www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-surveillance.de.htm...


From: GNUN
Subject: www/proprietary proprietary-surveillance.de.htm...
Date: Fri, 26 Oct 2018 21:58:21 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/26 21:58:21

Modified files:
        proprietary    : proprietary-surveillance.de.html 
        proprietary/po : proprietary-surveillance.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-surveillance.de.html    27 Jul 2018 03:01:21 -0000      1.36
+++ proprietary-surveillance.de.html    27 Oct 2018 01:58:21 -0000      1.37
@@ -3,7 +3,7 @@
  https://www.gnu.org/proprietary/po/proprietary-surveillance.de.po</a>'
  --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-surveillance.html"
  --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-surveillance.de-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2018-05-19" -->
+ --><!--#set var="OUTDATED_SINCE" value="2018-08-28" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -2007,7 +2007,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/07/27 03:01:21 $
+$Date: 2018/10/27 01:58:21 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-surveillance.de-diff.html    2 Aug 2018 07:32:59 -0000       
1.11
+++ po/proprietary-surveillance.de-diff.html    27 Oct 2018 01:58:21 -0000      
1.12
@@ -19,13 +19,14 @@
 }
 #surveillance div.toc {
    width: 24.5em; max-width: 94%;
-   margin-bottom: 1em;
+   <span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>margin: 1em 0;</em></ins></span>
 }
 @media (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
-      margin: .2em 0 1em;
+      margin: <span class="removed"><del><strong>.2em</strong></del></span> 
<span class="inserted"><ins><em>1.2em</em></ins></span> 0 1em;
    }
    #surveillance .medium {
       width: 43%;
@@ -39,26 +40,43 @@
 
 &lt;h2&gt;Proprietary Surveillance&lt;/h2&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="/proprietary/proprietary.html"&gt;
+   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="comment"&gt;</em></ins></span>
 &lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
-basic injustice&lt;/a&gt;. The developers often exercise that power to the
-detriment of the users they ought to serve.&lt;/p&gt;
+basic injustice&lt;/a&gt;. The developers <span class="inserted"><ins><em>and 
manufacturers</em></ins></span> often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;div  class="announcement"&gt;
+&lt;p&gt;This document attempts</strong></del></span>
 
-&lt;div  class="announcement"&gt;
-&lt;p&gt;This document attempts to
-track &lt;strong&gt;clearly established cases of proprietary software that
-spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;One common form of mistreatment 
is</em></ins></span> to
+<span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>snoop on the user.  This page
+records</em></ins></span> &lt;strong&gt;clearly established cases of 
proprietary software that
+spies on or tracks <span 
class="removed"><del><strong>users&lt;/strong&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
-   Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+   Other examples</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/strong&gt;.  Manufacturers even refuse
+to &lt;a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"&gt;say
+whether they snoop on users for the state&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;All appliances and applications that are tethered to a specific
+server are snoopers by nature.  We do not list them in this page
+because they have their own
+page: &lt;a href="/proprietary/proprietary-tethers.html"&gt;Proprietary
+Tethers&lt;/a&gt;.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+&lt;div class="important" style="margin-bottom: 2em"&gt;
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>proprietary 
malware&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;</em></ins></span>
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;div id="surveillance"&gt;
@@ -70,65 +88,72 @@
 &lt;/div&gt;
 
 &lt;div class="toc"&gt;
-  &lt;h3 id="TableOfContents"&gt;Table of Contents&lt;/h3&gt;
-  &lt;ul&gt;
+&lt;h3 id="TableOfContents"&gt;Table of Contents&lt;/h3&gt;
+&lt;ul&gt;
     &lt;li&gt;&lt;a href="#Introduction"&gt;Introduction&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#OSSpyware"&gt;Spyware in Operating Systems&lt;/a&gt;
+  &lt;li&gt;&lt;a href="#OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and Desktops&lt;/a&gt;</em></ins></span>
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInWindows"&gt;Spyware in 
Windows&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInMacOS"&gt;Spyware in 
MacOS&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInAndroid"&gt;Spyware in 
Android&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInWindows"&gt;Spyware in 
Windows&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInWindows"&gt;Windows&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMacOS"&gt;Spyware in 
MacOS&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMacOS"&gt;MacOS&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;Spyware in 
Android&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInBIOS"&gt;BIOS&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/a&gt;
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareIniThings"&gt;Spyware in 
iThings&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;Spyware in 
iThings&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTelephones"&gt;All 
&ldquo;Smart&rdquo; Phones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;Android 
Telephones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareOnSmartWatches"&gt;Spyware on Smart 
Watches&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/a&gt;
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnSmartWatches"&gt;Spyware on Smart 
Watches&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="#SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;Spyware in 
Applications&lt;/a&gt;</em></ins></span>
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
-      &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
+      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareOnTheRoad"&gt;Spyware on the Road&lt;/a&gt;
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;TV 
Sets&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtHome"&gt;Spyware at Home&lt;/a&gt;
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;Spyware at 
Home&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;</em></ins></span>
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInTVSets"&gt;Spyware in TV 
Sets&lt;/a&gt;&lt;/li&gt;
+          &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;Spyware in TV 
Sets&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; 
Watches&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareInRecreation"&gt;Spyware in 
Recreation&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;Vehicles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInRecreation"&gt;Spyware in 
Recreation&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInVR"&gt;Virtual 
Reality&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the Web&lt;/a&gt;
       &lt;ul&gt;
-        &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in JavaScript and 
Flash&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;Chrome&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;Spyware in JavaScript 
and Flash&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;JavaScript&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareInFlash"&gt;Flash&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareInDrones"&gt;Spyware in 
Drones&lt;/a&gt;&lt;/li&gt; 
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInDrones"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;Spyware</em></ins></span>
 in <span class="removed"><del><strong>Drones&lt;/a&gt;&lt;/li&gt; 
     &lt;li&gt;&lt;a href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt; 
-    &lt;li&gt;&lt;a href="#SpywareInVR"&gt;Spyware In VR&lt;/a&gt;&lt;/li&gt;
-  &lt;/ul&gt;
+    &lt;li&gt;&lt;a href="#SpywareInVR"&gt;Spyware In 
VR&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>Networks&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;/ul&gt;
 &lt;/div&gt;
 
