www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 21 Jan 2019 04:31:09 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/01/21 04:31:09

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.360&r2=1.361
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.452&r2=1.453
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.14&r2=1.15

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- de.po       19 Jan 2019 09:30:11 -0000      1.14
+++ de.po       21 Jan 2019 09:31:03 -0000      1.15
@@ -10038,6 +10038,13 @@
 msgid "Latest additions"
 msgstr "Letzte Ergänzungen"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- es.po       19 Jan 2019 12:30:54 -0000      1.17
+++ es.po       21 Jan 2019 09:31:05 -0000      1.18
@@ -7185,6 +7185,13 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- fr.po       19 Jan 2019 09:30:12 -0000      1.24
+++ fr.po       21 Jan 2019 09:31:05 -0000      1.25
@@ -7986,6 +7986,13 @@
 msgid "Latest additions"
 msgstr "Ajouts récents"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- it.po       19 Jan 2019 09:30:12 -0000      1.14
+++ it.po       21 Jan 2019 09:31:05 -0000      1.15
@@ -9328,6 +9328,13 @@
 msgid "Latest additions"
 msgstr "Ultime aggiunte"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- ja.po       19 Jan 2019 09:30:12 -0000      1.14
+++ ja.po       21 Jan 2019 09:31:05 -0000      1.15
@@ -7893,6 +7893,13 @@
 msgid "Latest additions"
 msgstr "最新の追加"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- nl.po       19 Jan 2019 09:30:12 -0000      1.14
+++ nl.po       21 Jan 2019 09:31:05 -0000      1.15
@@ -6345,6 +6345,13 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- pl.po       19 Jan 2019 09:30:12 -0000      1.14
+++ pl.po       21 Jan 2019 09:31:05 -0000      1.15
@@ -5884,6 +5884,13 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- pot 19 Jan 2019 09:30:12 -0000      1.14
+++ pot 21 Jan 2019 09:31:05 -0000      1.15
@@ -5381,6 +5381,13 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.de-diff.html       17 Jan 2019 06:30:31 -0000      
1.34
+++ proprietary-surveillance.de-diff.html       21 Jan 2019 09:31:05 -0000      
1.35
@@ -661,124 +661,83 @@
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display
-      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed that the non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way 
really</em></ins></span> does
-      <span class="removed"><del><strong>JavaScript 
injection</strong></del></span> <span class="inserted"><ins><em>turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact</strong></del></span>
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+  &lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping on them.&lt;/p&gt;</em></ins></span>
+    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span class="inserted"><ins><em>phone is snooping 
on them.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big 
Brother</em></ins></span> can <span class="removed"><del><strong>only hope that 
they don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>get
-    them from there.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed 
in</strong></del></span> <span class="inserted"><ins><em>Apple's servers all 
the photos
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span> <span class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library</em></ins></span> stores 
<span class="removed"><del><strong>or played</strong></del></span> <span 
class="inserted"><ins><em>every photo and video you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span> 
by <span class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>the
-    startup</em></ins></span> of <span class="removed"><del><strong>Android 
apps can collude</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>transmit users' personal
-       data</strong></del></span>
+    &lt;p&gt;There</em></ins></span> is <span class="inserted"><ins><em>a 
way</em></ins></span> to <span class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
     <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>redirects the
+      user's traffic</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
     surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of 
this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them, but NSA can access any of them</em></ins></span> 
through <span class="removed"><del><strong>valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -786,14 +745,14 @@
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>information it 
collects</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all the data in an iThing, or it
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -805,20 +764,17 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies</strong></del></span> <span 
class="inserted"><ins><em>receiving the verification code Apple sends
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification</em></ins></span> code <span 
class="removed"><del><strong>into HTML pages,</strong></del></span> <span 
class="inserted"><ins><em>Apple sends
     to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -833,9 +789,8 @@
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>Android 
phones&lt;/a&gt; while disguising
-    what</em></ins></span> the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -848,12 +803,10 @@
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;</em></ins></span>
+  &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
@@ -865,129 +818,103 @@
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed</strong></del></span> <span class="inserted"><ins><em>they 
send so much data</em></ins></span> that <span class="inserted"><ins><em>their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+    of <span class="removed"><del><strong>the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90% of</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+  proprietary</strong></del></span> <span 
class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
-  &ldquo;zero price&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>transmission</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
-    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>user, clearly must 
constitute spying
-    of some kind.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as</strong></del></span> any <span 
class="removed"><del><strong>other snooping.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>file on the system.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in 
Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
-    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
-    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      <span class="removed"><del><strong>send</strong></del></span>
-    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps contained recognizable tracking libraries. 
For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>phones 
(and Windows? laptops): The Wall Street
+    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>confusingly describes gratis apps as 
&ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always</strong></del></span> 
<span class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="removed"><del><strong>will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI</em></ins></span> can <span class="removed"><del><strong>only hope 
that they don't.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;
+  &lt;p&gt;A study found 234</strong></del></span> <span 
class="inserted"><ins><em>remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps that track 
users by</strong></del></span> <span class="inserted"><ins><em>phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present</em></ins></span> in <span 
class="removed"><del><strong>stores or played</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
+    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
+    by <span class="removed"><del><strong>TV programs&lt;/a&gt;.
+       &lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>Google, 
use a modified version</em></ins></span> of Android <span 
class="removed"><del><strong>apps can collude to transmit 
users'</strong></del></span> <span class="inserted"><ins><em>that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  
At</em></ins></span> this
-      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>point, most 
users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>information it 
collects on users, instead of
+    honestly identify the information it collects on <span 
class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>users, 
instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</em></ins></span>
-    and <span class="removed"><del><strong>Bluetooth</strong></del></span> 
<span class="inserted"><ins><em>other companies from getting this personal 
information in</em></ins></span> the
-      <span class="removed"><del><strong>obvious way</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -997,37 +924,25 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send</em></ins></span> lots of <span 
class="removed"><del><strong>personal</strong></del></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;</em></ins></span>
+    the e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>types into it&lt;/a&gt;; the server records these 
numbers for</strong></del></span> <span 
class="inserted"><ins><em>reads</em></ins></span> at <span 
class="removed"><del><strong>least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1044,217 +959,338 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span> <span class="inserted"><ins><em>the 
company's server&lt;/a&gt;. The company is
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
     being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>valid email address and 
receiving</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company does
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+  &lt;li id="M201810244"&gt;
     &lt;p&gt;Some Android apps &lt;a
     
