www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-surveillance.de....


From: GNUN
Subject: www/proprietary/po proprietary-surveillance.de....
Date: Wed, 24 Oct 2018 15:28:45 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/24 15:28:45

Modified files:
        proprietary/po : proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.412&r2=1.413

Patches:
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary-surveillance.de.po      7 Oct 2018 22:29:13 -0000       1.235
+++ proprietary-surveillance.de.po      24 Oct 2018 19:28:44 -0000      1.236
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -35,12 +35,27 @@
 "<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
 
 #. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
 "even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
 msgstr ""
 "Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm "
 "(entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen "
@@ -53,26 +68,38 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a href=\"https://";
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
 msgstr ""
-"Dieses Dokument versucht die Spuren <strong>eindeutig nachgewiesener Fälle "
-"proprietärer Software, die Nutzer ausspioniert oder verfolgt</strong>, zu "
-"verfolgen:"
 
 #. type: Content of: <div><p>
 msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
 msgstr ""
 "Sollten Sie von einem Beispiel wissen, dass hier genannt werden sollte aber "
 "nicht aufgeführt wird, informieren Sie uns bitte unter <a href=\"mailto:";
@@ -4471,6 +4498,14 @@
 msgstr "Letzte Änderung:"
 
 #~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Dieses Dokument versucht die Spuren <strong>eindeutig nachgewiesener "
+#~ "Fälle proprietärer Software, die Nutzer ausspioniert oder verfolgt</"
+#~ "strong>, zu verfolgen:"
+
+#~ msgid ""
 #~ "Every &ldquo;home security&rdquo; camera, if its manufacturer can "
 #~ "communicate with it, is a surveillance device. <a href=\"https://www.";
 #~ "theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-"

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- proprietary-surveillance.fr.po      7 Oct 2018 22:29:14 -0000       1.325
+++ proprietary-surveillance.fr.po      24 Oct 2018 19:28:44 -0000      1.326
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: 2018-10-05 18:44+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-24 19:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -35,12 +36,27 @@
 "dans le logiciel privateur</a>"
 
 #. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
 "even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
 msgstr ""
 "Le logiciel non libre (privateur) est très souvent malveillant (conçu pour "
 "maltraiter les utilisateurs). Il est contrôlé par ses développeurs, ce qui 
"
@@ -51,18 +67,30 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a href=\"https://";
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
 msgstr ""
-"Ce document tente de recenser les <strong>cas clairement établis de "
-"logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
-"strong>."
 
 #. type: Content of: <div><p>
-msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+# | [-The tethered-]{+All+} appliances and applications {+that are tethered to
+# | a specific server+} are {+snoopers+} by [-nature doing surveillance.-]
+# | {+nature.+}  We [-are-] {+do+} not [-listing-] {+list+} them [-here-] {+in
+# | this page+} because they have their own page: <a
+# | href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>.
+#, fuzzy
+#| msgid ""
+#| "The tethered appliances and applications are by nature doing "
+#| "surveillance. We are not listing them here because they have their own "
+#| "page: <a href=\"/proprietary/proprietary-tethers.html\">Proprietary "
+#| "Tethers</a>."
+msgid ""
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
 msgstr ""
 "Les appareils et applications dépendant d'un serveur font par nature de la "
 "surveillance. Nous ne les citons pas ici parce qu'ils ont une page dédiée 
: "
@@ -70,11 +98,22 @@
 "serveur</a>."
 
 #. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
 msgstr ""
 "Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page "
 "mais n'y figure pas, n'hésitez pas à écrire à <a href=\"mailto:";
@@ -3587,3 +3626,11 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Ce document tente de recenser les <strong>cas clairement établis de "
+#~ "logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
+#~ "strong>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-surveillance.it-diff.html       17 Oct 2018 10:01:36 -0000      
1.76
+++ proprietary-surveillance.it-diff.html       24 Oct 2018 19:28:44 -0000      
1.77
@@ -48,20 +48,25 @@
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
-basic injustice&lt;/a&gt;. The developers often exercise that power to the
-detriment of the users they ought to serve.&lt;/p&gt;
+basic injustice&lt;/a&gt;. The developers <span class="inserted"><ins><em>and 
manufacturers</em></ins></span> often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;div  
class="announcement"&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;div  class="announcement"&gt;
+&lt;p&gt;This document attempts</strong></del></span>
 