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;!-- #Introduction --&gt;
+<span class="removed"><del><strong>&lt;!-- #Introduction 
--&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="Introduction"&gt;Introduction&lt;/h3&gt;
@@ -149,7 +174,9 @@
 keyboard, in the mobile computing industry, in the office, at home, in
 transportation systems, and in the classroom.&lt;/p&gt;
 
-&lt;h3 id="AggregateInfoCollection"&gt;Aggregate or anonymized data&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h4</em></ins></span> 
id="AggregateInfoCollection"&gt;Aggregate or anonymized <span 
class="removed"><del><strong>data&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/h4&gt;</em></ins></span>
 
 &lt;p&gt;Many companies, in their privacy policy, have a clause that claims
 they share aggregate, non-personally identifiable information with
@@ -171,85 +198,153 @@
 they will &lt;em&gt;do&lt;/em&gt; with the data they collect. The wrong is that
 they collect it at all.&lt;/p&gt;
 
-&lt;h3 id="LatestAdditions"&gt;Latest additions&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h4</em></ins></span> 
id="LatestAdditions"&gt;Latest <span 
class="removed"><del><strong>additions&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>additions&lt;/h4&gt;</em></ins></span>
 
 &lt;p&gt;Latest additions are found on top under each category.&lt;/p&gt;
 
-&lt;!-- #OSSpyware --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+<span class="removed"><del><strong>&lt;!-- #OSSpyware --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="OSSpyware"&gt;Spyware in Operating Systems&lt;/h3&gt;
+  &lt;h3 id="OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and 
Desktops&lt;/h3&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#OSSpyware"&gt;#OSSpyware&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInWindows"&gt;Spyware in Windows&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInWindows"&gt;Spyware 
in Windows&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInWindows"&gt;Windows&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInWindows"&gt;#SpywareInWindows&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Windows 10 telemetry program sends information to 
Microsoft about the
-      user's computer and their use of the computer.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
-    &lt;p&gt;Furthermore, for users who installed the fourth stable build of
-      Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized 
the
-      surveillance&lt;a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201712110"&gt;
+    &lt;p&gt;HP's proprietary operating system &lt;a
+    href="http://www.bbc.com/news/technology-42309371"&gt;includes a
+    proprietary keyboard driver with a key logger in it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710134"&gt;
+    &lt;p&gt;Windows</em></ins></span> 10 telemetry program sends information 
to Microsoft about
+    the user's computer and their use of the computer.&lt;/p&gt;
+
+    &lt;p&gt;Furthermore, for users who installed the
+    fourth stable build of Windows 10, called the
+    &ldquo;Creators Update,&rdquo; Windows maximized the
+      <span 
class="removed"><del><strong>surveillance&lt;a</strong></del></span> <span 
class="inserted"><ins><em>surveillance &lt;a</em></ins></span>
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
       by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;The &lt;a
+    &lt;p&gt;The &lt;a
 <span 
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;</em></ins></span>
  &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
- engineers to access, among other things, registry keys
- &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+    engineers to access, among other things, registry keys &lt;a
+    href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
  can contain sensitive information like administrator's login
- password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+ <span class="removed"><del><strong>password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Windows DRM
-  files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
-  be used to identify people browsing through Tor&lt;/a&gt;. The
-  vulnerability exists only if you use Windows.
+  &lt;li&gt;&lt;p&gt;Windows DRM</strong></del></span>
+    <span class="inserted"><ins><em>password&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702020"&gt;
+    &lt;p&gt;DRM-restricted</em></ins></span> files <span 
class="removed"><del><strong>&lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
 <span class="inserted"><ins><em>can</em></ins></span> be used to <span 
class="inserted"><ins><em>&lt;a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;</em></ins></span>
+    identify people browsing through Tor&lt;/a&gt;. The vulnerability exists
+    only if you use <span class="removed"><del><strong>Windows.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
-      debugging information to Microsoft, including core dumps&lt;/a&gt;. 
Microsoft now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;By</strong></del></span> <span 
class="inserted"><ins><em>Windows.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;In order to increase Windows 10's install base, Microsoft
-&lt;a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.
-&lt;/li&gt;
+  &lt;li id="M201611240"&gt;
+    &lt;p&gt;By</em></ins></span> default, Windows 10 &lt;a
+    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+    debugging information to Microsoft, including core dumps&lt;/a&gt;. 
Microsoft
+    now distributes them to another <span 
class="removed"><del><strong>company.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
-      Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all 
enabled by default,
-      and turning them off would be daunting to most 
users.&lt;/p&gt;&lt;/li&gt;
+&lt;li&gt;In</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201608171"&gt;
+    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+    blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603170"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
+    
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+    Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled
+    by default, and turning them off would be daunting to most <span 
class="removed"><del><strong>users.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
       Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;It appears
-      &lt;a 
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
+  &lt;li&gt;It</strong></del></span> <span 
class="inserted"><ins><em>users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601050"&gt;
+    &lt;p&gt;It</em></ins></span> appears &lt;a
+    
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
       Windows 10 sends data to Microsoft about what applications are 
-      running&lt;/a&gt;.&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;A downgrade to Windows 10 deleted surveillance-detection
+      <span class="removed"><del><strong>running&lt;/a&gt;.&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;A</strong></del></span>
+    <span class="inserted"><ins><em>running&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512280"&gt;
+    &lt;p&gt;Microsoft has &lt;a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+    backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511264"&gt;
+    &lt;p&gt;A</em></ins></span> downgrade to Windows 10 deleted 
surveillance-detection
       applications.  Then another downgrade inserted a general spying
-      program.  Users noticed this and complained, so Microsoft
-      renamed it
-      &lt;a 
href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+    program.  Users noticed this and complained, so Microsoft renamed it &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;</em></ins></span>
        to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
+
       &lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
   Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-  ships with default settings that show no regard for the
-  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
-  to snoop on the users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.&lt;/p&gt;&lt;/li&gt;
+  ships with default settings that show no regard</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+    Intel devices will be able to listen</em></ins></span> for <span 
class="inserted"><ins><em>speech all the time, even
+    when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508130"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507300"&gt;
+    &lt;p&gt;Windows 10 &lt;a
+    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    ships with default settings that show no regard for the privacy of
+    its users&lt;/a&gt;, giving Microsoft</em></ins></span> the
+  <span class="removed"><del><strong>privacy of its users&lt;/a&gt;, giving 
Microsoft the</strong></del></span> &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
   &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
@@ -257,163 +352,298 @@
   turns off its Bing search and Cortana features, and activates the
   privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;
-  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
-  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
-  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
+
+    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="inserted"><ins><em>look at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
+    on demand?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506170"&gt;
+    &lt;p&gt;Microsoft</em></ins></span> uses Windows 10's &ldquo;privacy 
policy&rdquo;
+    to overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption &lt;a
+    
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
   gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
-  as in other issues.&lt;/p&gt;
+    &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
+    other issues.&lt;/p&gt;
 
