www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-cars.de-diff.html ma...


From: GNUN
Subject: www/proprietary/po malware-cars.de-diff.html ma...
Date: Fri, 26 Oct 2018 02:58:58 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/26 02:58:57

Modified files:
        proprietary/po : malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de.po proprietary.es.po 
                         proprietary.fr.po proprietary.it-diff.html 
                         proprietary.it.po proprietary.ja-diff.html 
                         proprietary.ja.po proprietary.nl-diff.html 
                         proprietary.nl.po proprietary.pl-diff.html 
                         proprietary.pl.po proprietary.pot 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.17&r2=1.18

Patches:
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.de-diff.html   25 Oct 2018 10:31:08 -0000      1.8
+++ malware-cars.de-diff.html   26 Oct 2018 06:58:57 -0000      1.9
@@ -63,21 +63,39 @@
 &lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt;</em></ins></span> in its 
<span class="removed"><del><strong>software</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;connected&rdquo; cars, minute by 
minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>limit 
customers</strong></del></span> <span class="inserted"><ins><em>you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to
+<span class="removed"><del><strong>using just</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>some cars makes it possible to &lt;a
+    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
     remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla used</em></ins></span> software to limit <span 
class="removed"><del><strong>customers to
-using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> part of the battery 
<span class="removed"><del><strong>of</strong></del></span>
+    &lt;p&gt;Tesla used software to limit the</em></ins></span> part of the 
battery <span class="removed"><del><strong>of</strong></del></span>
     <span class="inserted"><ins><em>that was available to customers 
in</em></ins></span> some <span 
class="removed"><del><strong>cars&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
     a universal back door in the software&lt;/a&gt; to temporarily increase
@@ -340,7 +358,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-cars.de.po  25 Oct 2018 10:31:08 -0000      1.11
+++ malware-cars.de.po  26 Oct 2018 06:58:57 -0000      1.12
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -84,6 +84,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-cars.fr.po  25 Oct 2018 10:58:25 -0000      1.16
+++ malware-cars.fr.po  26 Oct 2018 06:58:57 -0000      1.17
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-25 12:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -80,6 +81,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-cars.pot    25 Oct 2018 10:31:08 -0000      1.7
+++ malware-cars.pot    26 Oct 2018 06:58:57 -0000      1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a "
 
"href=\"https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\";>
 "
 "track your every move</a>."

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-cars.ru.po  25 Oct 2018 17:00:14 -0000      1.20
+++ malware-cars.ru.po  26 Oct 2018 06:58:57 -0000      1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-09-20 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -82,6 +83,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.de.po      25 Oct 2018 17:58:25 -0000      1.237
+++ proprietary-surveillance.de.po      26 Oct 2018 06:58:57 -0000      1.238
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3741,6 +3741,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary-surveillance.fr.po      25 Oct 2018 18:54:51 -0000      1.329
+++ proprietary-surveillance.fr.po      26 Oct 2018 06:58:57 -0000      1.330
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-25 20:53+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3054,6 +3055,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-surveillance.it-diff.html       25 Oct 2018 17:58:26 -0000      
1.78
+++ proprietary-surveillance.it-diff.html       26 Oct 2018 06:58:57 -0000      
1.79
@@ -1355,7 +1355,7 @@
     &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>design
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1545,9 +1545,12 @@
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
@@ -1566,7 +1569,7 @@
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    is doing this in a way that</em></ins></span> at <span 
class="removed"><del><strong>Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1606,11 +1609,12 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1618,28 +1622,33 @@
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers</em></ins></span> and <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    &lt;p&gt;ArenaNet surreptitiously installed a</em></ins></span> spyware 
<span class="removed"><del><strong>via BIOS&lt;/a&gt;</strong></del></span>
+    <span class="inserted"><ins><em>program along with an update to the massive
     multiplayer game Guild War 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>all open processes 
running on its user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
@@ -1664,12 +1673,14 @@
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>lot of 
money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
@@ -1691,8 +1702,14 @@
 
