www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-insecurity.de.po...


From: GNUN
Subject: www/proprietary/po proprietary-insecurity.de.po...
Date: Fri, 5 Oct 2018 08:59:28 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/05 08:59:27

Modified files:
        proprietary/po : proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.408&r2=1.409

Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-insecurity.de.po        1 Oct 2018 09:59:22 -0000       1.118
+++ proprietary-insecurity.de.po        5 Oct 2018 12:59:26 -0000       1.119
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -34,7 +34,7 @@
 msgstr ""
 "<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +51,7 @@
 "Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen "
 "sollte."
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Diese Seite zeigt eindeutig nachgewiesene Fälle von Unsicherheit in "
-"proprietärer Software, die schwerwiegende Folgen hat oder anderweitig "
-"erwähnenswert ist."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -75,7 +66,7 @@
 "proprietäre Software nicht nur nicht perfekt, sondern häufig auch sehr "
 "schlampig <ins>programmiert</ins> ist."
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 # | It would be equally incorrect to compare proprietary software with a
 # | fictitious idea of free software as perfect.  Every nontrivial program has
 # | bugs, and any system, free or proprietary, may have security [-errors.-]
@@ -115,6 +106,24 @@
 
 #. type: Content of: <p>
 msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"Diese Seite zeigt eindeutig nachgewiesene Fälle von Unsicherheit in "
+"proprietärer Software, die schwerwiegende Folgen hat oder anderweitig "
+"erwähnenswert ist."
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -128,23 +137,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary-insecurity.fr.po        1 Oct 2018 11:16:18 -0000       1.144
+++ proprietary-insecurity.fr.po        5 Oct 2018 12:59:26 -0000       1.145
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-10-01 13:15+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -36,7 +37,7 @@
 "<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
 "dans le logiciel privateur</a>"
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +52,7 @@
 "base</a>. Les développeurs exercent souvent ce pouvoir au détriment des "
 "utilisateurs qu'ils devraient servir."
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Cette page répertorie des failles de sécurité de logiciels privateurs, "
-"failles clairement établies qui ont des conséquences graves ou méritent "
-"d'être mentionnées pour d'autres raisons. "
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -74,7 +66,7 @@
 "exemples ci-dessous montrent que le logiciel privateur n'est pas parfait et "
 "qu'il est souvent tout à fait bâclé."
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It would be equally incorrect to compare proprietary software with a "
 "fictitious idea of free software as perfect.  Every nontrivial program has "
@@ -97,6 +89,24 @@
 
 #. type: Content of: <p>
 msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"Cette page répertorie des failles de sécurité de logiciels privateurs, "
+"failles clairement établies qui ont des conséquences graves ou méritent "
+"d'être mentionnées pour d'autres raisons. "
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -110,33 +120,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www.";
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "
@@ -1158,3 +1141,28 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www.";
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non 
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-insecurity.it-diff.html 1 Oct 2018 09:59:22 -0000       1.15
+++ proprietary-insecurity.it-diff.html 5 Oct 2018 12:59:26 -0000       1.16
@@ -25,6 +25,7 @@
 
 &lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
 
+<span class="inserted"><ins><em>&lt;div class="comment"&gt;</em></ins></span>
 &lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
@@ -32,9 +33,9 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-&lt;p&gt;This page lists clearly established cases of insecurity in
+<span class="removed"><del><strong>&lt;p&gt;This page lists clearly 
established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
-noteworthy.&lt;/p&gt;
+noteworthy.&lt;/p&gt;</strong></del></span>
 
 &lt;p&gt;It is incorrect to compare free software with a fictitious idea of
 proprietary software as perfect, but the press often implicitly does
@@ -52,33 +53,29 @@
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li id="break-security-smarttv"&gt;
-  &lt;p&gt;&lt;a
-       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way</strong></del></span>
+&lt;li id="break-security-smarttv"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;p&gt;This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.&lt;/p&gt;</em></ins></span>
+
+&lt;p&gt;&lt;a
+       <span 
class="removed"><del><strong>href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethered
 appliances
+and applications&lt;/a&gt; are intrinsically insecure because there is 
always</em></ins></span>
+a <span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>chance that the server will go offline accidentally, 
making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition</em></ins></span> to <span 
class="removed"><del><strong>break security on</strong></del></span> <span 
class="inserted"><ins><em>the fact that they are tethered.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that 
ought</em></ins></span> to <span class="removed"><del><strong>break security 
on</strong></del></span> <span class="inserted"><ins><em>be in this page but 
isn't
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
-to present the specifics.&lt;/p&gt;
+to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TV&lt;/a&gt; and use its 
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
+to <span class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> the <span 
class="inserted"><ins><em>specifics.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TV&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance,</em></ins></span> and <span class="removed"><del><strong>use 
its camera
-      to watch</strong></del></span> <span class="inserted"><ins><em>danger of 
sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on</em></ins></span> the <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
-  &lt;/li&gt;
-
+&lt;!-- INSERT insecurity --&gt;
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
@@ -130,17 +127,16 @@
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos</em></ins></span> to <span class="removed"><del><strong>capture 
keystrokes without
-    taking</strong></del></span> <span class="inserted"><ins><em>people 
in</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>owner's contact list&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201712240"&gt;
-    &lt;p&gt;One</em></ins></span> of <span class="removed"><del><strong>being 
classified as malicious task by AV
+    taking</strong></del></span> <span class="inserted"><ins><em>people 
in</em></ins></span> the <span class="removed"><del><strong>risk of being 
classified as malicious task by AV
     heuristics&rdquo;.
-  &lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>owner's 
contact list&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices</strong></del></span> <span class="inserted"><ins><em>the 
dangers of the &ldquo;internet of stings&rdquo;</em></ins></span>
+medical devices</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712240"&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
     is <span class="inserted"><ins><em>that, if you lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
@@ -237,16 +233,12 @@
        can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full</em></ins></span> of <span class="removed"><del><strong>a bug in
        Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gross
-    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
+  &lt;li id="M201705160"&gt;
     &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the 
user's keystroke
+    pre-installed on 28 models of HP laptops logged the user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
@@ -266,14 +258,16 @@
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
     can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
-    Broadcom's non-free firmware.&lt;/p&gt;
+    Broadcom's non-free firmware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703270"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to</em></ins></span> the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -517,10 +511,7 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Malware found
-on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
 cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -548,10 +539,13 @@
 
 &lt;li&gt;
 &lt;p&gt;
-FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-have a Bluetooth vulnerability&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-    Bluetooth vulnerability&lt;/a&gt;</em></ins></span> that allows attackers 
to send malware
+FitBit fitness trackers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+<span class="removed"><del><strong>have a</strong></del></span>
+    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with <span class="removed"><del><strong>them.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
@@ -747,18 +741,18 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of &lt;a
     href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;
+    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201402210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201402210"&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
     of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
@@ -924,7 +918,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/05 12:59:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary-insecurity.it.po        1 Oct 2018 09:59:22 -0000       1.134
+++ proprietary-insecurity.it.po        5 Oct 2018 12:59:26 -0000       1.135
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -35,7 +35,7 @@
 "<a href=\"/proprietary/proprietary.html\">Altri esempi di malware "
 "proprietario</a>"
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +51,7 @@
 "sviluppatori esercitano questo potere a danno degli utenti che invece "
 "dovrebbero servire."
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in "
-"software proprietario che ha gravi conseguenze o che è altrimenti degna di "
-"nota."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -74,7 +65,7 @@
 "mostrano che il software proprietario non è perfetto ed è anzi abbastanza "
 "trasandato."
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 # | It would be equally incorrect to compare proprietary software with a
 # | fictitious idea of free software as perfect.  Every nontrivial program has
 # | bugs, and any system, free or proprietary, may have security [-errors.-]
@@ -113,27 +104,28 @@
 
 #. type: Content of: <p>
 msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
-"org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
 msgstr ""
+"Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in "
+"software proprietario che ha gravi conseguenze o che è altrimenti degna di "
+"nota."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+"org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
+"or two to present the specifics."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-insecurity.ja-diff.html 1 Oct 2018 09:59:22 -0000       1.34
+++ proprietary-insecurity.ja-diff.html 5 Oct 2018 12:59:27 -0000       1.35
@@ -25,6 +25,7 @@
 