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span class="removed"><del><strong>most 
popular iOS</strong></del></span> <span class="inserted"><ins><em>phones of 
users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
-    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
+and</strong></del></span> <span class="inserted"><ins><em>turn off 
the</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in</strong></del></span> <span 
class="inserted"><ins><em>kinds of location
+    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>act</em></ins></span> as <span 
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>spies 
for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no</em></ins></span> way to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
-    a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android 
apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>users'</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>no 
way</em></ins></span> to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a <span class="removed"><del><strong>thing would</strong></del></span> 
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be 
<span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>73%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of the <span class="removed"><del><strong>most 
popular</strong></del></span> <span 
class="inserted"><ins><em>5,855</em></ins></span> Android apps
+  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span class="inserted"><ins><em>studied by 
researchers were found to snoop</em></ins></span>
+    and <span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to get <span class="removed"><del><strong>at them, 
but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>rid</em></ins></span> of <span 
class="removed"><del><strong>them through</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    their users.  To protect</em></ins></span> their <span 
class="inserted"><ins><em>privacy and freedom, Android</em></ins></span> users 
<span class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span class="removed"><del><strong>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span 
class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they are not</strong></del></span> <span 
class="inserted"><ins><em>by getting apps from the</em></ins></span> free <span 
class="removed"><del><strong>software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what</strong></del></span> <span class="inserted"><ins><em>user if 
an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get other</strong></del></span> <span 
class="inserted"><ins><em>information to
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which</em></ins></span> users are <span class="removed"><del><strong>doing 
or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such</em></ins></span> info 
<span class="removed"><del><strong>too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to each
-    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>snoop are
+  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
+    other <span class="removed"><del><strong>snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but</strong></del></span> <span 
class="inserted"><ins><em>but</em></ins></span> not <span 
class="removed"><del><strong>&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span> to <span class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span> 
<span class="inserted"><ins><em>dis-service
+    spy</em></ins></span> on <span class="removed"><del><strong>the 
average.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>track users, which</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is 
present</strong></del></span>
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
-    is <span class="inserted"><ins><em>pervasive and sometimes very clever. 
Some trackers can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>popular</em></ins></span> Android <span 
class="removed"><del><strong>devices when they are sold.</strong></del></span> 
<span class="inserted"><ins><em>apps
+    is pervasive and sometimes very clever.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android 
to</strong></del></span> <span class="inserted"><ins><em>trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store</em></ins></span> by 
<span class="removed"><del><strong>default&lt;/a&gt;.  
(That</strong></del></span> <span class="inserted"><ins><em>noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
+    follow</em></ins></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this</em></ins></span> article 
<span class="removed"><del><strong>talks about iOS 6, but</strong></del></span> 
<span class="inserted"><ins><em>misuses the words
+    book</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that</em></ins></span> this
+      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>article 
misuses</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
+      obvious way</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent</em></ins></span> them <span 
class="removed"><del><strong>off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>and text messages and emails</em></ins></span> 
to <span class="removed"><del><strong>be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it
-    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy; on the 
contrary,</em></ins></span> it <span class="removed"><del><strong>without 
having your fingerprints
+      taken. Users would have no way</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the <span class="removed"><del><strong>phone 
is</strong></del></span> snooping <span class="removed"><del><strong>on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps, and
+    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>responsibility</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>no systematic way for Google, or Android users,
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>valid email address</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>iOS 
7.)&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="inserted"><ins><em>source</em></ins></span> code <span 