   &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
@@ -1702,130 +1719,48 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
-
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
-    are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt; on Windows installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>their 
users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers</em></ins></span> 
can <span class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
-    across devices.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off, but having</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
-    being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1834,12 +1769,12 @@
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span 
class="removed"><del><strong>place</strong></del></span> new <span 
class="removed"><del><strong>items on top under each subsection --&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1851,47 +1786,79 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>presents. 
It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device means</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>coming from the user's own computer,
+    the TV reports what</em></ins></span> it <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
-    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
       Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch, and</em></ins></span> even <span 
class="removed"><del><strong>which page the user reads at</strong></del></span> 
what <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>they 
wanted</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+      needed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
+
+    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
@@ -1899,118 +1866,141 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers</em></ins></span> are <span 
class="inserted"><ins><em>unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
   snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+  anyone</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in the car is
-    proprietary,</strong></del></span> <span class="inserted"><ins><em>when 
first sold.&lt;/p&gt;
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>and would then have</em></ins></span> to <span 
class="removed"><del><strong>the car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it is <span class="removed"><del><strong>possible to physically remove the cell 
phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary</strong></del></span> 
<span class="inserted"><ins><em>done by free</em></ins></span>
-    software in <span class="removed"><del><strong>cars</strong></del></span> 
<span class="inserted"><ins><em>your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive</em></ins></span> information <span 
class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
+    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201411090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article,</strong></del></span> <span 
class="inserted"><ins><em>Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is 
<span class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>2014,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done by malware. The other
-      cases mentioned</strong></del></span> <span class="inserted"><ins><em>we 
don't expect this has got
-    better.&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware 
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
+    better.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>physically remove</strong></del></span> 
<span class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software</strong></del></span> <span 
class="inserted"><ins><em>id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store</strong></del></span> <span class="inserted"><ins><em>the switch 
to turn</em></ins></span> this <span class="removed"><del><strong>information, 
but if</strong></del></span> <span class="inserted"><ins><em>off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user 
watches,</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store</strong></del></span> <span class="inserted"><ins><em>switch to 
turn</em></ins></span> this <span class="removed"><del><strong>information, but 
if</strong></del></span> <span class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
+    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
+      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201212170"&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people who 
are watching TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div <span class="removed"><del><strong>class="big-section"&gt;
@@ -2163,27 +2153,24 @@
     &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
       even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span> <span class="inserted"><ins><em>speech 
recognition
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2194,9 +2181,9 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2207,18 +2194,19 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
-    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
-    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the US <span class="removed"><del><strong>or some other 
government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not to be trusted unless it is done
+    by free software in your own computer.&lt;/p&gt;
 
-      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
+      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span>
+    <span class="inserted"><ins><em>told Amazon to do this, or cease to sell 
the product in</em></ins></span> that <span class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
@@ -2247,22 +2235,28 @@
     &lt;p&gt;Today's technological practice does not include any way of making
     a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying
-    on you.  Even if</em></ins></span> it <span class="inserted"><ins><em>is 
air-gapped, it could be saving up records
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>what programs</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2276,12 +2270,10 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>sheeple to find</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2292,21 +2284,16 @@
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects</em></ins></span> to <span class="removed"><del><strong>stop 
this,</strong></del></span> <span class="inserted"><ins><em>an unidentified 
site in China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this is a back door,</em></ins></span> but <span 
class="removed"><del><strong>any product</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile,</strong></del></span> <span 
class="inserted"><ins><em>be a
+    &lt;p&gt;The article says this is a back door, but that could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
-    &lt;p&gt;An</em></ins></span> LG <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; watch is 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> to 
<span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmit conversations
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>report its location to someone else and to 
transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2322,52 +2309,69 @@
 <span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users</strong></del></span>
+&lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically, the app would record</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>choices</em></ins></span> of <span 
class="removed"><del><strong>the audio files
+users listen to along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the</strong></del></span> 
<span class="inserted"><ins><em>radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get</em></ins></span> users' <span 
class="removed"><del><strong>consent.
+If the fine print of</strong></del></span> <span 
class="inserted"><ins><em>consent, but it could have got that easily by
+    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>contract</em></ins></span> that users <span 
class="removed"><del><strong>gave consent</strong></del></span> <span 
class="inserted"><ins><em>sign</em></ins></span> for <span 
class="removed"><del><strong>this,
+would that make it acceptable? No way! It</strong></del></span> <span 
class="inserted"><ins><em>some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection</em></ins></span> 
should be <span class="removed"><del><strong>flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the 
<span class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>car's
+    hardware cannot collect any of that data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software</em></ins></span> are 
<span class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    &lt;p&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
     enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track the car's movements all</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
@@ -2770,7 +2774,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 17:58:26 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary-surveillance.it.po      25 Oct 2018 17:58:26 -0000      1.250
+++ proprietary-surveillance.it.po      26 Oct 2018 06:58:57 -0000      1.251
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3440,6 +3440,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-surveillance.ja-diff.html       25 Oct 2018 17:58:26 -0000      
1.89
+++ proprietary-surveillance.ja-diff.html       26 Oct 2018 06:58:57 -0000      
1.90
@@ -1302,159 +1302,82 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201611280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
+  &lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surveillance is inadequate as a protection 
against
     massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle:</strong></del></span>
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>privacy 
and security of
-    283 Android VPN apps concluded that &ldquo;in spite of</em></ins></span> 
the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>promises
-    for privacy, security, and anonymity given</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>poor security
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>infringe their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>do because 
the system has no authentication when
-    accessed through the modem.  However, even if</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>full access to users'
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
-      may turn them over</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>UK 
government if requested.&lt;/dd&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
-      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>JS 
injection</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
-      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>user's
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> this <span class="removed"><del><strong>article, is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
-      the non-premium version</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>the app does JavaScript injection for
-      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -1468,23 +1391,16 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>picture you take according to who 
is</em></ins></span>
-    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>be
-    sent across</em></ins></span> the <span class="removed"><del><strong>car's 
location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="inserted"><ins><em>service.&lt;/p&gt;
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -1498,104 +1414,53 @@
   &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of</em></ins></span> data <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,</em></ins></span>
-    it <span class="removed"><del><strong>over, the 
state</strong></del></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>alter them 
too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+  &lt;li id="M201601130"&gt;
     &lt;p&gt;Apps that include &lt;a
     