-&lt;p&gt;This document attempts to
-track &lt;strong&gt;clearly established cases of proprietary software that
-spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
-   Other examples</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;The tethered appliances and 
applications are by nature doing
-surveillance. We are not listing them here because they have their own 
+<span class="inserted"><ins><em>&lt;p&gt;One common form of mistreatment 
is</em></ins></span> to
+<span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>snoop on the user.  This page
+records</em></ins></span> &lt;strong&gt;clearly established cases of 
proprietary software that
+spies on or tracks <span 
class="removed"><del><strong>users&lt;/strong&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
+   Other examples</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/strong&gt;.  Manufacturers even refuse
+to &lt;a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"&gt;say
+whether they snoop on users for the state&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;All appliances and applications that are tethered to a specific
+server are snoopers by nature.  We do not list them in this page
+because they have their own
 page: &lt;a href="/proprietary/proprietary-tethers.html"&gt;Proprietary
 Tethers&lt;/a&gt;.&lt;/p&gt;
 
@@ -70,7 +75,7 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;
+to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
@@ -312,8 +317,7 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-  Windows 10</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -324,8 +328,8 @@
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
+    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
@@ -506,9 +510,8 @@
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of</strong></del></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
 
   &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
@@ -577,7 +580,7 @@
 
 &lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware is designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -614,9 +617,15 @@
     disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
     yet another example of nonfree software pretending</strong></del></span>
     <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -626,43 +635,33 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a 
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this</em></ins></span> would <span class="removed"><del><strong>be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>require circumventing the iOS 
DRM.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>most 
popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> the <span class="removed"><del><strong>app's 
functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
   found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The 
clear</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced</em></ins></span> 
way <span class="removed"><del><strong>to say
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>really does turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
+  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
   legitimate, but is that valid?  Software developers have no right to
   analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
       Some Motorola phones modify Android to
@@ -670,13 +669,15 @@
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
     know you want</em></ins></span> to <span class="removed"><del><strong>any 
file on the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
@@ -725,7 +726,10 @@
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving the code Apple
       sends to it.&lt;/p&gt;
   &lt;/li&gt;
@@ -736,10 +740,7 @@
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>Apple's servers 
all</em></ins></span> the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -763,8 +764,7 @@
     security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -784,13 +784,13 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"</em></ins></span>
+    &lt;p&gt;The &lt;a</em></ins></span> class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
@@ -863,24 +863,24 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
+      by sending hidden text messages which enable them to turn the phones
+      on and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable</em></ins></span> phones
-      <span class="removed"><del><strong>on and off, 
listen</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data</em></ins></span> to <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
+    tracks</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
       browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
@@ -966,23 +966,22 @@
 
   <span class="removed"><del><strong>&lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The</strong></del></span>
+        announced an opt-in proprietary search</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>personal details of users</em></ins></span> that 
<span class="removed"><del><strong>Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>users that 
install</em></ins></span> the <span class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>not enough to
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of users is not enough to
     legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>Google normally gets 
when</strong></del></span> <span class="inserted"><ins><em>spell out 
what</em></ins></span>
+    they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and
     <span class="inserted"><ins><em>honestly identify</em></ins></span> the
     <span class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
@@ -1039,21 +1038,21 @@
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
       Symphony surveillance software snoop</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
@@ -1088,326 +1087,311 @@
   <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a
 <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>picture</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
-
-    &lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>take 
according</strong></del></span> <span 
class="inserted"><ins><em>learn</em></ins></span> to <span 
class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit</em></ins></span> in
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>picture you take according to who
+      is in</strong></del></span> <span class="inserted"><ins><em>user's 
movements and listens through</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>makes them act as spies for licensing 
enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across</strong></del></span> <span class="inserted"><ins><em>care 
much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps 
studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="inserted"><ins><em>insecurely 
snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might</em></ins></span> be
-      <span class="removed"><del><strong>sent across the wire to Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>snooping
-    in other ways.&lt;/p&gt;
-
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+    of</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
       algorithms.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on</strong></del></span> proprietary <span 
class="removed"><del><strong>malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>apps by 
getting apps from the free software
-    only</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware (DRM and snooping). In 
August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that</strong></del></span> <span 
class="inserted"><ins><em>apps whose
+    source code</em></ins></span> they <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The other apps might 
be</em></ins></span> snooping <span class="removed"><del><strong>as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span>
+    <span class="inserted"><ins><em>in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>a 
typical example of
+      the attitude</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid</em></ins></span> of the proprietary <span 
class="removed"><del><strong>software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the</em></ins></span> proprietary apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>free 
software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>at 
least is visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some</strong></del></span> are <span 
class="removed"><del><strong>starting</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the 
information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span>
+      &lt;p&gt;Don't</strong></del></span>
     <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+    It could</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get</strong></del></span> <span class="inserted"><ins><em>designed 
so that</em></ins></span> users <span class="inserted"><ins><em>communicate 
such info</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>each
+    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
-    other but not to</em></ins></span> the <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>moviepass</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user to
+      approve sending personal data to the app developer but did not
+      ask about sending it to other companies.  This shows the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where</em></ins></span> they <span class="removed"><del><strong>present 
snooping as a way</strong></del></span> <span class="inserted"><ins><em>travel 
before and after going</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> and <span 
class="removed"><del><strong>the NSA takes advantage to</strong></del></span> 
<span class="inserted"><ins><em>dis-service</em></ins></span>
+    spy <span class="removed"><del><strong>through it too&lt;/a&gt;.
+      Here's information</strong></del></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>users even</em></ins></span> more <span 
class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
+&lt;/ul&gt;
+
 