 &lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
 
+<span class="inserted"><ins><em>&lt;div class="comment"&gt;</em></ins></span>
 &lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
@@ -32,17 +33,16 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-&lt;p&gt;This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;This page lists clearly 
established cases</strong></del></span>
 
-&lt;p&gt;It <span class="inserted"><ins><em>is incorrect to compare free 
software with a fictitious idea of
-proprietary software as perfect, but the press often implicitly does
-that whenever a security hole in a free program is discovered.  The
+<span class="inserted"><ins><em>&lt;p&gt;It is incorrect to compare free 
software with a fictitious idea</em></ins></span> of <span 
class="removed"><del><strong>insecurity in</strong></del></span>
+proprietary software <span class="inserted"><ins><em>as perfect, but the press 
often implicitly does</em></ins></span>
+that <span class="removed"><del><strong>has grave consequences 
or</strong></del></span> <span class="inserted"><ins><em>whenever a security 
hole in a free program</em></ins></span> is <span 
class="removed"><del><strong>otherwise
+noteworthy.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>discovered.  The
 examples below show that proprietary software isn't perfect, and
-is often quite sloppy.&lt;/p&gt;
+is often quite sloppy.&lt;/p&gt;</em></ins></span>
 
-&lt;p&gt;It</em></ins></span> would be <span 
class="inserted"><ins><em>equally</em></ins></span> incorrect to compare 
proprietary software with
+&lt;p&gt;It would be <span class="inserted"><ins><em>equally</em></ins></span> 
incorrect to compare proprietary software with
 a fictitious idea of free software as perfect.  Every nontrivial
 program has bugs, and any system, free or proprietary, may have
 security
@@ -54,8 +54,19 @@
 
 &lt;ul&gt;
 &lt;li&gt;
-&lt;p&gt;4G LTE phone networks are drastically insecure. They 
can</strong></del></span> <span class="inserted"><ins><em>any security problems 
that arise&lt;/em&gt;.  Keeping the
+&lt;p&gt;4G LTE phone networks</strong></del></span> <span 
class="inserted"><ins><em>any security problems that arise&lt;/em&gt;.  Keeping 
the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.&lt;/p&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;Tethered 
appliances
+and applications&lt;/a&gt;</em></ins></span> are <span 
class="removed"><del><strong>drastically insecure. They 
can</strong></del></span> <span class="inserted"><ins><em>intrinsically 
insecure because there is always
+a chance that the server will go offline accidentally, making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition to the fact that they are tethered.&lt;/p&gt;
 
 &lt;p&gt;If you know of an example that ought to</em></ins></span> be
 <span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
@@ -77,65 +88,38 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
-Internet Explorer and Edge&lt;/a&gt; allows an attacker</strong></del></span> 
<span class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> the <span 
class="removed"><del><strong>user is tricked into visiting a
-malicious link.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are not entirely deleted&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>specifics.&lt;/p&gt;
+&lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
+to present the specifics.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server.</em></ins></span> They <span 
class="removed"><del><strong>can be recovered
-in various ways.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker 
to</strong></del></span> <span class="inserted"><ins><em>have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code from any application which uses this API to render a
-  certain kind</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger</em></ins></span> of <span 
class="removed"><del><strong>image file&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;A bug in</strong></del></span> <span 
class="inserted"><ins><em>sabotage&lt;/a&gt; (of</em></ins></span> a <span 
class="removed"><del><strong>proprietary ASN.1 library, used in cell phone 
towers</strong></del></span> <span class="inserted"><ins><em>specific user, or 
of
-    all users at once),</em></ins></span> as well as <span 
class="removed"><del><strong>cell phones and
-routers, &lt;a 
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
-taking control</strong></del></span> <span class="inserted"><ins><em>the 
risk</em></ins></span> of <span class="removed"><del><strong>those 
systems&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Antivirus programs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers</em></ins></span> have <span 
class="inserted"><ins><em>discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;,</em></ins></span> so <span 
class="removed"><del><strong>many errors</strong></del></span> that <span 
class="removed"><del><strong>&lt;a 
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-  may make security worse&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+&lt;!-- INSERT insecurity --&gt;
+  &lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer</strong></del></span> 
<span class="inserted"><ins><em>other audio&lt;/a&gt;, so that people cannot 
hear
+    them, but Alexa</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an 
attacker</strong></del></span> <span class="inserted"><ins><em>Siri 
can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>user is tricked</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+    turn it</em></ins></span> into <span 
class="removed"><del><strong>visiting</strong></del></span> a
+<span class="removed"><del><strong>malicious link.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
+WhatsApp messages are not entirely deleted&lt;/a&gt;. They 
can</strong></del></span> <span class="inserted"><ins><em>listening 
device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span 
class="removed"><del><strong>recovered</strong></del></span> <span 
class="inserted"><ins><em>much
     easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
+    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>various ways.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
@@ -366,33 +350,39 @@
     in various ways.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201607220"&gt;
+  &lt;li id="M201607220"&gt;</em></ins></span>
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
-    certain kind of image file&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>malacious</strong></del></span>
+    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
+    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Over 70 brands</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
     &lt;p&gt;A bug in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
-    taking control</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance
-cameras</strong></del></span> <span class="inserted"><ins><em>those 
systems&lt;/a&gt;.&lt;/p&gt;
+    taking control of those systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201606290"&gt;
-    &lt;p&gt;Antivirus programs have so many errors that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-    may make</em></ins></span> security <span 
class="removed"><del><strong>bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>worse&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606290"&gt;</em></ins></span>
+    &lt;p&gt;Antivirus programs have so many errors that &lt;a
+    
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
+    may make security worse&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance
+cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
+security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
 &lt;p&gt;
 Samsung's</strong></del></span>
 
@@ -882,7 +872,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/05 12:59:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-insecurity.ja.po        1 Oct 2018 09:59:22 -0000       1.105
+++ proprietary-insecurity.ja.po        5 Oct 2018 12:59:27 -0000       1.106
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -34,7 +34,7 @@
 "<a 
href=\"/proprietary/proprietary.html\">ほかのプロプライエタリ・マルウェア"
 "の例</a>"
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -49,15 +49,7 @@
 "本的な不正義</a>です。開発者
は、しばしばその力を行使し、サービスすべきユーザ"
 "に対して損害を与えます。"
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"このページでは明確に確認できたプロプライエタリなソフトウェアの危険性のケース"
-"を掲載します。ひどい結果となるものか、そうでなければ記録に値するものです。"
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -66,7 +58,7 @@
 "sloppy."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
 #| "It would be incorrect to compare proprietary software with a fictitious "
@@ -94,27 +86,27 @@
 
 #. type: Content of: <p>
 msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
-"org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
 msgstr ""
+"このページでは明確に確認できたプロプライエタリなソフトウェアの危険性のケース"
+"を掲載します。ひどい結果となるものか、そうでなければ記録に値するものです。"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+"org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
+"or two to present the specifics."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-insecurity.pot  1 Oct 2018 09:59:22 -0000       1.75
+++ proprietary-insecurity.pot  5 Oct 2018 12:59:27 -0000       1.76
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -30,7 +30,7 @@
 "malware</a>"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -40,13 +40,7 @@
 "detriment of the users they ought to serve."
 msgstr ""
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -55,7 +49,7 @@
 "sloppy."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It would be equally incorrect to compare proprietary software with a "
 "fictitious idea of free software as perfect.  Every nontrivial program has "
@@ -68,29 +62,26 @@
 
 #. type: Content of: <p>
 msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a "
-"href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "
-"us. Please include the URL of a trustworthy reference or two to present the "
-"specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
 msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "
+"us. Please include the URL of a trustworthy reference or two to present the "
+"specifics."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary-insecurity.ru.po        1 Oct 2018 15:58:20 -0000       1.193
+++ proprietary-insecurity.ru.po        5 Oct 2018 12:59:27 -0000       1.194
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-10-01 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -34,7 +35,7 @@
 "<a href=\"/proprietary/proprietary.html\">Другие примеры 
вредоносных "
 "несвободных программ</a>"
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
@@ -49,16 +50,7 @@
 "Разработчики часто пользуются этой 
властью в ущерб пользователям, которых "
 "они должны обслуживать."
 