-  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on demand?&lt;/p&gt;
+    &lt;p&gt;We can suppose Microsoft look at users' files for the US 
government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicit
+    say so. Will it look at users' files for the Chinese government
+    on demand?&lt;/p&gt;
 
-  &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
-  track the browsing of each specific user.&lt;/p&gt;
+    &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables
+    other companies to track the browsing of each specific user.&lt;/p&gt;
 
   &lt;p&gt;It's as if Microsoft has deliberately chosen to make Windows 10
   maximally evil on every dimension; to make a grab for total power
-  over anyone that doesn't drop Windows now.&lt;/p&gt;&lt;/li&gt;
+    over anyone that doesn't drop Windows <span 
class="removed"><del><strong>now.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>now.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;It only gets worse with time.
-      &lt;a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"&gt;
+  &lt;li id="M201410040"&gt;
+    &lt;p&gt;It</em></ins></span> only gets worse with time.  &lt;a
+    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"&gt;
       Windows 10 requires users to give permission for total 
snooping&lt;/a&gt;,
       including their files, their commands, their text input, and their
       voice input.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
-      Windows 8.1 snoops on local searches.&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401150"&gt;
+    &lt;p id="baidu-ime"&gt;&lt;a
+    
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/"&gt;
+    Baidu's Japanese-input and Chinese-input apps spy on 
users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307080"&gt;
+    &lt;p&gt;Spyware in older versions of Windows: &lt;a
+    
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+    Windows Update snoops on the user&lt;/a&gt;. &lt;a
+    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
+    Windows 8.1 snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;And there's a
-      &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
-      secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;And</strong></del></span> <span 
class="inserted"><ins><em>searches&lt;/a&gt;. And</em></ins></span> there's a 
&lt;a
+    href="http://www.marketoracle.co.uk/Article40836.html"&gt; secret NSA
+    key in Windows&lt;/a&gt;, whose functions we don't know.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;HP's proprietary
+  <span class="removed"><del><strong>&lt;li&gt;HP's proprietary
   operating system &lt;a 
href="http://www.bbc.com/news/technology-42309371"&gt;includes
-  a proprietary keyboard driver with a key logger in it&lt;/a&gt;.&lt;/li&gt;
+  a proprietary keyboard driver with a key logger in 
it&lt;/a&gt;.&lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
+
 &lt;p&gt;Microsoft's snooping on users did not start with Windows 10.
    There's a lot more &lt;a href="/proprietary/malware-microsoft.html"&gt;
    Microsoft malware&lt;/a&gt;.&lt;/p&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMacOS"&gt;Spyware in MacOS&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInMacOS"&gt;Spyware in 
MacOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMacOS"&gt;MacOS&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMacOS"&gt;#SpywareInMacOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
       MacOS automatically sends to Apple servers unsaved documents being
-      edited&lt;/a&gt;. The &lt;a
-      
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
-      things you have not decided to save are even more sensitive than
-      the things you have stored in files&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+      edited&lt;/a&gt;. The</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Apple has made various
-      &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201809070"&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+      things you have not decided to save are even more sensitive 
than</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
+    the <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's browsing 
history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411040"&gt;
+    &lt;p&gt;Apple</em></ins></span> has made various &lt;a
+    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
       MacOS programs send files to Apple servers without asking
-      permission&lt;/a&gt;. This exposes the files to Big Brother and perhaps 
to
-      other snoops.&lt;/p&gt;
+    permission&lt;/a&gt;.  This exposes the files to Big Brother and perhaps
+    to other snoops.&lt;/p&gt;
 
       &lt;p&gt;It also demonstrates how you can't trust proprietary software,
-      because even if today's version doesn't have a malicious
-      functionality, tomorrow's version might add it. The developer won't
-      remove the malfeature unless many users push back hard, and the users
-      can't remove it themselves.&lt;/p&gt;
+    because even if today's version doesn't have a malicious functionality,
+    tomorrow's version might add it. The developer won't remove the
+    malfeature unless many users push back hard, and the users can't
+    remove it themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Various operations in
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
       &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
-      the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+      the latest</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
+    &lt;p&gt;</em></ins></span> MacOS <span class="removed"><del><strong>send 
reports</strong></del></span> <span class="inserted"><ins><em>automatically 
&lt;a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    sends</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple 
servers unsaved documents being edited&lt;/a&gt;. The
+    things you have not decided to save are &lt;a
+    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+    even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple admits the
-      &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-      spying in a search facility&lt;/a&gt;, but there's a lot
-      &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-      more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410220"&gt;
+    &lt;p&gt;Apple</em></ins></span> admits the &lt;a
+    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+    spying in a search facility&lt;/a&gt;, but there's a lot &lt;a
+    href="https://github.com/fix-macosx/yosemite-phone-home"&gt; more snooping
+    that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410200"&gt;
+    &lt;p&gt;Various operations in &lt;a
+    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+    the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401101"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
       Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;p&gt;There's a lot more &lt;a href="#SpywareIniThings"&gt;iThing 
spyware&lt;/a&gt;, and
 &lt;a href="/proprietary/malware-apple.html"&gt;Apple 
malware&lt;/a&gt;.&lt;/p&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Spyware in Android&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  <span class="inserted"><ins><em>&lt;span 
id="SpywareAtLowLevel"&gt;&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInAndroid"&gt;Spyware 
in Android&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;More
-    than &lt;a 
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to
-    snoop and collect information about its users&lt;/a&gt;.  40% of the
-    apps were found to insecurely snitch on its users.  Furthermore,
-    they could detect only some methods of snooping, in these
-    proprietary apps whose source code they cannot look at.  The other
-    apps might be snooping in other ways.&lt;/p&gt;
-
-  &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users need
-    to get rid of the proprietary software&mdash;both proprietary Android
-    by &lt;a href="https://replicant.us"&gt;switching to Replicant&lt;/a&gt;, 
and
-    the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;
-    that &lt;a href="https://f-droid.org/wiki/page/Antifeatures"&gt;
-    prominently warns the user if an app contains
-    anti-features&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;</em></ins></span>
   &lt;p&gt;20 dishonest Android apps
       recorded &lt;a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-      calls and sent them and text messages and emails to
+      calls and sent them and text messages</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201509220"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps
+  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;All &ldquo;Smart&rdquo; Phones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201601110"&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>contrary, it
+    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510050"&gt;
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    smartphones&lt;/a&gt; by sending hidden text messages which enable
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
     after discovering what they did. So we cannot blame Google
-    specifically for the snooping of these apps.&lt;/p&gt;
+    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
 