class="removed"><del><strong>Apple
+      sends</strong></del></span> <span 
class="inserted"><ins><em>somehow</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    various ways. If it did a good job</em></ins></span> of <span 
class="inserted"><ins><em>this, it could more or less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers all</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</em></ins></span> to <span class="removed"><del><strong>date on all 
your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup</strong></del></span> <span class="inserted"><ins><em>protect 
us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by 
default</strong></del></span> <span class="inserted"><ins><em>the
+    public,</em></ins></span> so <span class="removed"><del><strong>it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each 
other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>access any of them through</strong></del></span> 
<span class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound</em></ins></span> from <span 
class="removed"><del><strong>iPhones for the state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all the data</strong></del></span> 
<span class="inserted"><ins><em>beacons placed</em></ins></span> in <span 
class="removed"><del><strong>an iThing,</strong></del></span> <span 
class="inserted"><ins><em>stores</em></ins></span> or <span 
class="removed"><del><strong>it is totally 
incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>played by TV
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>iThings:
+      the &lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets</strong></del></span> stores <span 
class="removed"><del><strong>determine exactly where the iThing is,
+      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>personal data 
in</em></ins></span> the
+    how much access</em></ins></span> it
+      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>this was done without</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If</em></ins></span> the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>fine print 
of</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>app said that 
users gave consent for this,
+    would that make</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    the
       <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1265,113 +1301,98 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers can</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
+      sometimes very clever. Some trackers</strong></del></span> can <span 
class="inserted"><ins><em>collude
+    to transmit users' personal data to servers.</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location</strong></del></span> <span 
class="inserted"><ins><em>spyware app</em></ins></span> for <span 
class="removed"><del><strong>Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span> <span class="inserted"><ins><em>its 
headphones&lt;/a&gt;.  Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>app would record the names of the audio files users 
listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>design
-    the app</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,
-      &lt;a 
href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span> 
<span class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps</em></ins></span> can <span 
class="removed"><del><strong>take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>collude</em></ins></span>
-    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon &lt;a
-    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, 
even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>same information
-    about the users' searches that Google normally gets when they use
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>off, listen to</strong></del></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>user must
-    explicitly opt-in before</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user</em></ins></span> data <span class="removed"><del><strong>that their 
transmission is</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="inserted"><ins><em>spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>Chinese company&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span>
+    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by</strong></del></span> 
<span class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports that</strong></del></span> <span 
class="inserted"><ins><em>protection against
-    massive surveillance.&lt;/p&gt;
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>user's
+    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>inadequate as a protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>microphone in</strong></del></span> <span 
class="inserted"><ins><em>security of
-    283</em></ins></span> Android
-      <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>VPN apps concluded that &ldquo;in spite of the 
promises
-    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>anonymity given by the majority of VPN
+    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span 
class="removed"><del><strong>they send so much data</strong></del></span> <span 
class="inserted"><ins><em>security of
+    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Following</em></ins></span> is a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the 
<span class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>research 
paper,</em></ins></span>
+    of some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>proprietary VPN apps</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>track 
users</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>a non-exhaustive list, taken from the research 
paper,
-    of some proprietary VPN apps that track users and 
infringe</em></ins></span> their <span class="removed"><del><strong>GPS 
location on
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>GPS location on
       remote command</strong></del></span>
     <span class="inserted"><ins><em>privacy:&lt;/p&gt;
 
