaSS, because the computing
+isn't &lt;em&gt;your own&lt;/em&gt; activity; rather, it is done jointly by and
+for you and the store.  The real issue in online shopping is whether
+you trust the other party with your money and other personal
+information (starting with your name).&lt;/p&gt;
+
+&lt;p&gt;Repository sites such as Savannah and SourceForge are not
+inherently SaaSS, because a repository's job is publication of data
+supplied to it.&lt;/p&gt;
+
+&lt;p&gt;Using a joint project's servers isn't SaaSS because the computing
+you do in this way isn't your own.  For instance, if you edit pages on
+Wikipedia, you are not doing your own computing; rather, you are
+collaborating in Wikipedia's computing.  Wikipedia controls its own
+servers, but organizations as well as individuals encounter the
+problem of SaaSS if they do their computing in someone else's
+server.&lt;/p&gt;
+
+&lt;p&gt;Some sites offer multiple services, and if one is not SaaSS,
+another may be SaaSS.  For instance, the main service of Facebook is
+social networking, and that is not SaaSS; however, it supports
+third-party applications, some of which are SaaSS.  Flickr's main
+service is distributing photos, which is not SaaSS, but it also has
+features for editing photos, which is SaaSS.  Likewise, using
+Instagram to post a photo is not SaaSS, but using it to transform the
+photo is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Google Docs shows how complex the evaluation of a single service
+can become.  It invites people to edit a document by running a
+large &lt;a href="/philosophy/javascript-trap.html"&gt;nonfree JavaScript
+program&lt;/a&gt;, clearly wrong.  However, it offers an API for uploading
+and downloading documents in standard formats.  A free software editor
+can do so through this API.  This usage scenario is not SaaSS, because
+it uses Google Docs as a mere repository.  Showing all your data to a
+company is bad, but that is a matter of privacy, not SaaSS; depending
+on a service for access to your data is bad, but that is a matter of
+risk, not SaaSS.  On the other hand, using the service for converting
+document formats &lt;em&gt;is&lt;/em&gt; SaaSS, because it's something you 
could
+have done by running a suitable program (free, one hopes) in your own
+computer.&lt;/p&gt;
+
+&lt;p&gt;Using Google Docs through a free editor is rare, of course.  Most
+often, people use it through the nonfree JavaScript program, which is
+bad like any nonfree program.  This scenario might involve SaaSS, too;
+that depends on what part of the editing is done in the JavaScript
+program and what part in the server.  We don't know, but since SaaSS
+and proprietary software do similar wrong to the user, it is not
+crucial to know.&lt;/p&gt;
+
+&lt;p&gt;Publishing via someone else's repository does not raise privacy
+issues, but publishing through Google Docs has a special problem: it
+is impossible even to &lt;em&gt;view the text&lt;/em&gt; of a Google Docs 
document
+in a browser without running the nonfree JavaScript code.  Thus, you
+should not use Google Docs to publish anything&mdash;but the reason
+is not a matter of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;The IT industry discourages users from making these distinctions.
+That's what the buzzword &ldquo;cloud computing&rdquo; is for.  This
+term is so nebulous that it could refer to almost any use of the
+Internet.  It includes SaaSS as well as many other network usage
+practices.  In any given context, an author who writes
+&ldquo;cloud&rdquo; (if a technical person) probably has a specific
+meaning in mind, but usually does not explain that in other articles
+the term has other specific meanings.  The term leads people to
+generalize about practices they ought to consider individually.&lt;/p&gt;
+
+&lt;p&gt;If &ldquo;cloud computing&rdquo; has a meaning, it is not a way of
+doing computing, but rather a way of thinking about computing: a
+devil-may-care approach which says, &ldquo;Don't ask questions.  Don't
+worry about who controls your computing or who holds your data.  Don't
+check for a hook hidden inside our service before you swallow it.
+Trust companies without hesitation.&rdquo; In other words, &ldquo;Be a
+sucker.&rdquo; A cloud in the mind is an obstacle to clear thinking.