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"На этой странице перечислены достоверно 
установленные случаи уязвимости "
-"несвободных программ, которая имеет 
тяжкие последствия или которую следует "
-"отметить по другим причинам."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It is incorrect to compare free software with a fictitious idea of "
 "proprietary software as perfect, but the press often implicitly does that "
@@ -72,7 +64,7 @@
 "ниже примеры показывают, что несвободные 
программы не совершенны и часто "
 "написаны весьма небрежно."
 
-#. type: Content of: <p>
+#. type: Content of: <div><p>
 msgid ""
 "It would be equally incorrect to compare proprietary software with a "
 "fictitious idea of free software as perfect.  Every nontrivial program has "
@@ -95,6 +87,24 @@
 
 #. type: Content of: <p>
 msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"На этой странице перечислены достоверно 
установленные случаи уязвимости "
+"несвободных программ, которая имеет 
тяжкие последствия или которую следует "
+"отметить по другим причинам."
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -107,32 +117,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"&ldquo;Интеллектуальные&rdquo; термостаты Honeywell 
связываются только с "
-"сервером компании. У них есть все скверные 
черты таких устройств: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного пользователя и "
-"всех пользователей сразу), а также риск 
перерывов в работе (именно это и "
-"произошло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"Кроме того, установка требуемой 
температуры требует несвободных программ. 
В "
-"старомодных термостатах это делается с 
помощью органов управления прямо на "
-"термостате."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "
@@ -1139,3 +1123,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Обновлено:"
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "&ldquo;Интеллектуальные&rdquo; термостаты 
Honeywell связываются только с "
+#~ "сервером компании. У них есть все 
скверные черты таких устройств: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+#~ "outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного "
+#~ "пользователя и всех пользователей 
сразу), а также риск перерывов в работе "
+#~ "(именно это и произошло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "Кроме того, установка требуемой 
температуры требует несвободных программ. "
+#~ "В старомодных термостатах это делается 
с помощью органов управления прямо "
+#~ "на термостате."

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary-surveillance.de.po      1 Oct 2018 19:58:10 -0000       1.232
+++ proprietary-surveillance.de.po      5 Oct 2018 12:59:27 -0000       1.233
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -29,6 +29,13 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -44,7 +51,7 @@
 "Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen "
 "sollte."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -53,14 +60,14 @@
 "proprietärer Software, die Nutzer ausspioniert oder verfolgt</strong>, zu "
 "verfolgen:"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
-"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -1217,18 +1224,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"iMessage-App auf iDingern <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">teilt "
-"einem Server jede vom Nutzer gewählte Telefonnummer mit</a>; diese Daten "
-"bleiben für mindestens 30 Tage auf dem Server."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -1425,11 +1420,12 @@
 "iOS 7 zu)."
 
 #. type: Content of: <ul><li><p>
-# | Users cannot make an Apple ID {+(+}<a
+# | Users cannot make an Apple ID [-<a
 # | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>
-# | [-(-]necessary to install even gratis [-apps)</a>-] {+apps</a>)+} without
-# | giving a valid email address and receiving the {+verification+} code Apple
-# | sends to it.
+# | (necessary-] {+(<a
+# | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>necessary+}
+# | to install even gratis [-apps)</a>-] {+apps</a>)+} without giving a valid
+# | email address and receiving the {+verification+} code Apple sends to it.
 #, fuzzy
 #| msgid ""
 #| "Users cannot make an Apple ID <a href=\"https://apple.stackexchange.com/";
@@ -1439,7 +1435,7 @@
 msgid ""
 "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
 "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
 "address and receiving the verification code Apple sends to it."
 msgstr ""
 "Ohne Angabe einer gültigen E-Mail-Adresse und des von Apple dorthin "
@@ -1570,10 +1566,22 @@
 "Informationen</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold.  Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# | 
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\";>
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold.  Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves.";
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/";
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/";
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
 msgstr ""
 "In einigen Android-Geräten ist bereits bei Verkauf Software zum Ausspähen "
 "vorhanden. In einigen Motorola-Telefonen wurde Android modifiziert um <a "
@@ -2580,8 +2588,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2750,19 +2758,6 @@
 "2017.\">sendet Daten nach China</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"<a href=\"//www.gamersnexus.net/industry/2672-geforce-experience-data-"
-"transfer-analysis\" title=\"Steve Burke, Analyzing GeForce Experience Data "
-"Transfers with Packet Monitoring, unter: GamersNexus.net 2016.\">Nvidia "
-"GeForce Experience lässt Nutzer identifizieren und sendet dann "
-"personenbezogene Daten an Nvidia-Server</a>."
-
-#. type: Content of: <ul><li><p>
 # | Many <a
 # | 
href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\";>
 # | video game consoles snoop on their users and report to the
@@ -3590,23 +3585,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -4531,6 +4509,29 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "iMessage-App auf iDingern <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">teilt "
+#~ "einem Server jede vom Nutzer gewählte Telefonnummer mit</a>; diese Daten "
+#~ "bleiben für mindestens 30 Tage auf dem Server."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.";
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "<a href=\"//www.gamersnexus.net/industry/2672-geforce-experience-data-"
+#~ "transfer-analysis\" title=\"Steve Burke, Analyzing GeForce Experience "
+#~ "Data Transfers with Packet Monitoring, unter: GamersNexus.net 2016."
+#~ "\">Nvidia GeForce Experience lässt Nutzer identifizieren und sendet dann "
+#~ "personenbezogene Daten an Nvidia-Server</a>."
+
 #~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
 #~ msgstr "<a href=\"#SpywareAtWork\">Spionageprogramme bei der Arbeit</a>"
 

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.fr.po      1 Oct 2018 21:03:40 -0000       1.319
+++ proprietary-surveillance.fr.po      5 Oct 2018 12:59:27 -0000       1.320
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-10-01 23:03+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -28,6 +29,14 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
+"dans le logiciel privateur</a>"
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +50,7 @@
 "base</a>. Les développeurs exercent souvent ce pouvoir au détriment des "
 "utilisateurs qu'ils devraient servir."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -50,15 +59,14 @@
 "logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
 "strong>."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
-"<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
-"dans le logiciel privateur</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -924,18 +932,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"L'appli iMessage des iTrucs <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">informe "
-"le serveur de chaque numéro que l'utilisateur saisit dans son interface</a>; 
"
-"le serveur enregistre ces numéros pendant au moins 30 jours."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -1079,10 +1075,20 @@
 "parle d'iOS 6, mais c'est encore vrai d'iOS 7)."
 
 #. type: Content of: <ul><li><p>
+# | Users cannot make an Apple ID (<a
+# | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>[-
+# | -]necessary to install even gratis apps</a>) without giving a valid email
+# | address and receiving the verification code Apple sends to it.
+#, fuzzy
+#| msgid ""
+#| "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
+#| "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-"
+#| "id\"> necessary to install even gratis apps</a>) without giving a valid "
+#| "email address and receiving the verification code Apple sends to it."
 msgid ""
 "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
 "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
 "address and receiving the verification code Apple sends to it."
 msgstr ""
 "Les utilisateurs d'Apple ne peuvent pas créer leur identifiant (<a href="
@@ -1199,10 +1205,22 @@
 "org/2013/08/fbi-hackers.htm\">informations complémentaires</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold.  Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# | 
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\";>
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold.  Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves.";
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/";
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/";
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
 msgstr ""
 "Des logiciels espions sont présents dans certains appareils sous Android au "
 "moment de l'achat. Dans certains téléphones Motorola, Android a été 
modifié "
@@ -2071,10 +2089,19 @@
 "font les autres."
 