@@ -1385,11 +1406,11 @@
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>has full access to 
users'
+      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>has full 
access</em></ins></span> to <span class="inserted"><ins><em>users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="inserted"><ins><em>read logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other apps and also core system logs. TigerVPN 
developers</em></ins></span> have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1562,13 +1583,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73%</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+    &lt;p&gt;More than 73% and 47% of mobile applications, from 
Android</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
       algorithms.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>47%</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>mobile 
applications, from Android and iOS
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt; of their users with
+    personal, behavioral and location information&lt;/a&gt;</em></ins></span> 
of <span class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
users with
     third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1736,16 +1757,15 @@
       their products, rather than free software which users could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>made the vibrator</strong></del></span>
+    <span class="inserted"><ins><em>is found in many proprietary games. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
        was sued for collecting lots of personal information about how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold 
the</strong></del></span>
-    <span class="inserted"><ins><em>is found in many proprietary games. It 
&lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends</em></ins></span> it 
<span class="removed"><del><strong>had sold the data</strong></del></span> to 
<span class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
@@ -1793,13 +1813,17 @@
       was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>sites made</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>different
+    companies.&lt;/p&gt;
+
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things,</em></ins></span> 
and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>hunt for
+    &ldquo;whales&rdquo; who can be led</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
@@ -1810,61 +1834,84 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>different
-    companies.&lt;/p&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span> 
<span class="inserted"><ins><em>spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>buy things,</em></ins></span> and <span 
class="inserted"><ins><em>hunt for
-    &ldquo;whales&rdquo; who can be led</em></ins></span> to <span 
class="removed"><del><strong>transmit
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="inserted"><ins><em>the NSA takes advantage</em></ins></span>
+    to <span class="removed"><del><strong>transmit
        conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
        that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They also
-    use</em></ins></span> a back <span class="removed"><del><strong>door, 
but</strong></del></span> <span class="inserted"><ins><em>door to manipulate 
the game play for specific players.&lt;/p&gt;
+    &lt;p&gt;The article says this</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;While the article describes gratis games, games</em></ins></span> 
that <span class="removed"><del><strong>could be a
-      misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cost money
-    can use the same tactics.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;a
+    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+  &lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden</em></ins></span> is a <span 
class="removed"><del><strong>back door, but</strong></del></span> <span 
class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>many 
Internet of Stings devices allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
 Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>people 
that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
-    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1874,17 +1921,11 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more spyware apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about</em></ins></span> NSA <span class="removed"><del><strong>To 
Route Around Domestic Surveillance
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
   this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
@@ -1903,47 +1944,22 @@
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>article uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+&lt;/ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
 