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>app's 
functionality,</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>report 
was</strong></del></span> <span class="inserted"><ins><em>article should not 
have described these apps</em></ins></span> as <span 
class="removed"><del><strong>of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>&ldquo;free&rdquo;&mdash;they</em></ins></span> are 
<span class="removed"><del><strong>totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV 
will</strong></del></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way
-    to</em></ins></span> say <span class="inserted"><ins><em>&ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span>
-    <span class="inserted"><ins><em>legitimate, but is that valid? Software 
developers have no right</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span>
-    <span class="inserted"><ins><em>analyze</em></ins></span> what
-      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+    unrelated to the app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>other TV manufacturers in spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>73%</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
  
-      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>47% of 
mobile applications, from Android and iOS
+  &lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>attitude 
of</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1609,31 +1474,24 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>not in fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds to be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This 
is</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>determine that they are 
nearby.</strong></del></span>
-    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
@@ -1837,8 +1695,7 @@
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
     on other devices in range so as to determine that they
-    are nearby.</em></ins></span>  Once your
-      <span class="removed"><del><strong>Internet 
devices</strong></del></span> <span class="inserted"><ins><em>Internet devices 
are paired with
+    are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
@@ -1918,10 +1775,9 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>paired with</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without</em></ins></span> your <span 
class="removed"><del><strong>TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>consent to tracking, the TV will not
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
@@ -1950,28 +1806,29 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and
-      <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>use its camera to watch the people who are watching 
TV.&lt;/p&gt;
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>camera is &lt;a
+  &lt;li id="M201511250"&gt;</em></ins></span>
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
@@ -1982,110 +1839,196 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was</em></ins></span> snooping <span 
class="removed"><del><strong>devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have 
checked</em></ins></span>
-    and <span class="inserted"><ins><em>changed.&lt;/p&gt;
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+    true, but</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
     customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.</strong></del></span> Nuance <span 
class="inserted"><ins><em>Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>save it and</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys with a mobile phone. 
This</em></ins></span> would <span class="removed"><del><strong>then have to
-      give it</strong></del></span> <span class="inserted"><ins><em>enable
-    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in 
many cases</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2094,58 +2037,77 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
-    and
-      <span class="removed"><del><strong>the switch to</strong></del></span> 
<span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
-    turn <span class="removed"><del><strong>this off has no effect.  (The fact 
that the
-      transmission reports</strong></del></span> <span 
class="inserted"><ins><em>it into</em></ins></span> a <span 
class="removed"><del><strong>404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>listening 
device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>server
-      could save</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>data anyway.)&lt;/p&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>country,
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would</em></ins></span> be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
+      range so</strong></del></span> <span class="inserted"><ins><em>much
+    easier for Amazon. And if some government such</em></ins></span> as <span 
class="inserted"><ins><em>China or the US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product 
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.  
Once your
+      Internet devices</strong></del></span> <span 
class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>probably 
hackers too, but please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that</em></ins></span> snoops on 
<span class="removed"><del><strong>other devices on</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gratis 
electronic toothbrush that snoops on its user by
+    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>stop this, 
but</strong></del></span> <span class="inserted"><ins><em>everyone in the 
house, all the time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>product</strong></del></span> <span 
class="inserted"><ins><em>way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in the house,</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users'</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
+    a device that can obey your</em></ins></span> voice <span 
class="inserted"><ins><em>commands without potentially spying</em></ins></span>
+    on <span class="inserted"><ins><em>you.  Even if it is air-gapped, it 
could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>what programs</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would then 
have</strong></del></span> <span class="inserted"><ins><em>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2159,10 +2121,11 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2173,35 +2136,64 @@
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    that connects</em></ins></span> to <span class="removed"><del><strong>the 
US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>not to</strong></del></span> <span 
class="inserted"><ins><em>a back door, but that could</em></ins></span> be 
<span class="removed"><del><strong>trusted unless</strong></del></span> <span 
class="inserted"><ins><em>a
+    misunderstanding.  However,</em></ins></span> it is <span 
class="removed"><del><strong>done
+    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;</strong></del></span>
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An</em></ins></span> LG &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span> <span class="inserted"><ins><em>watch is 
designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to report its location to someone else</em></ins></span> and
+      <span class="removed"><del><strong>the switch</strong></del></span> to 
<span class="removed"><del><strong>turn this off has no effect.  (The fact that 
the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>transmit 
conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
 