 #. type: Content of: <ul><li><p>
+# | The Simeji keyboard is a smartphone version of Baidu's <a
+# | [-href=\"/proprietary/#baidu-ime\">spying-]
+# | {+href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying+}
+# | <abbr title=\"Input Method Editor\">IME</abbr></a>.
+#, fuzzy
+#| msgid ""
+#| "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
+#| "proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
+#| "abbr></a>."
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 "Le clavier Simeji est une version pour smartphone de l'<a href=\"/"
 "proprietary/#baidu-ime\">éditeur de méthode d'entrée espion</a> de Baidu."
@@ -2211,18 +2238,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"La carte graphique privatrice nVidia GeForce Experience <a href=\"http://www.";
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
-"\">oblige les utilisateurs à s'identifier, puis envoie leurs données "
-"personnelles aux serveurs de nVidia</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-";
 "are-video-games-collecting-about-you.html/\"> video game consoles snoop on "
 "their users and report to the internet</a>&mdash;even what their users weigh."
@@ -2925,33 +2940,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www.";
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -3660,3 +3648,51 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "L'appli iMessage des iTrucs <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/"
+#~ "\">informe le serveur de chaque numéro que l'utilisateur saisit dans son "
+#~ "interface</a>; le serveur enregistre ces numéros pendant au moins "
+#~ "30 jours."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.";
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "La carte graphique privatrice nVidia GeForce Experience <a href=\"http://";
+#~ "www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-"
+#~ "analysis\">oblige les utilisateurs à s'identifier, puis envoie leurs "
+#~ "données personnelles aux serveurs de nVidia</a>."
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www.";
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non 
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-surveillance.it-diff.html       1 Oct 2018 19:58:10 -0000       
1.72
+++ proprietary-surveillance.it-diff.html       5 Oct 2018 12:59:27 -0000       
1.73
@@ -19,13 +19,14 @@
 }
 #surveillance div.toc {
    width: 24.5em; max-width: 94%;
-   margin-bottom: 1em;
+   <span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>margin: 1em 0;</em></ins></span>
 }
 @media (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
-      margin: .2em 0 1em;
+      margin: <span class="removed"><del><strong>.2em</strong></del></span> 
<span class="inserted"><ins><em>1.2em</em></ins></span> 0 1em;
    }
    #surveillance .medium {
       width: 43%;
@@ -39,6 +40,10 @@
 
 &lt;h2&gt;Proprietary Surveillance&lt;/h2&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
+   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="comment"&gt;</em></ins></span>
 &lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
@@ -46,20 +51,27 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-&lt;div  class="announcement"&gt;
+<span class="removed"><del><strong>&lt;div  
class="announcement"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+
 &lt;p&gt;This document attempts to
 track &lt;strong&gt;clearly established cases of proprietary software that
 spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
 
-&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
-   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
+   Other examples</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
-here, please write
-to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+<span class="inserted"><ins><em>&lt;p&gt;The tethered appliances and 
applications are by nature doing
+surveillance. We are not listing them here because they have their own 
+page: &lt;a href="/proprietary/proprietary-tethers.html"&gt;Proprietary
+Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;/div&gt;</strong></del></span> <span class="inserted"><ins><em>an example 
that ought to be in this page but isn't
+here, please write to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.&lt;/p&gt;</em></ins></span>
-&lt;/div&gt;
 
 &lt;div id="surveillance"&gt;
 
@@ -300,32 +312,29 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-  ships with default settings that show no regard for the
-  privacy of its users&lt;/a&gt;, giving Microsoft the 
&ldquo;right&rdquo;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files,</strong></del></span> <span 
class="inserted"><ins><em>time, even
+    Intel devices will be able to listen for speech all the time, even
     when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
+    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507300"&gt;
-    &lt;p&gt;Windows 10 &lt;a
-    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    &lt;p&gt;Windows 10</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</em></ins></span>
     ships with default settings that show no regard for the privacy of
     its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
-    the users' files,</em></ins></span> text input, voice input, location 
info, contacts,
+    the users' files, text input, voice input, location info, contacts,
     calendar records and web browsing history, as well as automatically
     connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
 
@@ -498,7 +507,8 @@
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>the specific
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
     href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
@@ -521,8 +531,9 @@
 
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT phones --&gt;
-  &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
+  &lt;li id="M201601110"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>natural 
extension</em></ins></span> of <span class="inserted"><ins><em>monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
     proprietary software to make sure they can't &ldquo;fool&rdquo;
@@ -532,8 +543,8 @@
   &lt;li id="M201510050"&gt;
     &lt;p&gt;According to Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
-    smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
+    smartphones&lt;/a&gt; by sending hidden text messages which 
enable</em></ins></span>
+    them <span class="removed"><del><strong>are not</strong></del></span> 
<span class="inserted"><ins><em>to turn the phones on and off, listen to the 
microphone,
     retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
     read the contact list. This malware is designed to disguise itself
@@ -543,10 +554,13 @@
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data in smart phones, including iPhones,
+    The NSA can tap data</em></ins></span> in <span 
class="removed"><del><strong>fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>smart 
phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A 
good replacement
+  for</strong></del></span> <span class="inserted"><ins><em>universal back 
door</em></ins></span> that <span class="removed"><del><strong>word is 
&ldquo;exploit&rdquo;;</strong></del></span> <span class="inserted"><ins><em>we 
know</em></ins></span> nearly <span class="removed"><del><strong>always 
that</strong></del></span> <span class="inserted"><ins><em>all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
@@ -554,12 +568,16 @@
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;</em></ins></span>
+    will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send their GPS location on remote command, and users 
cannot stop
     them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    to have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -581,36 +599,29 @@
     &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>you&mdash;&ldquo;We
     know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether the phone is snooping</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>user types into 
it&lt;/a&gt;;</em></ins></span> the <span class="removed"><del><strong>paid 
proprietary apps,</strong></del></span>
-    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201509240"&gt;
     &lt;p&gt;iThings automatically upload to Apple's servers all the photos
-    and videos they make.&lt;/p&gt;
+    and videos</em></ins></span> they <span 
class="inserted"><ins><em>make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
@@ -619,105 +630,99 @@
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
     &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
-    don't ask where.&rdquo;&lt;/p&gt;
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please</em></ins></span>
+    don't <span class="removed"><del><strong>snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one</strong></del></span> <span 
class="inserted"><ins><em>ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps</strong></del></span> 
<span class="inserted"><ins><em>still counts</em></ins></span> as <span 
class="removed"><del><strong>&ldquo;free&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>a
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA</em></ins></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>access 
any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data</em></ins></span> from <span 
class="removed"><del><strong>beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407230"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
-    for <span class="removed"><del><strong>that word</strong></del></span> 
<span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+    &lt;p&gt;The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>all the 
data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
+    is <span class="removed"><del><strong>not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one</strong></del></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
-    turned off.&lt;/p&gt;</em></ins></span>
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>can be
+    turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to</em></ins></span> track 
<span class="removed"><del><strong>users by</strong></del></span> <span 
class="inserted"><ins><em>users, which is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or 
played</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled</em></ins></span> by <span class="removed"><del><strong>TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article talks about iOS 6, 
but it is
-    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
-    necessary</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>honestly identify</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that</strong></del></span> install <span 
class="inserted"><ins><em>even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
-    to <span class="removed"><del><strong>legitimize actions like this.  At 
this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent</strong></del></span> <span class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -730,21 +735,18 @@
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT android --&gt;
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for</em></ins></span> Google <span 
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Android tracks location for</em></ins></span> Google
+<span class="removed"><del><strong>and other companies from getting this 
personal information in</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -767,50 +769,51 @@
     &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
   behavioral</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>transmission</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
-    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
+    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>user, clearly must 
constitute spying
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
-    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
+
+  &lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong as</strong></del></span> any <span 
class="removed"><del><strong>other snooping.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>file on the system.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in 
Android phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when
-    they are sold.  Some Motorola phones modify Android to &lt;a
+    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
+    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
+    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+      <span class="removed"><del><strong>send</strong></del></span>
+    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
@@ -850,63 +853,32 @@
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT e-readers --&gt;
-  &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>server records these numbers for at 
least 30
-        days.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;</em></ins></span>
+&lt;!-- <span 
class="removed"><del><strong>#SpywareOnMobiles</strong></del></span> <span 
class="inserted"><ins><em>INSERT e-readers</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>check DRM!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
+  &lt;li id="M201212031"&gt;
     &lt;p&gt;The Electronic Frontier Foundation has examined and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds</em></ins></span> of <span class="inserted"><ins><em>surveillance 
in</em></ins></span> the <span class="removed"><del><strong>most popular 
iOS</strong></del></span> <span class="inserted"><ins><em>Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;
+    kinds of surveillance in the Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
@@ -914,241 +886,263 @@
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
     report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareOnMobiles"&gt;Spyware 
on Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
 &lt;!-- INSERT apps --&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and</strong></del></span>
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
-    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> <span class="inserted"><ins><em>other 
kinds</em></ins></span> of <span class="removed"><del><strong>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>photos and
+    &lt;p&gt;The Spanish football streaming</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>user's 
movements and listens through</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>install even gratis 
apps)&lt;/a&gt;
+      without giving</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a <span class="removed"><del><strong>valid email address and receiving the 
code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>photos and
       videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
+      iCloud Photo Library stores every photo and video</strong></del></span> 
<span class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
+    &lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>learn</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits</strong></del></span> <span class="inserted"><ins><em>care 
much less about sports,</em></ins></span> you <span 
class="removed"><del><strong>make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>act</em></ins></span> as <span 
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud feature is
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
       &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
       startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>spies 
for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no</em></ins></span> way to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
-    a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>will 
benefit in
+    many ways. This</em></ins></span> is <span class="removed"><del><strong>a 
way to</strong></del></span> <span class="inserted"><ins><em>one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android 
apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+    of <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need</em></ins></span> to get <span class="removed"><del><strong>at them, 
but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>rid</em></ins></span> of <span 
class="removed"><del><strong>them through</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>iThings:
-      the &lt;a class="not-a-duplicate"
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from</em></ins></span> the <span 
class="inserted"><ins><em>free software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
-    source code they cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
-    in other ways.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
 