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their
-    being nonfree. It also distributes its own nonfree apps, such as
+  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
+    text messages, read call, location</em></ins></span> and
+    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
+    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
+    from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311120"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>injustice of their
+    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
     Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Could Google have done a better job of preventing apps from
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps from
     cheating?  There is no systematic way for Google, or Android
     users, to inspect executable proprietary apps to see what they
     do.&lt;/p&gt;
 
-  &lt;p&gt;Google could demand the source code for these apps, and study the
-    source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps,</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>study the
+    source code somehow to determine whether they 
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+    various ways. If it did a good job of this,</strong></del></span> <span 
class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable phones
+    to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
 
   &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    Google</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>protect us. We must demand release 
of source code</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span class="inserted"><ins><em>phone is 
snooping</em></ins></span> on <span class="removed"><del><strong>each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
       research paper&lt;/a&gt; that investigated the privacy and security
     of 283 Android VPN apps concluded that &ldquo;in spite of the
     promises for privacy, security, and anonymity given by the
@@ -422,95 +652,193 @@
     VPN apps.&rdquo;&lt;/p&gt;
 
   &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
-    the research paper that tracks and infringes the privacy of
-    users:&lt;/p&gt;
+    the research paper that tracks and infringes the 
privacy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
 
   &lt;dl&gt;
     &lt;dt&gt;SurfEasy&lt;/dt&gt;
     &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+      meant</strong></del></span> <span class="inserted"><ins><em>personal 
data</em></ins></span> to <span class="removed"><del><strong>track users and 
show</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers&lt;/a&gt;.  Big Brother can get</em></ins></span>
+    them <span class="removed"><del><strong>targeted ads.&lt;/dd&gt;
 
     &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
     &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to
-      users' text messages.&lt;/dd&gt;
+      permissions upon installation, meaning it has full 
access</strong></del></span> <span class="inserted"><ins><em>from 
there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to
+      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
 
     &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>also core system logs. TigerVPN 
developers
       have confirmed this.&lt;/dd&gt;
 