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps <span 
class="removed"><del><strong>the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>pervasive and sometimes very clever. Some 
trackers can &lt;a
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>than users 
expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> a <span 
class="removed"><del><strong>speech recognition company 
based</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android 
apps
+    is pervasive and sometimes very clever. Some trackers</em></ins></span> 
can <span class="removed"><del><strong>remotely control the toys 
with</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>way that at 
least is visible</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>mobile 
phone. This would
+      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>user's movements around</em></ins></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>words
+    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>even speak
+      into</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>spy;</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>contrary, it
-    worked</em></ins></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>its users through</strong></del></span> 
the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the snooping <span class="removed"><del><strong>done 
by</strong></del></span> <span class="inserted"><ins><em>of these 
apps.&lt;/p&gt;
+    for</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps, and
+    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>injustice 
of</em></ins></span> their <span class="removed"><del><strong>products, rather 
than free software which users could have
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>phone 
company,</strong></del></span> <span class="inserted"><ins><em>other hand, 
Google redistributes nonfree Android apps,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares</em></ins></span> in the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There</em></ins></span> is no <span 
class="removed"><del><strong>excuse for malware.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>systematic way</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold the 
data</strong></del></span> <span class="inserted"><ins><em>preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>a
+      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>inspect executable proprietary 
apps</em></ins></span> to <span class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>see what they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>source code for these apps, and 
study</em></ins></span>
+    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    various ways. If it did</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>good job</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>Google, or Android 
users,</em></ins></span>
-    to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps</em></ins></span> to <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app developer but</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it</em></ins></span> did <span 
class="removed"><del><strong>not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>a good job of this,</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>could more or less
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> <span 
class="inserted"><ins><em>this, it could more or less
     prevent such snooping, except when</em></ins></span> the
-      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>app developers are clever
-    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>app 
developers are clever
+    enough</em></ins></span> to <span class="removed"><del><strong>access the 
data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>anyone?  A free 
software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    Google</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>protect us. We 
must demand release of source code</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>the
+    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps,</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could &lt;em&gt;make sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in 
<span class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>stores or 
played by TV
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span class="inserted"><ins><em>do 
lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>personal data</em></ins></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>users through</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The</strong></del></span> app <span 
class="removed"><del><strong>was reporting</strong></del></span> <span 
class="inserted"><ins><em>would record</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>audio files</em></ins></span> users <span 
class="removed"><del><strong>could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>listen to
-    along with</em></ins></span> the <span 
class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial 
number.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>company's 
statement</strong></del></span> <span class="inserted"><ins><em>suit 
accuses</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> was <span 
class="removed"><del><strong>anonymizing</strong></del></span> <span 
class="inserted"><ins><em>done without</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter.</strong></del></span> <span 
class="inserted"><ins><em>users' consent.</em></ins></span>
-    If <span class="removed"><del><strong>it had sold</strong></del></span> 
the <span class="removed"><del><strong>data to a
-      data broker,</strong></del></span> <span class="inserted"><ins><em>fine 
print of</em></ins></span> the <span class="removed"><del><strong>data broker 
would have been able to figure</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat</em></ins></span> 
out
-      <span class="removed"><del><strong>who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
-    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
-    to <span class="removed"><del><strong>its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to 
<span class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study</em></ins></span> found <span class="removed"><del><strong>a way to 
access the data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>tens 
of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>same 
information
-    about</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>users' searches that Google normally gets when they 
use
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</em></ins></span>
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+  &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
@@ -1709,21 +1693,21 @@
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
+    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -1734,31 +1718,33 @@
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that</em></ins></span> install <span 
class="inserted"><ins><em>a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. 
It</em></ins></span>
-    is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>too bad that 
the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1775,21 +1761,25 @@
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>range so as</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>determine that they
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt; on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    manufacturers</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2780,7 +2770,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/24 19:28:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary-surveillance.it.po      7 Oct 2018 22:29:14 -0000       1.248
+++ proprietary-surveillance.it.po      24 Oct 2018 19:28:44 -0000      1.249
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -35,12 +35,27 @@
 "malware proprietario</a>"
 