 
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareOnTheRoad"&gt;Spyware 
on The Road&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
@@ -1980,8 +1996,8 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    report everything that is viewed</em></ins></span> on <span 
class="inserted"><ins><em>them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
@@ -1999,7 +2015,7 @@
 
   &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>the fact</strong></del></span> <span 
class="inserted"><ins><em>their users: their &lt;a
+    manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>the device</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
@@ -2135,215 +2151,214 @@
 
     &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
       payment systems,</strong></del></span> <span 
class="inserted"><ins><em>2014,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>we don't expect this has got
+      cases mentioned</strong></del></span> <span class="inserted"><ins><em>we 
don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>are totally inadequate.
-    And what happens</em></ins></span> if <span class="inserted"><ins><em>a 
user declines consent? Probably</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware 
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>products are
-        designed</strong></del></span> <span 
class="inserted"><ins><em>TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen to everyone in</strong></del></span>
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
+      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Today's technological practice does not include any way of
-    making</strong></del></span> <span class="inserted"><ins><em>switch to 
turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing; the server could save</em></ins></span> that <span 
class="removed"><del><strong>can obey your voice commands without
-    potentially spying on you.  Even if</strong></del></span> <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is air-gapped,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
-    product</em></ins></span> could <span class="removed"><del><strong>be
-    saving up records about you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>spy this 
way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>data about 
the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>other 
way.&rdquo; Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>video they 
capture to</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>servers&lt;/a&gt; which save it
+    send the video they capture to Amazon servers&lt;/a&gt; which save it
     permanently.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of</em></ins></span> everything 
<span class="removed"><del><strong>that is viewed on</strong></del></span> 
<span class="inserted"><ins><em>they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested</em></ins></span> them, <span 
class="removed"><del><strong>and</strong></del></span> <span 
class="inserted"><ins><em>it suggested that these
-    manufacturers promise</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</em></ins></span> is 
<span class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>user's 
own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>is. The existence of a way</strong></del></span>
-    to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;The Nest Cam</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>products are
+        designed</strong></del></span> <span class="inserted"><ins><em>camera 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen to everyone in the house, all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of
+    making a device that can obey your voice commands without
+    potentially spying on you.  Even if</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span 
class="removed"><del><strong>air-gapped,</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> it <span 
class="removed"><del><strong>could be
+    saving up records about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span class="inserted"><ins><em>product as shipped 
doesn't act</em></ins></span> as <span class="inserted"><ins><em>a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act 
as</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was
+<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>found to make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span 
class="inserted"><ins><em>temperature</em></ins></span> of <span 
class="removed"><del><strong>a way to
+    disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it was <span 
class="removed"><del><strong>in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on</strong></del></span> <span class="inserted"><ins><em>totally inadequate 
proposed response: a labeling
+    standard with which manufacturers would make statements 
about</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
+    and changed.&lt;/p&gt;</em></ins></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
 
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>TV will
+    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
+    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate proposed 
response:</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV</strong></del></span> <span class="inserted"><ins><em>labeling
-    standard with which</em></ins></span> manufacturers <span 
class="removed"><del><strong>in spying on 
-      their users:</strong></del></span> <span class="inserted"><ins><em>would 
make statements about</em></ins></span> their <span 
class="removed"><del><strong>&lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked</em></ins></span>
-    and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>changed.&lt;/p&gt;
-
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off,</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> it <span 
class="removed"><del><strong>enabled by default
+    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
       is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households 
to</strong></del></span> <span class="inserted"><ins><em>doesn't really matter. 
If it had sold</em></ins></span> the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>data to a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>company 
already
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
+      the 600 millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="removed"><del><strong>already
       monitors. Tivo customers are unaware they're being watched by
       advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span> <span class="inserted"><ins><em>has 
been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2371,29 +2386,24 @@
     &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
       even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span> <span 
class="inserted"><ins><em>speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in</em></ins></span> on <span 
class="inserted"><ins><em>a child's speech, and even speak 
into</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all the time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2403,11 +2413,10 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2418,8 +2427,10 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
@@ -2534,38 +2545,33 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
-        to China&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
     tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
     &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends 
personal</strong></del></span> <span class="inserted"><ins><em>sign for some 
digital service
+    sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>about them</strong></del></span> <span 
class="inserted"><ins><em>collection should be forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2580,11 +2586,24 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>the NSA takes advantage</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>make changes in 
various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
-    when accessed</em></ins></span> through <span 
class="inserted"><ins><em>the modem.  However, even if</em></ins></span> it 
<span class="removed"><del><strong>too&lt;/a&gt;.
+    &lt;p&gt;That's easy</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>track the car's movements all the 
time;</em></ins></span>
+    it <span class="removed"><del><strong>too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
@@ -2592,20 +2611,13 @@
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="inserted"><ins><em>physically 
remove</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
@@ -2634,13 +2646,13 @@
 
       &lt;p&gt;They use this data to manipulate people</strong></del></span>
     <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend</strong></del></span> 
<span class="inserted"><ins><em>others.&lt;/p&gt;
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>matter</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate the game play for specific players.&lt;/p&gt;
 