     &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
-      and may turn them over to the UK government if
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it</strong></del></span> <span 
class="inserted"><ins><em>videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library</em></ins></span> stores 
<span class="removed"><del><strong>detailed logs</strong></del></span> <span 
class="inserted"><ins><em>every photo</em></ins></span> and <span 
class="removed"><del><strong>may turn</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take, and keeps</em></ins></span> them <span 
class="removed"><del><strong>over to the UK government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display
-      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="inserted"><ins><em>date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</em></ins></span> is <span class="inserted"><ins><em>a 
way</em></ins></span> to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>redirects the
       user's traffic through valueclick.com (an advertising
       website).&lt;/dd&gt;
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
     &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers of this app have
+      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
this <span class="removed"><del><strong>app have
       confirmed that the non-premium version of the app does
       JavaScript injection for tracking and display ads.&lt;/dd&gt;
   &lt;/dl&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
top-ranked gratis
   proprietary Android apps contained recognizable tracking libraries. For 
   the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  &lt;p&gt;The article confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
   It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
   for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
   &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
        to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+       &lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+    get other info too.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201312300"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
+    is <span class="removed"><del><strong>not enough
 to legitimize actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
 what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
+and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>can be
+    turned off.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
+    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>receiving 
the verification code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;</em></ins></span>
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
@@ -520,63 +848,116 @@
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
-
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted that the usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
+    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI 
can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="inserted"><ins><em>present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app</em></ins></span> developers 
<span class="removed"><del><strong>have no right</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to
+  <span class="removed"><del><strong>analyze what</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most</em></ins></span> users <span class="removed"><del><strong>are 
doing or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>have stopped
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>spell out what
+    they</em></ins></span> are
+  <span class="removed"><del><strong>just as wrong as any other 
snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span>
+    <span class="inserted"><ins><em>honestly identify</em></ins></span> the 
<span class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
+    hiding it</em></ins></span> in <span class="removed"><del><strong>some 
Android devices when they are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google
+    and other companies from getting this</em></ins></span> personal <span 
class="removed"><del><strong>data to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>information in the
+    first place!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;!-- #SpywareOnMobiles --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span <span 
class="removed"><del><strong>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
@@ -597,95 +978,186 @@
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span> <span 
class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
-        days.&lt;/p&gt;
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send</em></ins></span> lots of <span 
class="removed"><del><strong>personal</strong></del></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
-      (necessary</em></ins></span> to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
+    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
+    kinds of surveillance in</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-      &lt;a class="not-a-duplicate" 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report</em></ins></span> even <span class="removed"><del><strong>gratis 
apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>which page</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+       behavioral and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
+    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>photos and
       videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and <span class="removed"><del><strong>keeps them 
up to date on all your devices.
       Any edits you make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
       information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>listens 
through</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any of them through
+    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no</em></ins></span> way to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android 
apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>iThings:
       the &lt;a class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
        iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;
+      and get</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
+    source code they cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>also 
a feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need</em></ins></span> to <span class="removed"><del><strong>track users, 
which is
       &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
+      enabled</strong></del></span> <span class="inserted"><ins><em>get rid of 
the proprietary software&mdash;both proprietary
+    Android</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
       is still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps</em></ins></span> by <span 
class="removed"><del><strong>default, though</strong></del></span> <span 
class="inserted"><ins><em>getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not to</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the data in an iThing,
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy</em></ins></span> on <span class="removed"><del><strong>all the data 
in an iThing,
       or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
       Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+      possible purpose other</strong></del></span> <span 
class="inserted"><ins><em>users even more</em></ins></span> than <span 
class="removed"><del><strong>surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>users expected. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -694,67 +1166,125 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking</em></ins></span> software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
       follow a user's movements around a physical store by noticing WiFi
       networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
       even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+      when the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all</em></ins></span> phone <span class="removed"><del><strong>has 
no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+      sold with spyware sending lots of data</strong></del></span> <span 
class="inserted"><ins><em>numbers and email addresses&lt;/a&gt; in user's 
address
+    book</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>zero 
price.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the phones
-      on and off, listen to the microphone, retrieve geo-location data from the
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and</em></ins></span> text messages <span 
class="removed"><del><strong>which enable them</strong></del></span> <span 
class="inserted"><ins><em>and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>turn the phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="inserted"><ins><em>see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
       GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read the contact list. This malware is designed to
-      disguise itself from investigation.&lt;/p&gt;
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Samsung phones come with
       &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
+      and</strong></del></span> <span class="inserted"><ins><em>determine 
whether</em></ins></span> they <span class="removed"><del><strong>send so much 
data that their transmission is</strong></del></span> <span 
class="inserted"><ins><em>mistreat users in
+    various ways. If it did</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted</strong></del></span> <span 
class="inserted"><ins><em>good job of this, it could more</em></ins></span> or
+      <span class="removed"><del><strong>requested by</strong></del></span> 
<span class="inserted"><ins><em>less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>user, clearly</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We</em></ins></span> must <span 
class="removed"><del><strong>constitute spying</strong></del></span> <span 
class="inserted"><ins><em>demand release</em></ins></span> of <span 
class="removed"><del><strong>some
       kind.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A Motorola phone
       &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>source code to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
       Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS and microphone in Android
+      reports that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    on users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
+
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone in Android
       phones and laptops&lt;/a&gt;.
       (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict
-      the use of data on the user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track</em></ins></span> users 
<span class="removed"><del><strong>cannot stop them:</strong></del></span> 
<span class="inserted"><ins><em>by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to <span class="removed"><del><strong>have 
GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by 
TV
+    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>restrict
+      the use</strong></del></span> <span class="inserted"><ins><em>do 
lots</em></ins></span> of <span class="removed"><del><strong>data on the user's 
computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>surveillance, 
judging by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>demands</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>personal data in</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -763,34 +1293,15 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Spanish football 
streaming app
-      &lt;a 
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-        the user's movements and listens through the
-        microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to
-      save a recording. But I can't be sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit
-      in many ways. This is one more.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each other
-    but not to the server's database.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-
   &lt;li&gt;
     &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going to a movie&lt;/a&gt;.
+      expected. It</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
     &lt;/p&gt;
 
     &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
@@ -801,234 +1312,497 @@
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> app 
+      <span class="removed"><del><strong>&lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
       uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note that this article misuses the words
+      book</strong></del></span> <span class="inserted"><ins><em>for its 
headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note</strong></del></span>
+    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that this <span 
class="removed"><del><strong>article misuses</strong></del></span> <span 
class="inserted"><ins><em>was done without</em></ins></span> the <span 
class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
       referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening to or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If</em></ins></span> the <span class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>fine print of 
the app said that users gave consent for this,
+    would that make</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should</em></ins></span> be 
<span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>flat out 
&lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app</em></ins></span> to <span class="removed"><del><strong>serve them 
with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
        &lt;/li&gt;
 