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span 
class="removed"><del><strong>server</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711230"&gt;
+    &lt;p&gt;GM did not get users' consent, but it</em></ins></span> could 
<span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>have got</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>easily by
+    sneaking</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>contract that users sign for some digital 
service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>stop this, 
but</strong></del></span> <span class="inserted"><ins><em>you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect</em></ins></span> any <span 
class="removed"><del><strong>product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
@@ -2217,10 +2209,22 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and make changes in various
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
     when accessed through the modem.  However, even if it asked
     for authentication, you couldn't be confident that Nissan
     has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
@@ -2630,7 +2634,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 17:58:26 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary-surveillance.ja.po      25 Oct 2018 17:58:26 -0000      1.223
+++ proprietary-surveillance.ja.po      26 Oct 2018 06:58:57 -0000      1.224
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -2914,6 +2914,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-surveillance.pot        25 Oct 2018 17:58:26 -0000      1.172
+++ proprietary-surveillance.pot        26 Oct 2018 06:58:57 -0000      1.173
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2107,6 +2107,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a "
 
"href=\"https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\";>
 "
 "track your every move</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- proprietary-surveillance.ru.po      25 Oct 2018 17:58:26 -0000      1.416
+++ proprietary-surveillance.ru.po      26 Oct 2018 06:58:57 -0000      1.417
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-05 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -3023,6 +3023,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
 "article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
 "your every move</a>."

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.de.po   22 Oct 2018 10:28:25 -0000      1.57
+++ proprietary.de.po   26 Oct 2018 06:58:57 -0000      1.58
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -98,9 +98,9 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
 # | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -108,8 +108,8 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -423,6 +423,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.es.po   22 Oct 2018 10:28:25 -0000      1.56
+++ proprietary.es.po   26 Oct 2018 06:58:57 -0000      1.57
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-09-19 10:49+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -92,9 +92,9 @@
 "de ser engañado."
 