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>also 
a feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to <span class="removed"><del><strong>track users, 
which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span> <span class="inserted"><ins><em>get rid of 
the proprietary software&mdash;both proprietary
-    Android</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
-      is still true in iOS 7.)&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not have so much information</em></ins></span> 
about <span class="removed"><del><strong>iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>its users.
+    It could be designed so that users communicate such info to each
+    other</em></ins></span> but <span class="removed"><del><strong>it
+      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not to the server's 
database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that 
can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> the 
<span class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Don't</em></ins></span> be
+      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>user if</em></ins></span> an <span 
class="removed"><del><strong>iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the 
information</em></ins></span> to <span class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to 
each</em></ins></span>
-    other <span class="inserted"><ins><em>but not to the server's 
database.&lt;/p&gt;
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more</em></ins></span> than <span 
class="removed"><del><strong>surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>users expected. It 
&lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
-    is <span class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google 
specifically</em></ins></span>
+    for <span class="removed"><del><strong>no
+      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the</em></ins></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>hand, Google 
redistributes nonfree Android apps, and
+    therefore shares in the responsibility for</em></ins></span> the <span 
class="inserted"><ins><em>injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt;</em></ins></span> 
in <span class="removed"><del><strong>Telephones&lt;/h4&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>user's address
-    book</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses the words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and</em></ins></span> text messages <span 
class="removed"><del><strong>which enable them</strong></del></span> <span 
class="inserted"><ins><em>and emails</em></ins></span> to <span 
class="removed"><del><strong>turn the phones</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>and off, listen</strong></del></span> 
<span class="inserted"><ins><em>the contrary, it
-    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
-
-    &lt;p&gt;On</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>responsibility 
for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>no systematic way for Google, or Android 
users,</em></ins></span>
-    to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span class="inserted"><ins><em>study
-    the source code somehow to determine whether</em></ins></span> they <span 
class="removed"><del><strong>send so much data that their transmission 
is</strong></del></span> <span class="inserted"><ins><em>mistreat users in
-    various ways. If it did</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted</strong></del></span> <span 
class="inserted"><ins><em>good job of this, it could more</em></ins></span> or
-      <span class="removed"><del><strong>requested by</strong></del></span> 
<span class="inserted"><ins><em>less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>user, clearly</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>inspect executable proprietary 
apps</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>source code for 
these apps,</em></ins></span> and <span class="removed"><del><strong>off, 
listen to</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve geo-location 
data from</strong></del></span> <span class="inserted"><ins><em>source code 
somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We</em></ins></span> must <span 
class="removed"><del><strong>constitute spying</strong></del></span> <span 
class="inserted"><ins><em>demand release</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>source code to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
+    Google to protect us. We must demand release of source 
code</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span>
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
-    don't snoop.&lt;/p&gt;
+    &lt;p&gt;With free software apps,</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,
+      and</strong></del></span> <span class="inserted"><ins><em>could 
&lt;em&gt;make sure&lt;/em&gt; that</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span>
+    <span class="inserted"><ins><em>don't snoop.&lt;/p&gt;
+
+    &lt;p&gt;With proprietary apps, one can only hope</em></ins></span> that 
<span class="removed"><del><strong>their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone 
in</strong></del></span> <span class="inserted"><ins><em>only hope that they 
don't.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234</em></ins></span> Android
-      <span class="removed"><del><strong>phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>apps that track users by</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> that <span 
class="inserted"><ins><em>track users by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and 
microphone</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1173,10 +1167,11 @@
     <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>app said that users gave consent for this,
-    would that make</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent for this,
+    would that make</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>acceptable? 
No way! It should be flat out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
     the <span class="removed"><del><strong>user's list of other people's phone
       numbers.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -1242,27 +1237,18 @@
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    &lt;p&gt;This example illustrates how &ldquo;getting the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user's
     consent&rdquo; for surveillance is inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span> 
<span class="inserted"><ins><em>investigated the privacy</em></ins></span> and 
<span class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what</strong></del></span> <span 
class="inserted"><ins><em>security of
+  &lt;li id="M201611160"&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of</em></ins></span> users <span 
class="removed"><del><strong>post on various sites</strong></del></span> <span 
class="inserted"><ins><em>may be unawarely subject to poor security
+    apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
@@ -1271,7 +1257,7 @@
 
     &lt;dl&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>NativeX</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Appflood,
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
@@ -1297,18 +1283,28 @@
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
       five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+      the non-premium version of the app does JavaScript 
injection</em></ins></span> for <span class="removed"><del><strong>surveillance 
is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's</em></ins></span> new voice messaging app &lt;a
     
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
     &lt;p&gt;Facebook's</em></ins></span> new Magic Photo app &lt;a
@@ -1448,7 +1444,7 @@
 