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+    to <span class="inserted"><ins><em>transmit users'</em></ins></span> 
personal data <span class="removed"><del><strong>in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to servers. &lt;a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;</em></ins></span>
+    &lt;p&gt;Verizon &lt;a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
+    its search engine.&lt;/p&gt;
+
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    explicitly opt-in before the <span class="removed"><del><strong>app takes 
effect. However,</strong></del></span> <span class="inserted"><ins><em>app 
takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+  &lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611160"&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to users'
+      text messages.&lt;/dd&gt;
+
+      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers have
+      confirmed this.&lt;/dd&gt;
+
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to the UK government if requested.&lt;/dd&gt;
+
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned to the
+      users. The stated purpose</em></ins></span> of <span 
class="removed"><del><strong>spyware</strong></del></span> <span 
class="inserted"><ins><em>the JS injection</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  user data</strong></del></span> to <span class="removed"><del><strong>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
   can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone, and in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers of this</em></ins></span> app <span 
class="removed"><del><strong>tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>have confirmed that</em></ins></span>
+      the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection</em></ins></span> for 
<span class="removed"><del><strong>surveillance is inadequate as a protection 
against massive
+        surveillance.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's</em></ins></span> new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
       Symphony surveillance software snoop on what radio and TV programs 
       are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take according to who
-      is in the frame.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Facebook's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's</em></ins></span> new Magic Photo app &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;</em></ins></span>
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
       &lt;p&gt;This spyware feature seems to require online access to some
       known-faces database, which means the pictures are likely to be
       sent across the wire to Facebook's servers and face-recognition
       algorithms.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example of
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping).</strong></del></span> <span 
class="inserted"><ins><em>what people are listening to or 
watching&lt;/a&gt;.</em></ins></span> In <span 
class="removed"><del><strong>August
+      2015</strong></del></span> <span class="inserted"><ins><em>addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server 
accounts,</em></ins></span>
+    it <span class="inserted"><ins><em>can alter them too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>TV programs</em></ins></span>
+    are <span class="removed"><del><strong>starting</strong></del></span> 
<span class="inserted"><ins><em>playing nearby&lt;/a&gt;.  Also on what users 
post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>realize 
that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> the <span 
class="inserted"><ins><em>app's functionality, was</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not have described these 
apps</em></ins></span> as <span 
class="removed"><del><strong>a</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;free&rdquo;&mdash;they are not free 
software.  The clear</em></ins></span> way
+    to <span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>say &ldquo;zero price&rdquo;</em></ins></span> is 
<span class="removed"><del><strong>a typical example of
       the attitude of the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>granted 
that</em></ins></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>usual analytics tools are
+    legitimate, but</em></ins></span> is <span class="inserted"><ins><em>that 
valid? Software developers have no right to
+    analyze what users are</em></ins></span> doing <span 
class="removed"><del><strong>this in a way</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; 
tools</em></ins></span>
+    that <span class="removed"><del><strong>at least is visible and
+    optional&lt;/a&gt;. Not</strong></del></span> <span 
class="inserted"><ins><em>snoop are just</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> as <span 
class="removed"><del><strong>what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says 
most</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and 47% of</em></ins></span> mobile <span 
class="removed"><del><strong>apps for children don't respect privacy:
       &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>applications, from Android and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
       QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the OS in the
+      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt;</em></ins></span> of 
<span class="removed"><del><strong>whether the app developers 
get</strong></del></span> <span 
class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>with
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
       &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
       sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending personal data to the app developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
+      &lt;p&gt;The FTC criticized this app because</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 
2015</em></ins></span> it <span class="removed"><del><strong>asked the 
user</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;, and some are starting</em></ins></span>
+    to <span class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>realize that</em></ins></span> it <span 
class="inserted"><ins><em>is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the &lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want 
that.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>is a
+    typical example of</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>attitude</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>industry
+    towards those they have subjugated.&lt;/p&gt;
+
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
+    study</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt;</em></ins></span> found <span 
class="removed"><del><strong>to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>that 
90%</em></ins></span> of the <span class="removed"><del><strong>conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>top-ranked 
gratis proprietary
+    Android apps contained recognizable tracking libraries. For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Those toys</strong></del></span> <span 
class="inserted"><ins><em>fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  
It</em></ins></span> also <span class="removed"><del><strong>contain major 
security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers</strong></del></span>
+    <span class="inserted"><ins><em>ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech,</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>even speak
+      into</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the 
<span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This is in addition 
to</em></ins></span>
+    the <span class="removed"><del><strong>temperature 
of</strong></del></span> <span class="inserted"><ins><em>snooping done 
by</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute</strong></del></span> <span class="inserted"><ins><em>phone company, and 
perhaps</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, whether it 
was surrounded</strong></del></span> <span class="inserted"><ins><em>the OS in
+    the phone.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Don't be distracted</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>question of whether</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
+      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>app developers
+    get</em></ins></span> users <span class="removed"><del><strong>could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;
+  &lt;/li&gt;
     