 #. type: Content of: <p>
-# | As of [-September,-] {+October 22,+} 2018, the [-files-] {+pages+} in this
-# | directory list [-around 400-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-September,-] {+October 26,+} 2018, the [-files-] {+pages+} in this
+# | directory list [-around 400-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
 # | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -102,8 +102,8 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "Hasta septiembre de 2018, los archivos de este directorio ofrecían una lista 
"
@@ -436,6 +436,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.fr.po   22 Oct 2018 15:37:19 -0000      1.65
+++ proprietary.fr.po   26 Oct 2018 06:58:57 -0000      1.66
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-22 17:36+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -86,9 +87,18 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <p>
+# | As of October 2[-2-]{+6+}, 2018, the pages in this directory list [-339-]
+# | {+340+} instances of malicious functionalities (with 40[-3-]{+4+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "Le 22 octobre 2018, les pages de ce répertoire dénombraient 339 cas de "
@@ -290,6 +300,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary.it-diff.html    22 Oct 2018 10:28:25 -0000      1.15
+++ proprietary.it-diff.html    26 Oct 2018 06:58:57 -0000      1.16
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -43,12 +43,12 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em;</em></ins></span> }
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -81,8 +81,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 26, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 404 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -154,10 +154,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -179,6 +179,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -292,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.it.po   22 Oct 2018 10:28:25 -0000      1.66
+++ proprietary.it.po   26 Oct 2018 06:58:57 -0000      1.67
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -94,9 +94,9 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
 # | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -104,8 +104,8 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -427,6 +427,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary.ja-diff.html    22 Oct 2018 10:28:25 -0000      1.17
+++ proprietary.ja-diff.html    26 Oct 2018 06:58:57 -0000      1.18
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -77,8 +77,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 260</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
+&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 26, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 260</strong></del></span> <span 
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 404 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -176,6 +176,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -289,7 +307,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.ja.po   22 Oct 2018 10:28:25 -0000      1.49
+++ proprietary.ja.po   26 Oct 2018 06:58:57 -0000      1.50
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -95,8 +95,8 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
@@ -349,6 +349,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary.nl-diff.html    22 Oct 2018 10:28:25 -0000      1.15
+++ proprietary.nl-diff.html    26 Oct 2018 06:58:57 -0000      1.16
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -43,12 +43,12 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em;</em></ins></span> }
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -81,8 +81,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 26, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 404 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -179,6 +179,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -292,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.nl.po   22 Oct 2018 10:28:26 -0000      1.39
+++ proprietary.nl.po   26 Oct 2018 06:58:57 -0000      1.40
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -96,9 +96,9 @@
 "je meestal belazerd."
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
 # | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -106,8 +106,8 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
@@ -420,6 +420,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary.pl-diff.html    22 Oct 2018 10:28:26 -0000      1.33
+++ proprietary.pl-diff.html    26 Oct 2018 06:58:57 -0000      1.34
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -85,8 +85,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October 22, 2018, the pages in this directory 
list 339
-instances of malicious functionalities (with 403 references to
+&lt;p&gt;As of October 26, 2018, the pages in this directory list 340
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with 404 references 
to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -124,15 +124,15 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -153,10 +153,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -177,6 +177,24 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -290,7 +308,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/22 10:28:26 $
+$Date: 2018/10/26 06:58:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary.pl.po   22 Oct 2018 10:28:26 -0000      1.34
+++ proprietary.pl.po   26 Oct 2018 06:58:57 -0000      1.35
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -135,8 +135,8 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 
@@ -501,6 +501,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.pot     22 Oct 2018 10:28:26 -0000      1.31
+++ proprietary.pot     26 Oct 2018 06:58:57 -0000      1.32
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,8 +70,8 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 
@@ -241,6 +241,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.pt-br.po        22 Oct 2018 16:58:56 -0000      1.16
+++ proprietary.pt-br.po        26 Oct 2018 06:58:57 -0000      1.17
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-22 13:22-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -84,9 +85,14 @@
 "de ser mal."
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "Desde 22 de Outubro de 2018, as páginas neste diretório listam quase 339 "
@@ -288,6 +294,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.ru.po   22 Oct 2018 15:58:35 -0000      1.85
+++ proprietary.ru.po   26 Oct 2018 06:58:57 -0000      1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-10-22 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,9 +89,18 @@
 "способ дать себя одурачить."
 
 #. type: Content of: <p>
+# | As of October 2[-2-]{+6+}, 2018, the pages in this directory list [-339-]
+# | {+340+} instances of malicious functionalities (with 40[-3-]{+4+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "На октябрь 2018&nbsp;года на страницах этого 
каталога перечислено 339 "
@@ -294,6 +304,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary.zh-tw.po        22 Oct 2018 10:28:26 -0000      1.17
+++ proprietary.zh-tw.po        26 Oct 2018 06:58:57 -0000      1.18
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -92,8 +92,8 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
 "are surely thousands more we don't know about."
 msgstr ""
 "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對還"
@@ -338,6 +338,33 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
+"tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="



reply via email to

[Prev in Thread] Current Thread [Next in Thread]