+For the sake of clear thinking about computing, let's avoid the term
+&ldquo;cloud.&rdquo;&lt;/p&gt;
+
+&lt;h3 id="renting"&gt;Renting a Server Distinguished from SaaSS&lt;/h3&gt;
+
+&lt;p&gt;If you rent a server (real or virtual), whose software load you
+have control over, that's not SaaSS.  In SaaSS, someone else decides
+what software runs on the server and therefore controls the computing
+it does for you.  In the case where you install the software on the
+server, you control what computing it does for you.  Thus, the rented
+server is virtually your computer.  For this issue, it counts as
+yours.&lt;/p&gt;
+
+&lt;p&gt;The &lt;em&gt;data&lt;/em&gt; on the rented remote server is less 
secure than
+if you had the server at home, but that is a separate issue from
+SaaSS.&lt;/p&gt;
+
+&lt;p&gt;This kind of server rental is sometimes called &ldquo;IaaS,&rdquo;
+but that term fits into a conceptual structure that downplays the issues
+that we consider important.&lt;/p&gt;
+
+&lt;h3&gt;Dealing with the SaaSS Problem&lt;/h3&gt;
+
+&lt;p&gt;Only a small fraction of all web sites do SaaSS; most don't raise
+the issue.  But what should we do about the ones that raise it?&lt;/p&gt;
+
+&lt;p&gt;For the simple case, where you are doing your own computing on data
+in your own hands, the solution is simple: use your own copy of a free
+software application.  Do your text editing with your copy of a free
+text editor such as GNU Emacs or a free word processor.  Do your photo
+editing with your copy of free software such as GIMP.  What if there
+is no free program available?  A proprietary program or SaaSS would
+take away your freedom, so you shouldn't use those.  You can contribute
+your time or your money to development of a free replacement.&lt;/p&gt;
+
+&lt;p&gt;What about collaborating with other individuals as a group?  It may
+be hard to do this at present without using a server, and your group
+may not know how to run its own server.  If you use someone else's
+server, at least don't trust a server run by a company.  A mere
+contract as a customer is no protection unless you could detect a
+breach and could really sue, and the company probably writes its
+contracts to permit a broad range of abuses.  The state can subpoena
+your data from the company along with everyone else's, as Obama has
+done to phone companies, supposing the company doesn't volunteer them
+like the US phone companies that illegally wiretapped their customers
+for Bush.  If you must use a server, use a server whose operators give
+you a basis for trust beyond a mere commercial relationship.&lt;/p&gt;
+
+&lt;p&gt;However, on a longer time scale, we can create alternatives to
+using servers.  For instance, we can create a peer-to-peer program
+through which collaborators can share data encrypted.  The free
+software community should develop distributed peer-to-peer
+replacements for important &ldquo;web applications&rdquo;.  It may be
+wise to release them under
+the &lt;a href="/licenses/why-affero-gpl.html"&gt; GNU Affero GPL&lt;/a&gt;, 
since
+they are likely candidates for being converted into server-based
+programs by someone else.  The &lt;a href="/"&gt;GNU project&lt;/a&gt; is 
looking
+for volunteers to work on such replacements.  We also invite other
+free software projects to consider this issue in their design.&lt;/p&gt;
+
+&lt;p&gt;In the meantime, if a company invites you to use its server to do
+your own computing tasks, don't yield; don't use SaaSS.  Don't buy or
+install &ldquo;thin clients&rdquo;, which are simply computers so weak
+they make you do the real work on a server, unless you're going to use
+them with &lt;em&gt;your&lt;/em&gt; server.  Use a real computer and keep your
+data there.  Do your own computing with your own copy of a free
+program, for your freedom's sake.&lt;/p&gt;
+
+&lt;h3&gt;See also:&lt;/h3&gt;
+&lt;p&gt;&lt;a href="/philosophy/bug-nobody-allowed-to-understand.html"&gt;The
+Bug Nobody is Allowed to Understand&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2010, 2013, 2015, 2016, 2018 Richard 
Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/08/04 15:59:30 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]