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the data to a
-      data broker, the data broker would have been able to figure out
-      who the user was.&lt;/p&gt;
+  &lt;li id="M201411260"&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>user has installed.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401151"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version</em></ins></span> of 
<span class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>company's statement that 
it was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>nonfree Snapchat app's principal purpose is to 
restrict</em></ins></span> the
+    <span class="inserted"><ins><em>use of</em></ins></span> data <span 
class="removed"><del><strong>may be
+      true,</strong></del></span> <span class="inserted"><ins><em>on the 
user's computer,</em></ins></span> but it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>asked</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span>
+    <span class="inserted"><ins><em>approve sending personal</em></ins></span> 
data <span class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>data broker would have been 
able</strong></del></span> <span class="inserted"><ins><em>app developer but 
did not ask
+    about sending it</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>other 
companies.  This shows</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>weakness of</em></ins></span>
+    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span>
+    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>flashlight 
app send any information</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
-      <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-      leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-      <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-      Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
-      manufacturer's snooping.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201307110"&gt;
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201806240"&gt;
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>a spyware that
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804144"&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild War 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on</em></ins></span> its <span 
class="removed"><del><strong>location</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711070"&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512290"&gt;
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users</em></ins></span> and <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="removed"><del><strong>transmit
        conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that could be a
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>the
+    internet&lt;/a&gt;&mdash;even what their users 
weigh.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;A <span class="removed"><del><strong>very cheap &ldquo;smart 
watch&rdquo; comes</strong></del></span> <span class="inserted"><ins><em>game 
console is a computer, and you can't trust a computer</em></ins></span> with 
<span class="removed"><del><strong>an Android app</strong></del></span>
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="removed"><del><strong>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says</strong></del></span> <span 
class="inserted"><ins><em>merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.&lt;/p&gt;
+
+    &lt;p&gt;They use</em></ins></span> this <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>data to manipulate people to buy things, and hunt for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use</em></ins></span> a back <span class="removed"><del><strong>door, 
but</strong></del></span> <span class="inserted"><ins><em>door to manipulate 
the game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games</em></ins></span> 
that <span class="removed"><del><strong>could be a
       misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cost money
+    can use the same tactics.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
@@ -1046,10 +1820,14 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
@@ -1057,78 +1835,168 @@
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more spyware apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
   this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware 
running</em></ins></span>
+    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is a surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as 
to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>communicate</strong></del></span> <span 
class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="removed"><del><strong>it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>Web activity, and other</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact
-      that the device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>the fact</strong></del></span> <span 
class="inserted"><ins><em>their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>the device</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
+    across devices.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that the device gives the company
-      surveillance capability.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>turn 
this off, but having</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+  &lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the company
+    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are</em></ins></span> watching&lt;/a&gt;, <span 
class="removed"><del><strong>even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
@@ -1141,20 +2009,26 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    and</strong></del></span> <span class="inserted"><ins><em>even if it isn't 
a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
+    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
       Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+      they report</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch, and</em></ins></span> even <span 
class="removed"><del><strong>which page the user reads at</strong></del></span> 
what <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;
+      needed</strong></del></span> <span class="inserted"><ins><em>they 
wanted</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1166,72 +2040,146 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf has a built-in cell 
phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed through the modem.  However, even if it asked for
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
     authentication, you couldn't be confident that Nissan has no
     access.  The software in the car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    means</strong></del></span> <span class="inserted"><ins><em>and would then 
have to give</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time;</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span class="removed"><del><strong>possible to 
physically remove</strong></del></span> <span class="inserted"><ins><em>done by 
free
+    software in your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track the car's movements all
-    the time; it is possible to physically remove the cell phone modem
-    though.&lt;/p&gt;
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the <span class="removed"><del><strong>cell 
phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
       which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+      others.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>report was as</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect</em></ins></span> this <span class="removed"><del><strong>article, is not
+      really a matter of proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>has got
+    better.&lt;/p&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>an
       intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine the car's location at any time. (See
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned</strong></del></span> <span class="inserted"><ins><em>TV 
will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>turn 
this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if the state orders it to get the data
-      and hand it over, the state can store it.&lt;/p&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>transmission reports 
a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people who 
are watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;A medical insurance
-        company &lt;a 
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-        offers a gratis electronic toothbrush that snoops on its user
-        by sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Lots</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
-        designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>&ldquo;smart&rdquo; products are
+        designed</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>everyone in the house, all</strong></del></span> 
<span class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of
     making a device that can obey your voice commands without
-    potentially spying on you.  Even if it is air-gapped, it could be
+    potentially spying on you.  Even if</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span 
class="removed"><del><strong>air-gapped,</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> it <span 
class="removed"><del><strong>could be
     saving up records about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1241,186 +2189,379 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; 
TVs
-      automatically &lt;a 
href="https://news.ycombinator.com/item?id=16727319"&gt;load
-      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. It is too bad
-      that the article finishes by advocating the moral weakness of
-      surrendering to Netflix. The Netflix
-      app &lt;a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-      malware too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-
   &lt;li&gt;
     &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    &ldquo;smart&rdquo;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts
     and cable&lt;/a&gt;. Even if the image is coming from the user's own
     computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+    disable</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span class="inserted"><ins><em>product as shipped 
doesn't act</em></ins></span> as <span class="inserted"><ins><em>a
+    listening device, remote changes to the code could surely 
convert</em></ins></span> it
+    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
       consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
+      And what happens if a user declines consent?  
Probably</strong></del></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate proposed 
response:</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV</strong></del></span> <span class="inserted"><ins><em>labeling
+    standard with which</em></ins></span> manufacturers <span 
class="removed"><del><strong>in spying on 
+      their users:</strong></del></span> <span class="inserted"><ins><em>would 
make statements about</em></ins></span> their <span 
class="removed"><del><strong>&lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked</em></ins></span>
+    and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>changed.&lt;/p&gt;
+
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>figure out who the
+    user was.&lt;/p&gt;
+
+    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
       monitors. Tivo customers are unaware they're being watched by
       advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other devices in
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
       range so as to determine that they are nearby.  Once your
       Internet devices are paired with your TV, advertisers can
       correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
+    company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all the time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
-      give it to the US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless it is done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be transmitted to
-      third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
-      the switch to turn this off has no effect.  (The fact that the
-      transmission reports a 404 error really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
+    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
+    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be 
transmitted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>third 
parties&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
       &lt;p&gt;Even worse, it
       &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
+      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, but any product
       could spy this way.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareInGames --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareInGames 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
+
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;ArenaNet surreptitiously 
installed a spyware program along with an
-      update to the massive multiplayer game Guild War 2.  The spyware
-      allowed ArenaNet &lt;a 
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-      to snoop on all open processes running on its user's
-      computer&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201807260"&gt;
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects</em></ins></span> to <span class="inserted"><ins><em>an 
unidentified site in</em></ins></span> China&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="inserted"><ins><em>&lt;p&gt;The article says this is a back 
door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
-        to China&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>could have got that easily by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711230"&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li id="M201607160"&gt;
+    &lt;p&gt;Computerized cars with nonfree software are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report to the 
-      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="inserted"><ins><em>do because the system has no authentication
+    when accessed through</em></ins></span> the 
+      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>modem.  However,</em></ins></span> even <span 
class="removed"><del><strong>what their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      &lt;p&gt;A game console is a computer, and</strong></del></span> <span 
class="inserted"><ins><em>if it asked
+    for authentication,</em></ins></span> you <span 
class="removed"><del><strong>can't trust a computer with 
       a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
       collect a wide range of data about their users and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
+      friends and associates&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;Even <span class="removed"><del><strong>nastier, they 
do</strong></del></span> <span class="inserted"><ins><em>if no one connects to 
the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the 
time;</em></ins></span>
+    it <span class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>is possible to 
physically remove the cell phone modem, though.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-      collected by various cr&hellip;apps and sites made by different 
+  &lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="inserted"><ins><em>company to extract</em></ins></span>
+    data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
       companies.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
-      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people to buy 
things,</strong></del></span> <span class="inserted"><ins><em>determine the 
car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>c</em></ins></span> 
of <span class="removed"><del><strong>money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
+    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>game play for specific players.&lt;/p&gt;
 