 #. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
 "even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
 msgstr ""
 "Il software non libero (proprietario) è molto spesso malware, progettato per 
"
 "danneggiare gli utenti. Il software non libero è controllato dai suoi "
@@ -52,18 +67,19 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a href=\"https://";
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
 msgstr ""
-"Questo documento prova a tenere traccia di <strong>casi chiaramente "
-"dimostrati di software proprietario che spia o traccia i propri utenti</"
-"strong>."
 
 #. type: Content of: <div><p>
 msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -71,7 +87,7 @@
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
 msgstr ""
 
 #. type: Content of: <div><div><a>
@@ -4064,6 +4080,14 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Questo documento prova a tenere traccia di <strong>casi chiaramente "
+#~ "dimostrati di software proprietario che spia o traccia i propri utenti</"
+#~ "strong>."
+
 #, fuzzy
 #~| msgid ""
 #~| "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.ja-diff.html       17 Oct 2018 10:01:36 -0000      
1.87
+++ proprietary-surveillance.ja-diff.html       24 Oct 2018 19:28:44 -0000      
1.88
@@ -48,20 +48,25 @@
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
-basic injustice&lt;/a&gt;. The developers often exercise that power to the
-detriment of the users they ought to serve.&lt;/p&gt;
+basic injustice&lt;/a&gt;. The developers <span class="inserted"><ins><em>and 
manufacturers</em></ins></span> often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;div  
class="announcement"&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;div  class="announcement"&gt;
+&lt;p&gt;This document attempts</strong></del></span>
 
-&lt;p&gt;This document attempts to
-track &lt;strong&gt;clearly established cases of proprietary software that
-spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
-   Other examples</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;The tethered appliances and 
applications are by nature doing
-surveillance. We are not listing them here because they have their own 
+<span class="inserted"><ins><em>&lt;p&gt;One common form of mistreatment 
is</em></ins></span> to
+<span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>snoop on the user.  This page
+records</em></ins></span> &lt;strong&gt;clearly established cases of 
proprietary software that
+spies on or tracks <span 
class="removed"><del><strong>users&lt;/strong&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
+   Other examples</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/strong&gt;.  Manufacturers even refuse
+to &lt;a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"&gt;say
+whether they snoop on users for the state&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;All appliances and applications that are tethered to a specific
+server are snoopers by nature.  We do not list them in this page
+because they have their own
 page: &lt;a href="/proprietary/proprietary-tethers.html"&gt;Proprietary
 Tethers&lt;/a&gt;.&lt;/p&gt;
 