   &lt;li id="M201401151"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/#baidu-ime"&gt;spying &lt;abbr
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1482,234 +1478,149 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
+      Here's information on</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
 &lt;!-- INSERT skype --&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains &lt;a
-    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    specifically for</em></ins></span> spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
 &lt;!-- INSERT games --&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
-    multiplayer game Guild War 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
-  &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys</strong></del></span> <span 
class="inserted"><ins><em>spyware
+    program along</em></ins></span> with <span class="removed"><del><strong>a 
mobile phone. This would
+      enable crackers</strong></del></span> <span class="inserted"><ins><em>an 
update</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201611070"&gt;
-    &lt;p&gt;nVidia's</em></ins></span> proprietary GeForce Experience &lt;a
-    
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-    users identify themselves and then sends personal data about them to
-    nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>massive
+    multiplayer game Guild War 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running</em></ins></span> on its <span 
class="removed"><del><strong>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry</strong></del></span>
+  &lt;li id="M201711070"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app was reporting the 
temperature of the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>driver 
for</em></ins></span> a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>certain gaming 
keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
+  &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    video game consoles snoop on</em></ins></span> their <span 
class="removed"><del><strong>products, rather than free software 
which</strong></del></span> users <span class="removed"><del><strong>could have
+      checked</strong></del></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span>
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
     &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of</em></ins></span> data <span 
class="removed"><del><strong>may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-    collected by various cr&hellip;apps and sites made by different
+    &lt;p&gt;Even nastier, they do</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>through ad networks that merge</em></ins></span> the 
data <span class="removed"><del><strong>to a
+      data broker, the</strong></del></span>
+    <span class="inserted"><ins><em>collected by various cr&hellip;apps and 
sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
-
-    &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry</em></ins></span> Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more spyware apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of 
activities</em></ins></span> which <span class="removed"><del><strong>users 
could</strong></del></span>
-    have
-      <span class="removed"><del><strong>checked and 
changed.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with cheating.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;They use this</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able</strong></del></span> 
to <span class="removed"><del><strong>figure out</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things, and hunt for
+    &ldquo;whales&rdquo;</em></ins></span> who <span 
class="removed"><del><strong>the user was.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT stings --&gt;
-  &lt;li id="M201708280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>company that made the 
vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>bad security in many Internet</em></ins></span> of 
<span class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>Stings devices allows 
&lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the</em></ins></span> people <span 
class="removed"><del><strong>used it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>can be led</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>spend</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>lot</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>money. They also
+    use</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>game 
play for specific players.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span> that <span 
class="removed"><del><strong>it was anonymizing the data 
may</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be
-      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold the data to</strong></del></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>sucker&mdash;reject all</em></ins></span> the 
<span class="removed"><del><strong>data broker would have been 
able</strong></del></span> <span class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+    can use</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see</em></ins></span> out
-      <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tvsets --&gt;
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own 
computer,</em></ins></span>
-    the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>TV reports what it 
is. The existence of</em></ins></span> a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>the FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>be picked up</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
+    to spy <span class="inserted"><ins><em>through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span class="removed"><del><strong>children 
and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1719,78 +1630,86 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
+&lt;li&gt;&lt;p&gt;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more</em></ins></span> spyware <span class="removed"><del><strong>via 
BIOS&lt;/a&gt; on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
-    are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>their 
users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT stings --&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers</em></ins></span> 
can <span class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
-    across devices.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off, but having</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
-    being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1799,12 +1718,12 @@
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span 
class="removed"><del><strong>place</strong></del></span> new <span 
class="removed"><del><strong>items on top under each subsection --&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1816,66 +1735,78 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT tvsets --&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>presents. 
It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device means</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>coming from the user's own computer,
+    the TV reports what</em></ins></span> it <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
-    snoops on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>what programs people watch, and even what they 
wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop 
on</em></ins></span> what <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>users watch&lt;/a&gt;.  The TVs did not do 
that when first sold.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>e-reader used
-      by most</strong></del></span> US <span 
class="removed"><del><strong>libraries,</strong></del></span> <span 
class="inserted"><ins><em>or some
-    other government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</em></ins></span>
-    data <span class="inserted"><ins><em>containing sensitive information will 
be transmitted</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1885,36 +1816,84 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
-    snooping <span 
class="removed"><del><strong>devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>all the 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers</em></ins></span> are <span 
class="inserted"><ins><em>unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+  anyone</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect 
this</em></ins></span> has <span class="removed"><del><strong>no authentication 
when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>got
-    better.&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
+    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in the car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
+    better.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span 
class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
     modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
@@ -2095,59 +2074,71 @@
     &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
     user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
+      the 600 millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="removed"><del><strong>already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>has been ordered to pay a total of 
C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
+      range so as to determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>a mobile 
phone. This would enable
-    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2158,18 +2149,12 @@
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
-      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2178,33 +2163,11 @@
 
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT home --&gt;
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance,</em></ins></span> and <span 
class="removed"><del><strong>listening</strong></del></span> <span 
class="inserted"><ins><em>danger of sabotage&lt;/a&gt; (of a specific user, or 
of</em></ins></span>
-    all <span class="inserted"><ins><em>users at once), as well 
as</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of 
an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you</em></ins></span> 
can <span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> it <span 
class="removed"><del><strong>and would then have</strong></del></span>
-    <span class="inserted"><ins><em>using controls right on the 
thermostat.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
@@ -2782,7 +2745,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 19:58:10 $
+$Date: 2018/10/05 12:59:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.it.po      1 Oct 2018 19:58:10 -0000       1.245
+++ proprietary-surveillance.it.po      5 Oct 2018 12:59:27 -0000       1.246
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -28,6 +28,14 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary/proprietary.html\">Altri esempi di "
+"malware proprietario</a>"
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -42,7 +50,7 @@
 "sviluppatori esercitano questo potere a danno degli utenti che invece "
 "dovrebbero servire."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -51,15 +59,14 @@
 "dimostrati di software proprietario che spia o traccia i propri utenti</"
 "strong>."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
-"<a href=\"/proprietary/proprietary/proprietary.html\">Altri esempi di "
-"malware proprietario</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -1184,18 +1191,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"L'applicazione iMessage dei vari iGadget <a href=\"https://theintercept.";
-"com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
-"police/\">comunica a un server ogni numero di telefono digitato dall'utente</"
-"a>; il server tiene memorizzati i numeri per almeno 30 giorni."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -1373,10 +1368,9 @@
 # | Users cannot make an Apple ID [-<a
 # | 
href=\"http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool\";>(necessary-]
 # | {+(<a
-# | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>
-# | necessary+} to install even gratis [-apps)</a>-] {+apps</a>)+} without
-# | giving a valid email address and receiving the {+verification+} code Apple
-# | sends to it.
+# | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>necessary+}
+# | to install even gratis [-apps)</a>-] {+apps</a>)+} without giving a valid
+# | email address and receiving the {+verification+} code Apple sends to it.
 #, fuzzy
 #| msgid ""
 #| "Users cannot make an Apple ID <a href=\"http://apple.stackexchange.com/";
@@ -1386,7 +1380,7 @@
 msgid ""
 "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
 "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
 "address and receiving the verification code Apple sends to it."
 msgstr ""
 "Gli utenti non possono creare una ID di Apple (che serve <a href=\"http://";
@@ -1510,10 +1504,22 @@
 "a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold.  Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# | 
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\";>
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold.  Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves.";
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/";
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/";
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
 msgstr ""
 "Alcuni dispositivi Android sono venduti con spyware al loro interno. Alcuni "
 "telefoni di Motorola modificano Android per <a href=\"http://www.";
@@ -2376,8 +2382,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2534,18 +2540,6 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"GeForce Experience, software proprietario di nVidia, <a href=\"http://www.";
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">fa "
-"sì che gli utenti si identifichino e poi manda i loro dati personali ai "
-"server di nVidia</a>."
-
-#. type: Content of: <ul><li><p>
 # | Many <a
 # | 
href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\";>
 # | video game consoles snoop on their users and report to the
@@ -3329,23 +3323,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -4122,6 +4099,29 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "L'applicazione iMessage dei vari iGadget <a href=\"https://theintercept.";
+#~ "com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
+#~ "police/\">comunica a un server ogni numero di telefono digitato "
+#~ "dall'utente</a>; il server tiene memorizzati i numeri per almeno 30 "
+#~ "giorni."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.";
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "GeForce Experience, software proprietario di nVidia, <a href=\"http://www.";
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
+#~ "\">fa sì che gli utenti si identifichino e poi manda i loro dati "
+#~ "personali ai server di nVidia</a>."
+
 #~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
 #~ msgstr "<a href=\"#SpywareAtWork\">Spyware sul lavoro</a>"
 

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary-surveillance.ja-diff.html       1 Oct 2018 19:58:10 -0000       
1.83
+++ proprietary-surveillance.ja-diff.html       5 Oct 2018 12:59:27 -0000       
1.84
@@ -19,13 +19,14 @@
 }
 #surveillance div.toc {
    width: 24.5em; max-width: 94%;
-   margin-bottom: 1em;
+   <span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>margin: 1em 0;</em></ins></span>
 }
 @media (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
-      margin: .2em 0 1em;
+      margin: <span class="removed"><del><strong>.2em</strong></del></span> 
<span class="inserted"><ins><em>1.2em</em></ins></span> 0 1em;
    }
    #surveillance .medium {
       width: 43%;
@@ -39,6 +40,10 @@
 
 &lt;h2&gt;Proprietary Surveillance&lt;/h2&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
+   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="comment"&gt;</em></ins></span>
 &lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
@@ -46,20 +51,27 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-&lt;div  class="announcement"&gt;
+<span class="removed"><del><strong>&lt;div  
class="announcement"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+
 &lt;p&gt;This document attempts to
 track &lt;strong&gt;clearly established cases of proprietary software that
 spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
 