-      &lt;p&gt;While the article describes gratis games, games that cost money 
-      can use the same tactics.&lt;/p&gt;    
+      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>data and hand it
+    over,</em></ins></span> the <span class="removed"><del><strong>article 
describes gratis games, games that cost money</strong></del></span> <span 
class="inserted"><ins><em>state</em></ins></span> can <span 
class="removed"><del><strong>use the same 
tactics.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>store 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;!-- #SpywareAtRecreation --&gt;
 &lt;div class="big-section"&gt;
@@ -1431,22 +2572,56 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Users are suing Bose for
-      &lt;a 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-       distributing a spyware app for its headphones&lt;/a&gt;.
-      Specifically, the app would record the names of the audio files
-      users listen to along with the headphone's unique serial number.
+  &lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+       distributing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span 
class="removed"><del><strong>spyware app for its headphones&lt;/a&gt;.
+      Specifically, the app would record the names</strong></del></span> <span 
class="inserted"><ins><em>matter</em></ins></span> of <span 
class="removed"><del><strong>the audio files
+      users listen to along</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be 
replaced</em></ins></span> with
+    <span class="inserted"><ins><em>anonymous payment systems, 
but</em></ins></span> the <span class="removed"><del><strong>headphone's unique 
serial number.
     &lt;/p&gt;
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of the app said that users gave consent for this,
-      would that make it acceptable? No way! It should be flat out
+    &lt;p&gt;The suit accuses that this was</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't</em></ins></span> done <span 
class="removed"><del><strong>without the users' consent.
+      If</strong></del></span> <span class="inserted"><ins><em>by malware. The
+    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>fine print of</strong></del></span> 
<span class="inserted"><ins><em>car.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201612230"&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
+    creates</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>this,
+      would that make</strong></del></span> <span 
class="inserted"><ins><em>the most intimate
+    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
       &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design the app to snoop at all&lt;/a&gt;.
-    &lt;/p&gt;
+       illegal</strong></del></span> <span 
class="inserted"><ins><em>takes</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many other programs listed in this
+    page&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>maximum 
possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareOnTheWeb --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+
+
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
@@ -1460,105 +2635,187 @@
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
-&lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; The Storyful
-      program &lt;a 
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-      on the reporters that use it&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;</em></ins></span>
-
-  &lt;li&gt;&lt;p&gt;When a page uses Disqus for
-  comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
-  proprietary Disqus software loads a Facebook software package into
-  the browser of every anonymous visitor to the page, and makes the
-  page's URL available to Facebook&lt;/a&gt;.
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201805170"&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701060"&gt;
+    &lt;p&gt;When</em></ins></span> a page uses Disqus
+    for comments, <span class="removed"><del><strong>&lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus 
software <span class="removed"><del><strong>loads</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</em></ins></span>
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking and surveillance of 
customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-      businesses to show different people different prices&lt;/a&gt;. Most
-      of the tracking is done by recording interactions with
-      servers, but proprietary software contributes.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/"&gt;</em></ins></span>
-      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201612064"&gt;
+    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</strong></del></span>
-      <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</em></ins></span>
-      enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors to advertising networks 
that track
-      users.  Of the top 1000 web sites, &lt;a
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
+      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
+    data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
+    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
       
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
-      sites to track them&lt;/a&gt;.&lt;/p&gt;
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites report all their visitors to Google by 
using
-      the Google Analytics service, which
-      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google the IP address and the page that was 
visited.&lt;/a&gt;&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
+    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
-      user's list of other people's phone numbers or email addresses).
-      This violates the privacy of those other people.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
+    &lt;p&gt;Many</em></ins></span> web sites try to collect users' address 
books (the user's list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows the NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows the NSA</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
+    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
JavaScript and Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;British Airways
-      used &lt;a 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-      JavaScript on its web site to give other companies personal data
-      on its customers&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201807190"&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li id="M201712300"&gt;</em></ins></span>
     &lt;p&gt;Some JavaScript malware &lt;a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Some websites send JavaScript code to collect all the user's
-    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
-        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712210"&gt;
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711150"&gt;</em></ins></span>
+    &lt;p&gt;Some websites send
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites 
use</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201310110"&gt;
+    &lt;p&gt;Flash and</em></ins></span> JavaScript <span 
class="removed"><del><strong>code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
     to snoop on information that users have typed into a form but not
-    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
+    sent&lt;/a&gt;, in order to learn their identity. 
Some</strong></del></span> are <span class="removed"><del><strong>&lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+    getting sued&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
+    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
+    
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
       cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash and JavaScript are also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash and JavaScript 
are also used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201507280"&gt;
+    &lt;p&gt;Google Chrome makes it easy</em></ins></span> for <span 
class="inserted"><ins><em>an extension to do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;p&gt;Google Chrome includes a module that &lt;a
+    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 &lt;div class="big-subsection"&gt;
@@ -1567,18 +2824,24 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome
-      &lt;a 
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
-       spies on browser history, affiliations&lt;/a&gt;,
-      and other installed software.
-    &lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
-      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    spies on browser history, affiliations&lt;/a&gt;, and other installed 
<span class="removed"><del><strong>software.
+    &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome contains a key logger that &lt;a
+    href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
        sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome includes 
a module that
       &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
        activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1586,21 +2849,28 @@
   &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareInDrones --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareInDrones 
--&gt;</strong></del></span>
+
+
+
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInDrones"&gt;Spyware in Drones&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span 
class="removed"><del><strong>id="SpywareInDrones"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInNetworks"&gt;Spyware</em></ins></span> 
in <span class="removed"><del><strong>Drones&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Networks&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
-      cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
+      cases</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201606030"&gt;
+    &lt;p&gt;Investigation Shows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1613,10 +2883,16 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
+  &lt;li&gt;&lt;p&gt;The natural extension</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+    Using US Companies, NSA To Route Around Domestic Surveillance
+    Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Specifically, it can collect the emails</em></ins></span> of 
<span class="removed"><del><strong>monitoring people through 
       &ldquo;their&rdquo; phones is &lt;a 
       
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software to make sure they can't &ldquo;fool&rdquo; the 
+      proprietary software to make sure</strong></del></span> <span 
class="inserted"><ins><em>members of Parliament
+    this way, because</em></ins></span> they <span 
class="removed"><del><strong>can't &ldquo;fool&rdquo; the 
       monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1634,19 +2910,26 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
-      potential for the most intimate surveillance ever. All it takes
+      potential for the most intimate surveillance ever. 
All</strong></del></span> <span 
class="inserted"><ins><em>pass</em></ins></span> it <span 
class="removed"><del><strong>takes
       to make this potential
-      real &lt;a 
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+      real</strong></del></span> <span class="inserted"><ins><em>through 
Microsoft.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212290"&gt;
+    &lt;p&gt;The Cisco TNP IP phones are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
       software as malicious as many other programs listed in this
       page&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You can bet Facebook will implement the maximum possible
       surveillance on Oculus Rift devices. The moral is, never trust a
-      VR system with nonfree software in it.&lt;/p&gt;
+      VR system with nonfree software in it.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+    spying devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -1705,7 +2988,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/08/02 07:32:59 $
+$Date: 2018/10/27 01:58:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]