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
+      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>matter of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
     anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money 
       can use</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done by malware. The
@@ -2707,6 +2719,13 @@
   &lt;li&gt;&lt;p&gt;When</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -3060,7 +3079,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/01/21 09:31:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.de.po      13 Jan 2019 09:29:35 -0000      1.251
+++ proprietary-surveillance.de.po      21 Jan 2019 09:31:05 -0000      1.252
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4063,6 +4063,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
 "revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
 "the reporters that use it</a>."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.360
retrieving revision 1.361
diff -u -b -r1.360 -r1.361
--- proprietary-surveillance.fr.po      17 Jan 2019 06:30:32 -0000      1.360
+++ proprietary-surveillance.fr.po      21 Jan 2019 09:31:05 -0000      1.361
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2019-01-13 10:54+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3345,6 +3346,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
 "revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
 "the reporters that use it</a>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary-surveillance.it-diff.html       17 Jan 2019 06:30:32 -0000      
1.101
+++ proprietary-surveillance.it-diff.html       21 Jan 2019 09:31:05 -0000      
1.102
@@ -1413,7 +1413,7 @@
 
       &lt;p&gt;Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -1923,52 +1923,72 @@
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt; which save it
+    permanently.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1979,78 +1999,53 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> &ldquo;smart&rdquo; <span 
class="inserted"><ins><em>TV&lt;/a&gt;
-    and use its</em></ins></span> camera <span class="removed"><del><strong>is 
&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</strong></del></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;</em></ins></span>
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>video</em></ins></span> they <span 
class="removed"><del><strong>report even</strong></del></span> <span 
class="inserted"><ins><em>capture to Amazon servers&lt;/a&gt;</em></ins></span> 
which <span class="removed"><del><strong>page</strong></del></span> <span 
class="inserted"><ins><em>save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look</em></ins></span> at <span 
class="removed"><del><strong>what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>what's 
in</em></ins></span> the <span class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>watch 
through them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
@@ -2105,58 +2100,59 @@
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from</strong></del></span> 
<span class="inserted"><ins><em>was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; 
to</em></ins></span> its <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</strong></del></span>
+    <span class="inserted"><ins><em>customers.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> the <span 
class="removed"><del><strong>company to extract data remotely and
-      determine</strong></del></span>
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>phone company to track</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
+    company based</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract 
data</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can</em></ins></span> remotely <span class="removed"><del><strong>and
+      determine the car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>control</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>get the 
data</strong></del></span> <span class="inserted"><ins><em>listen in on a 
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>even speak 
into</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
@@ -2170,18 +2166,16 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers to listen in on a child's speech, and even speak 
into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+  send</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2238,65 +2232,72 @@
 
     &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
       consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>some government such as China or the US
+    told Amazon</em></ins></span> to <span class="removed"><del><strong>turn 
this off, but having it enabled by default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>do this, or 
cease</em></ins></span> to <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>product in that 
country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>mean 
&ldquo;breaking security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other 
devices</strong></del></span> <span 
class="inserted"><ins><em>everyone</em></ins></span> in
+      <span class="removed"><del><strong>range so as to 
determine</strong></del></span> <span class="inserted"><ins><em>the house, all 
the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    a device</em></ins></span> that <span class="removed"><del><strong>they 
are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> can
+      <span class="removed"><del><strong>correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>obey your 
voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    data about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  &lt;li id="M201310260"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2308,27 +2309,23 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing &lt;a
-    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>companies
-    monitor every aspect of what they do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>are watching&lt;/a&gt;,
+      even if</strong></del></span> <span class="inserted"><ins><em>wear 
it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This will teach the sheeple to find</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door, but that could be a
@@ -2389,21 +2386,37 @@
       snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
 
       &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed</strong></del></span> <span 
class="inserted"><ins><em>won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201607160"&gt;
+    &lt;p&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602240"&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>patch</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;!-- #SpywareAtPlay --&gt;
 &lt;div class="big-section"&gt;
@@ -2413,59 +2426,45 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software</em></ins></span> are 
<span class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
+&lt;li&gt;&lt;p&gt;Users are suing Bose</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
+    when accessed through the modem.  However, even if it 
asked</em></ins></span>
+    for <span class="inserted"><ins><em>authentication, you couldn't be 
confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a
 <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
-    cell phone modem which allows effectively anyone to &lt;a
-    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
-    settings&lt;/a&gt;.&lt;/p&gt;
+distributing a spyware app for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>audio 
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span class="removed"><del><strong>along with the 
headphone's unique serial number.
 &lt;/p&gt;
 