-&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
-   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
+   Other examples</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
-here, please write
-to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+<span class="inserted"><ins><em>&lt;p&gt;The tethered appliances and 
applications are by nature doing
+surveillance. We are not listing them here because they have their own 
+page: &lt;a href="/proprietary/proprietary-tethers.html"&gt;Proprietary
+Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;/div&gt;</strong></del></span> <span class="inserted"><ins><em>an example 
that ought to be in this page but isn't
+here, please write to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.&lt;/p&gt;</em></ins></span>
-&lt;/div&gt;
 
 &lt;div id="surveillance"&gt;
 
@@ -296,32 +308,29 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-  ships with default settings that show no regard for the
-  privacy of its users&lt;/a&gt;, giving Microsoft the 
&ldquo;right&rdquo;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files, text</strong></del></span> <span 
class="inserted"><ins><em>time, even
+    Intel devices will be able to listen for speech all the time, even
     when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
+    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507300"&gt;
-    &lt;p&gt;Windows 10 &lt;a
-    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    &lt;p&gt;Windows 10</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</em></ins></span>
     ships with default settings that show no regard for the privacy of
     its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
-    the users' files, text</em></ins></span> input, voice input, location 
info, contacts,
+    the users' files, text input, voice input, location info, contacts,
     calendar records and web browsing history, as well as automatically
     connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
 
@@ -577,8 +586,10 @@
     them <span class="removed"><del><strong>from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>to turn the phones on and off, listen to the 
microphone,
-    retrieve geo-location data from the GPS, take photographs, read
+  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>to turn the phones</em></ins></span> on <span 
class="removed"><del><strong>iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
     read the contact list. This malware is designed to disguise itself
     from investigation.&lt;/p&gt;
@@ -593,13 +604,15 @@
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307000"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
+    will send their GPS location on remote command, and 
users</em></ins></span> cannot <span class="inserted"><ins><em>stop
     them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
     to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
@@ -614,54 +627,42 @@
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT ithings --&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>install 
even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>code</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple
+      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app</em></ins></span> on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>their users 
with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
     &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
@@ -690,24 +691,47 @@
 
   &lt;li&gt;&lt;p&gt;Spyware in iThings:
       the &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      iBeacon&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and get other info too.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
     remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span>
 
-    &lt;p&gt;This may have improved with &lt;a
+    <span class="inserted"><ins><em>&lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not as much as</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
     for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
@@ -715,16 +739,14 @@
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt;</em></ins></span> lets stores determine exactly where 
the iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+  &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -739,42 +761,19 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
-    necessary to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
@@ -850,28 +849,28 @@
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when
-    they are sold.  Some Motorola</em></ins></span> phones <span 
class="removed"><del><strong>with GPS will</strong></del></span> <span 
class="inserted"><ins><em>modify Android to &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>their GPS location on
-      remote command and users cannot stop them:</strong></del></span> <span 
class="inserted"><ins><em>personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
@@ -913,31 +912,31 @@
   &lt;li id="M201603080"&gt;
     &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>user's consent&rdquo;
         for surveillance is inadequate as a protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>e-reader used by most US 
libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
+    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
       Symphony</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and found &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
     kinds of</em></ins></span> surveillance <span 
class="removed"><del><strong>software snoop on what radio</strong></del></span> 
<span class="inserted"><ins><em>in the Swindle</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
       are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>other e-readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1019,9 +1018,9 @@
     their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
     Android by</em></ins></span> &lt;a
@@ -1068,10 +1067,11 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="inserted"><ins><em>and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    &lt;p&gt;The moviepass</em></ins></span> app
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1574,24 +1574,31 @@
     &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>other TV manufacturers in spying on 
       their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>73%</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers</strong></del></span> <span class="inserted"><ins><em>47% 
of mobile applications, from Android and iOS
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>47% of 
mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>attitude 
of</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1605,24 +1612,31 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>not in fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds to be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This 
is</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>determine that they</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
@@ -1640,7 +1654,7 @@
 
   &lt;li id="M201401151"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/#baidu-ime"&gt;spying &lt;abbr
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1718,13 +1732,6 @@
     information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201611070"&gt;
-    &lt;p&gt;nVidia's proprietary GeForce Experience &lt;a
-    
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-    users identify themselves and then sends personal data about them to
-    nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
@@ -1860,10 +1867,7 @@
     to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo</em></ins></span> 
can <span class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>now 
&lt;a
+    information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
@@ -1896,7 +1900,7 @@
     Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -1920,9 +1924,10 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>nearby.  Once</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    say, &ldquo;Without</em></ins></span> your
+      <span class="removed"><del><strong>Internet</strong></del></span> <span 
class="inserted"><ins><em>consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
@@ -1932,15 +1937,15 @@
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch</em></ins></span> to turn 
this <span class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other</em></ins></span> devices <span 
class="inserted"><ins><em>on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop 
this,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
@@ -1952,7 +1957,7 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    and use its camera to watch the people who</em></ins></span> are <span 
class="removed"><del><strong>paired</strong></del></span> <span 
class="inserted"><ins><em>watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2024,15 +2029,12 @@
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>enabled</strong></del></span> <span 
class="inserted"><ins><em>was surrounded</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>a person's
+    minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>which manufacturers would make statements about their
+    standard</em></ins></span> with <span class="removed"><del><strong>your 
TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
@@ -2042,56 +2044,52 @@
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company <span class="removed"><del><strong>already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>has been ordered to pay a total of 
C$4m&lt;/a&gt; to its
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Web activity,</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
     company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can
-      <span class="removed"><del><strong>correlate ads</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys</em></ins></span> 
with <span class="removed"><del><strong>Web activity,</strong></del></span> 
<span class="inserted"><ins><em>a mobile phone. This would enable
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
     crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children</em></ins></span> and <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2103,12 +2101,11 @@
 &lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on</em></ins></span> other <span 
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2117,33 +2114,11 @@
 
 &lt;ul class="blurbs"&gt;
 &lt;!-- INSERT home --&gt;
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance,</em></ins></span> and <span 
class="removed"><del><strong>listening</strong></del></span> <span 
class="inserted"><ins><em>danger of sabotage&lt;/a&gt; (of a specific user, or 
of</em></ins></span>
-    all <span class="inserted"><ins><em>users at once), as well 
as</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of 
an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you</em></ins></span> 
can <span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> it <span 
class="removed"><del><strong>and would then have</strong></del></span>
-    <span class="inserted"><ins><em>using controls right on the 
thermostat.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
@@ -2691,7 +2666,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 19:58:10 $
+$Date: 2018/10/05 12:59:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary-surveillance.ja.po      1 Oct 2018 19:58:10 -0000       1.218
+++ proprietary-surveillance.ja.po      5 Oct 2018 12:59:27 -0000       1.219
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -28,6 +28,14 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a 
href=\"/proprietary/proprietary.html\">そのほかのプロプライエタリなマル"
+"ウェアの例</a>"
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +49,7 @@
 "本的な不正義</a>です。開発者
は、しばしばその力を行使し、サービスすべきユーザ"
 "に対して損害を与えます。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -49,15 +57,14 @@
 
"この文書は、<strong>明確に確認されたプロプライエタリなソフトウェアがユーザを"
 
"スパイしたり、追跡したりするケース</strong>を記録する試みです。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
-"<a 
href=\"/proprietary/proprietary.html\">そのほかのプロプライエタリなマル"
-"ウェアの例</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -962,18 +969,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"iThingsのiMessageアプリは<a 
href=\"https://theintercept.com/2016/09/28/apple-";
-"logs-your-imessage-contacts-and-may-share-them-with-police/\">ユーザがå…
¥åŠ›ã—"
-"たすべての電話番号をサーバに伝えます。</a>サーバは最低30日間その番号を記録し"
-"ます。"
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -1139,7 +1134,7 @@
 msgid ""
 "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
 "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
 "address and receiving the verification code Apple sends to it."
 msgstr ""
 "ユーザはApple IDを、<a 
href=\"http://apple.stackexchange.com/questions/49951/";
@@ -1248,10 +1243,17 @@
 "hackers.htm\">もっと多くの情報(英語)</a>があります。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold.  Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves.";
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/";
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/";
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
 msgstr ""
 