@@ -70,7 +75,7 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;
+to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
@@ -308,8 +313,7 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-  Windows 10</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -320,8 +324,8 @@
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
+    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
@@ -572,22 +576,21 @@
     &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>make sure they 
can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can
-        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>take over
-    smartphones&lt;/a&gt; by sending hidden text messages which 
enable</em></ins></span>
-    them <span class="removed"><del><strong>from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>to turn the phones</em></ins></span> on <span 
class="removed"><del><strong>iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    smartphones&lt;/a&gt; by sending hidden text messages which enable
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
     read the contact list. This malware is designed to disguise itself
     from investigation.&lt;/p&gt;
@@ -687,43 +690,28 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which 
is</strong></del></span> <span class="inserted"><ins><em>the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks 
about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;</em></ins></span>
-    iOS <span class="removed"><del><strong>6,</strong></del></span> <span 
class="inserted"><ins><em>8 security improvements&lt;/a&gt;;</em></ins></span> 
but <span class="removed"><del><strong>it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This may have improved with &lt;a
+    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but &lt;a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+  &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
-    for <span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -731,23 +719,20 @@
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;</em></ins></span>
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the iThing is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally <span 
class="removed"><del><strong>incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
+  &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
@@ -755,20 +740,41 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track 
users, which</em></ins></span> is <span 
class="removed"><del><strong>the</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
+    to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -978,31 +984,29 @@
     the <span class="removed"><del><strong>picture you take according to who
       is in</strong></del></span> <span class="inserted"><ins><em>user's 
movements and listens through</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>makes them act as spies for licensing 
enforcement.&lt;/p&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>makes them act as 
spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="inserted"><ins><em>save
+    a recording. But I can't</em></ins></span> be
+      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>sure from</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across</strong></del></span> <span class="inserted"><ins><em>care 
much less about sports, you will benefit in
+    &lt;p&gt;If <span class="removed"><del><strong>so, 
none</strong></del></span> <span class="inserted"><ins><em>you learn to care 
much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps 
studied by researchers were found</em></ins></span> to <span 
class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+      is based</strong></del></span> <span class="inserted"><ins><em>apps were
+    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
     detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -1060,10 +1064,11 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="inserted"><ins><em>and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    &lt;p&gt;The moviepass</em></ins></span> app
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1149,8 +1154,7 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -1159,19 +1163,20 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>collecting</strong></del></span> <span 
class="inserted"><ins><em>BART &lt;a
+    &lt;p&gt;Apps for BART &lt;a
     
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> <span 
class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1370,19 +1375,9 @@
     283 Android VPN apps concluded that &ldquo;in spite of</em></ins></span> 
the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>promises
     for privacy, security, and anonymity given</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>poor 
security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
-    privacy:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1397,71 +1392,83 @@
   snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it</em></ins></span> has <span 
class="removed"><del><strong>a built-in cell phone modem which allows
+    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
 <span class="inserted"><ins><em>full</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely and make changes in various
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>users'
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>infringe their
+    privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>do because 
the system has no authentication when
+    accessed through the modem.  However, even if</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
-      for other apps and also core</em></ins></span> system <span 
class="removed"><del><strong>has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>logs. TigerVPN developers have
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
+      for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even</strong></del></span> <span 
class="inserted"><ins><em>UK government</em></ins></span> if <span 
class="removed"><del><strong>it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.</strong></del></span> <span 
class="inserted"><ins><em>requested.&lt;/dd&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
+      may turn them over</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>UK 
government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users.</em></ins></span> The <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>stated purpose 
of</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>JS injection</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
+      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>JS 
injection</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> to <span 
class="inserted"><ins><em>display ads. Uses
-      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>car remotely,</strong></del></span> 
<span class="inserted"><ins><em>user's
+  &lt;li&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
-      the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
-      tracking</em></ins></span> the <span class="removed"><del><strong>car's 
movements</strong></del></span> <span class="inserted"><ins><em>user and 
displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> this <span class="removed"><del><strong>article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
+      the non-premium version</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>the app does JavaScript injection for
+      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609210"&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</em></ins></span>
-    all
-    <span class="removed"><del><strong>the time; it is possible to physically 
remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+  &lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
       cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>picture you take according to who 
is</em></ins></span>
     in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
@@ -1477,8 +1484,22 @@
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get the data
-      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
+    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="inserted"><ins><em>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of</em></ins></span> data <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,</em></ins></span>
+    it <span class="removed"><del><strong>over, the 
state</strong></del></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>alter them 
too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1486,10 +1507,10 @@
 &lt;!-- #SpywareAtHome --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
+    
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
@@ -1499,107 +1520,82 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>what people are listening to or watching&lt;/a&gt;. 
In addition,
-    it may be analyzing people's conversations</em></ins></span> to <span 
class="inserted"><ins><em>serve them with targeted
-    advertisements.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;</em></ins></span>
-    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;
+      Rent-to-own computers were programmed to spy</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>many sorts of data</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</strong></del></span>
 