"スパイウェアは販売される時にいくつかのアンドロイドのデバイスに存在します。モ"
 "トローラのいくつかの携帯電話はアンドロイドを<a 
href=\"http://www.";
@@ -1959,8 +1961,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2098,18 +2100,6 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"nVidiaのプロプライエタリなGeForce Experienceは<a 
href=\"http://www.";
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">"
-"ユーザに身分証明を求め、そしてそれからユーザの個人情
報をnVidiaのサーバに送り"
-"ます</a>。"
-
-#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-";
@@ -2815,23 +2805,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -3508,6 +3481,28 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "iThingsのiMessageアプリは<a 
href=\"https://theintercept.com/2016/09/28/";
+#~ 
"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">ユーザ"
+#~ "がå…
¥åŠ›ã—たすべての電話番号をサーバに伝えます。</a>サーバは最低30日間その番"
+#~ "号を記録します。"
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.";
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "nVidiaのプロプライエタリなGeForce Experienceは<a 
href=\"http://www.";
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">"
+#~ 
"ユーザに身分証明を求め、そしてそれからユーザの個人情
報をnVidiaのサーバに送"
+#~ "ります</a>。"
+
 #~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
 #~ msgstr "<a href=\"#SpywareAtWork\">仕事場でのスパイウェア</a>"
 

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.pot        1 Oct 2018 19:58:10 -0000       1.167
+++ proprietary-surveillance.pot        5 Oct 2018 12:59:27 -0000       1.168
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -26,6 +26,12 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a "
@@ -34,19 +40,20 @@
 "detriment of the users they ought to serve."
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing "
+"surveillance. We are not listing them here because they have their own page: "
+"<a href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a "
@@ -673,14 +680,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a "
-"href=\"https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/\";>tells
 "
-"a server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -777,9 +776,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Users cannot make an Apple ID (<a "
-"href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>
 "
-"necessary to install even gratis apps</a>) without giving a valid email "
-"address and receiving the verification code Apple sends to it."
+"href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>necessary
 "
+"to install even gratis apps</a>) without giving a valid email address and "
+"receiving the verification code Apple sends to it."
 msgstr ""
 
 #. type: Content of: <div><h4>
@@ -852,9 +851,10 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a "
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a "
 "href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\";> "
-"send personal data to Motorola</a>."
+"sends personal data to Motorola</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1442,8 +1442,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a "
-"href=\"/proprietary/#baidu-ime\">spying <abbr title=\"Input Method "
-"Editor\">IME</abbr></a>."
+"href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr "
+"title=\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -1530,14 +1530,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"nVidia's proprietary GeForce Experience <a "
-"href=\"http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\";>makes
 "
-"users identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Many <a "
 
"href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\";>
 "
 "video game consoles snoop on their users and report to the "
@@ -2020,24 +2012,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a "
 "href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it "
 "into a listening device</a> for them."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary-surveillance.ru.po      2 Oct 2018 07:28:56 -0000       1.408
+++ proprietary-surveillance.ru.po      5 Oct 2018 12:59:27 -0000       1.409
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
 "PO-Revision-Date: 2018-10-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -28,6 +29,14 @@
 
 #. type: Content of: <p>
 msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary.html\">Другие примеры 
вредоносных "
+"несвободных программ</a>"
+
+#. type: Content of: <div><p>
+msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +50,7 @@
 "Разработчики часто пользуются этой 
властью в ущерб пользователям, которых "
 "они должны обслуживать."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -49,15 +58,14 @@
 "В этом документе мы пытаемся отследить 
<strong>хорошо установленные случаи "
 "несвободных программ, которые шпионят или 
следят за пользователями</strong>."
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
-"<a href=\"/proprietary/proprietary.html\">Другие примеры 
вредоносных "
-"несвободных программ</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -911,19 +919,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"Приложение iMessage для iThings <a href=\"https://theintercept.";
-"com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
-"police/\">докладывает серверу о каждом номере 
телефона, который вводится в "
-"него пользователем</a>;  сервер запоминает 
эти номера по меньшей мере на 30 "
-"суток."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "iThings automatically upload to Apple's servers all the photos and videos "
 "they make."
 msgstr ""
@@ -1064,10 +1059,20 @@
 "6, но это верно и для iOS 7)."
 
 #. type: Content of: <ul><li><p>
+# | Users cannot make an Apple ID (<a
+# | 
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\";>[-
+# | -]necessary to install even gratis apps</a>) without giving a valid email
+# | address and receiving the verification code Apple sends to it.
+#, fuzzy
+#| msgid ""
+#| "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
+#| "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-"
+#| "id\"> necessary to install even gratis apps</a>) without giving a valid "
+#| "email address and receiving the verification code Apple sends to it."
 msgid ""
 "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/";
 "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
 "address and receiving the verification code Apple sends to it."
 msgstr ""
 "Пользователи не могут создать <a 
href=\"https://apple.stackexchange.com/";
@@ -1185,10 +1190,22 @@
 "cryptome.org/2013/08/fbi-hackers.htm\">Другие 
подробности</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold.  Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# | 
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\";>
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold.  Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves.";
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
 msgid ""
 "Spyware is present in some Android devices when they are sold.  Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/";
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/";
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
 msgstr ""
 "Программы-шпионы присутствуют на 
некоторых устройствах Android, когда они "
 "продаются. В некоторых телефонах Motorola 
система Android изменена для <a "
@@ -2055,10 +2072,19 @@
 "видно и это можно отключить</a>.  Не так плох
о, как то, что делают другие."
 
 #. type: Content of: <ul><li><p>
+# | The Simeji keyboard is a smartphone version of Baidu's <a
+# | [-href=\"/proprietary/#baidu-ime\">spying-]
+# | {+href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying+}
+# | <abbr title=\"Input Method Editor\">IME</abbr></a>.
+#, fuzzy
+#| msgid ""
+#| "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
+#| "proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
+#| "abbr></a>."
 msgid ""
 "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
 msgstr ""
 "Клавиатура Simeji&nbsp;&mdash; смартфонная версия 
<a href=\"/proprietary/"
 "#baidu-ime\">шпионящего метода ввода</a> Baidu."
@@ -2193,18 +2219,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"Несвободная программа nVidia GeForce Experience <a 
href=\"http://www.";
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\"> "
-"заставляет пользователей указывать себя, 
а затем высылает их персональные "
-"данные на серверы nVidia</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-";
 "are-video-games-collecting-about-you.html/\"> video game consoles snoop on "
 "their users and report to the internet</a>&mdash;even what their users weigh."
@@ -2891,32 +2905,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"&ldquo;Интеллектуальные&rdquo; термостаты Honeywell 
связываются только с "
-"сервером компании. У них есть все скверные 
черты таких устройств: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного пользователя и "
-"всех пользователей сразу), а также риск 
перерывов в работе (именно это и "
-"произошло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"Кроме того, установка требуемой 
температуры требует несвободных программ. 
В "
-"старомодных термостатах это делается с 
помощью органов управления прямо на "
-"термостате."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -3613,6 +3601,53 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/";
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "Приложение iMessage для iThings <a 
href=\"https://theintercept.";
+#~ "com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
+#~ "police/\">докладывает серверу о каждом 
номере телефона, который вводится "
+#~ "в него пользователем</a>;  сервер 
запоминает эти номера по меньшей мере "
+#~ "на 30 суток."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.";
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "Несвободная программа nVidia GeForce Experience <a 
href=\"http://www.";
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
+#~ "\"> заставляет пользователей указывать 
себя, а затем высылает их "
+#~ "персональные данные на серверы nVidia</a>."
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "&ldquo;Интеллектуальные&rdquo; термостаты 
Honeywell связываются только с "
+#~ "сервером компании. У них есть все 
скверные черты таких устройств: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+#~ "outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного "
+#~ "пользователя и всех пользователей 
сразу), а также риск перерывов в работе "
+#~ "(именно это и произошло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "Кроме того, установка требуемой 
температуры требует несвободных программ. "
+#~ "В старомодных термостатах это делается 
с помощью органов управления прямо "
+#~ "на термостате."
+
 #~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
 #~ msgstr "<a href=\"#SpywareAtWork\">Программы-шпионы на 
работе</a>"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]