-  &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>app's 
functionality,</em></ins></span> was
+<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>report 
was</strong></del></span> <span class="inserted"><ins><em>article should not 
have described these apps</em></ins></span> as <span 
class="removed"><del><strong>of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> what <span 
class="removed"><del><strong>happens if a user declines consent?  Probably 
the</strong></del></span> <span class="inserted"><ins><em>radio 
and</em></ins></span> TV
-      <span class="removed"><del><strong>will say, &ldquo;Without your 
consent</strong></del></span> <span class="inserted"><ins><em>programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article should</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs</strong></del></span> <span 
class="inserted"><ins><em>have described these apps as
-    &ldquo;free&rdquo;&mdash;they</em></ins></span> are not <span 
class="removed"><del><strong>allowed</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way</em></ins></span>
-    to <span class="removed"><del><strong>report what</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash;</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but is that valid? Software developers have</em></ins></span> 
no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+      consent before collecting personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>&ldquo;free&rdquo;&mdash;they</em></ins></span> are 
<span class="removed"><del><strong>totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV 
will</strong></del></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way
+    to</em></ins></span> say <span class="inserted"><ins><em>&ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span>
+    <span class="inserted"><ins><em>legitimate, but is that valid? Software 
developers have no right</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span>
+    <span class="inserted"><ins><em>analyze</em></ins></span> what
+      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>other TV manufacturers in spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>73% and 47% of mobile applications, from Android and 
iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral</em></ins></span> and 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>73%</em></ins></span> and 
       <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users with
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>47% of 
mobile applications, from Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>possible to 
turn this off, but having</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>enabled by default
-      is an injustice already.&lt;/p&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded</em></ins></span> users <span 
class="inserted"><ins><em>submit</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>some are 
starting</em></ins></span>
-    to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so</strong></del></span> <span class="inserted"><ins><em>realize 
that it is nasty.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping</em></ins></span> as <span 
class="inserted"><ins><em>a way</em></ins></span> to <span 
class="removed"><del><strong>determine that</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether</em></ins></span> they 
<span class="inserted"><ins><em>want that. This is a
-    typical example of the attitude of the proprietary software industry
+    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>attitude 
of</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1613,28 +1609,31 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>not in 
fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>not in fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the 
average.&lt;/p&gt;
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds to be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This 
is</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>determine that they are 
nearby.</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
@@ -1838,7 +1837,8 @@
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
     on other devices in range so as to determine that they
-    are nearby.  Once your Internet devices are paired with
+    are nearby.</em></ins></span>  Once your
+      <span class="removed"><del><strong>Internet 
devices</strong></del></span> <span class="inserted"><ins><em>Internet devices 
are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
@@ -1918,9 +1918,10 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>paired with</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    say, &ldquo;Without</em></ins></span> your <span 
class="removed"><del><strong>TV, advertisers can
+      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
@@ -1949,8 +1950,9 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and
+      <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>use its camera to watch the people who are watching 
TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1962,13 +1964,14 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
@@ -2009,8 +2012,8 @@
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+    products, rather than free software which users could have 
checked</em></ins></span>
+    and <span class="inserted"><ins><em>changed.&lt;/p&gt;
 
     &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
@@ -2627,7 +2630,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/24 19:28:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.ja.po      7 Oct 2018 22:29:14 -0000       1.221
+++ proprietary-surveillance.ja.po      24 Oct 2018 19:28:44 -0000      1.222
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -35,12 +35,21 @@
 "ウェアの例</a>"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
 "even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
 msgstr ""
 
"不自由な(プロプライエタリな)ソフトウェアは実に多くのå 
´åˆãƒžãƒ«ã‚¦ã‚§ã‚¢ã§ã™(ユーザ"
 "を虐待するように設計 
されます)。不自由なソフトウェアはその開発者
によりコント"
@@ -51,17 +60,19 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a href=\"https://";
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
 msgstr ""
-"この文書は、<strong>明確に確認されたプロプライエタリなソフトウェアがユーザを"
-"スパイしたり、追跡したりするケース</strong>を記録する試みです。"
 
 #. type: Content of: <div><p>
 msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -69,7 +80,7 @@
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
 msgstr ""
 
 #. type: Content of: <div><div><a>
@@ -3449,6 +3460,13 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ 
"この文書は、<strong>明確に確認されたプロプライエタリなソフトウェアがユーザ"
+#~ 
"をスパイしたり、追跡したりするケース</strong>を記録する試みです。"
+
 #, fuzzy
 #~| msgid ""
 #~| "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary-surveillance.pot        7 Oct 2018 22:29:14 -0000       1.170
+++ proprietary-surveillance.pot        24 Oct 2018 19:28:44 -0000      1.171
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -36,21 +36,25 @@
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a "
 "href=\"/philosophy/free-software-even-more-important.html\">that is the "
-"basic injustice</a>. The developers often exercise that power to the "
-"detriment of the users they ought to serve."
+"basic injustice</a>. The developers and manufacturers often exercise that "
+"power to the detriment of the users they ought to serve."
 msgstr ""
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a "
+"href=\"https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/\";>say
 "
+"whether they snoop on users for the state</a>."
 msgstr ""
 
 #. type: Content of: <div><p>
 msgid ""
-"The tethered appliances and applications are by nature doing "
-"surveillance. We are not listing them here because they have their own page: "
-"<a href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a "
+"href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -58,8 +62,8 @@
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a "
 "href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "
-"us. Please include the URL of a trustworthy reference or two to present the "
-"specifics."
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
 msgstr ""
 
 #. type: Content of: <div><div><a>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- proprietary-surveillance.ru.po      7 Oct 2018 22:29:14 -0000       1.412
+++ proprietary-surveillance.ru.po      24 Oct 2018 19:28:44 -0000      1.413
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
 "PO-Revision-Date: 2018-10-05 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-24 19:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -35,12 +36,27 @@
 "несвободных программ</a>"
 
 #. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
 msgid ""
 "Nonfree (proprietary) software is very often malware (designed to mistreat "
 "the user). Nonfree software is controlled by its developers, which puts them "
 "in a position of power over the users; <a href=\"/philosophy/free-software-"
 "even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
 msgstr ""
 "Несвободные программы очень часто 
вредоносны (спроектированы несправедливо "
 "по отношению к пользователю). Несвободные 
программы контролируются своими "
@@ -51,17 +67,30 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user.  This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>.  Manufacturers even refuse to <a href=\"https://";
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
 msgstr ""
-"В этом документе мы пытаемся отследить 
<strong>хорошо установленные случаи "
-"несвободных программ, которые шпионят или 
следят за пользователями</strong>."
 
 #. type: Content of: <div><p>
-msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+# | [-The tethered-]{+All+} appliances and applications {+that are tethered to
+# | a specific server+} are {+snoopers+} by [-nature doing surveillance.-]
+# | {+nature.+}  We [-are-] {+do+} not [-listing-] {+list+} them [-here-] {+in
+# | this page+} because they have their own page: <a
+# | href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>.
+#, fuzzy
+#| msgid ""
+#| "The tethered appliances and applications are by nature doing "
+#| "surveillance. We are not listing them here because they have their own "
+#| "page: <a href=\"/proprietary/proprietary-tethers.html\">Proprietary "
+#| "Tethers</a>."
+msgid ""
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature.  We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
 msgstr ""
 "Привязанные устройства и программы по 
природе своей ведут слежку. Мы не "
 "перечисляем их здесь, поскольку у них есть 
своя страница: We are not listing "
@@ -69,11 +98,22 @@
 "proprietary-tethers.html\">Привязка в несвободных 
программах</a>."
 
 #. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
 msgstr ""
 "Если вам известен пример, который должен 
быть на этой странице, но его здесь "
 "нет, сообщите нам по адресу <a 
href=\"mailto:address@hidden";>&lt;"
@@ -3541,6 +3581,14 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "В этом документе мы пытаемся отследить 
<strong>хорошо установленные "
+#~ "случаи несвободных программ, которые 
шпионят или следят за "
+#~ "пользователями</strong>."
+
+#~ msgid ""
 #~ "Every &ldquo;home security&rdquo; camera, if its manufacturer can "
 #~ "communicate with it, is a surveillance device. <a href=\"https://www.";
 #~ "theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]