 &lt;p&gt;The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+If</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
+    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem, though.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
+      video game consoles snoop on their users and report 
to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+      collect a wide range of</strong></del></span> <span 
class="inserted"><ins><em>company to extract</em></ins></span>
     data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
       friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
     at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
@@ -2534,13 +2533,20 @@
    programs, so it
    &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance is an abuse all the same.&lt;/p&gt;
+   but the surveillance is an abuse all the <span 
class="removed"><del><strong>same.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
 
-  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+  &lt;li&gt;&lt;p&gt;When</strong></del></span> <span 
class="inserted"><ins><em>same.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2867,7 +2873,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/01/21 09:31:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.it.po      13 Jan 2019 09:29:35 -0000      1.264
+++ proprietary-surveillance.it.po      21 Jan 2019 09:31:05 -0000      1.265
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3820,6 +3820,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
 "revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
 "the reporters that use it</a>."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-surveillance.ja-diff.html       17 Jan 2019 06:30:32 -0000      
1.111
+++ proprietary-surveillance.ja-diff.html       21 Jan 2019 09:31:05 -0000      
1.112
@@ -1253,182 +1253,101 @@
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice</em></ins></span> 
of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and 
study</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer is 
using</strong></del></span> <span class="inserted"><ins><em>source code somehow 
to determine whether they mistreat users in
-    various ways. If it did a good job of this,</em></ins></span> it <span 
class="inserted"><ins><em>could more or less
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
     prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to outsmart
-      <span class="removed"><del><strong>you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this</strong></del></span> <span class="inserted"><ins><em>the 
checking.&lt;/p&gt;
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source</em></ins></span> 
code <span class="removed"><del><strong>snoops</strong></del></span> <span 
class="inserted"><ins><em>to the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>each other.&lt;/p&gt;</em></ins></span>
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that</em></ins></span> they <span 
class="removed"><del><strong>report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>don't snoop.&lt;/p&gt;
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by <span class="removed"><del><strong>most US libraries,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>personal data</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users</em></ins></span> are <span class="inserted"><ins><em>suing 
Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access</strong></del></span> <span class="inserted"><ins><em>spyware app 
for</em></ins></span> its <span class="removed"><del><strong>computers remotely 
and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span class="inserted"><ins><em>app 
would record</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>names of</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>audio files users listen</em></ins></span> to
-    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>phone company to track</strong></del></span> 
<span class="inserted"><ins><em>users' consent.
-    If</em></ins></span> the <span class="removed"><del><strong>car's 
movements all</strong></del></span> <span class="inserted"><ins><em>fine print 
of</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent for this,
-    would that make</em></ins></span> it <span class="removed"><del><strong>is 
possible</strong></del></span> <span class="inserted"><ins><em>acceptable? No 
way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
-    the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude</em></ins></span>
-    to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
-      others.&lt;/p&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>its 
headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data to servers. &lt;a
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
-      really a matter</strong></del></span> <span 
class="inserted"><ins><em>thousands</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> <span class="inserted"><ins><em>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced</em></ins></span> an
-      <span class="removed"><del><strong>intolerable 
invasion</strong></del></span> <span class="inserted"><ins><em>opt-in 
proprietary search app that it will&lt;/a&gt; pre-install
-    on some</em></ins></span> of <span class="removed"><del><strong>privacy, 
and should be replaced with anonymous
-      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>its 
phones.</em></ins></span> The <span class="removed"><del><strong>other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
+    on <span class="removed"><del><strong>top under each subsection --&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>same information
+&lt;div class="big-section"&gt;</strong></del></span> <span 
class="inserted"><ins><em>some of its phones. The app will give Verizon the 
same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
@@ -1759,8 +1678,8 @@
 
 
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+&lt;div class="big-section"&gt;</em></ins></span>
+  &lt;h3 <span 
class="removed"><del><strong>id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in 
Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1836,8 +1755,8 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles</em></ins></span> the company
-    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
@@ -1861,8 +1780,14 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on <span class="inserted"><ins><em>what
+    users watch&lt;/a&gt;.</em></ins></span>  The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
@@ -1901,75 +1826,135 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span> <span 
class="inserted"><ins><em>user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
-      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+    really</em></ins></span> means <span 
class="inserted"><ins><em>nothing;</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</em></ins></span>
+    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>other 
devices on</em></ins></span> the <span class="removed"><del><strong>e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do</em></ins></span> lots of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in the car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use</em></ins></span> its <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>camera</em></ins></span> to <span 
class="inserted"><ins><em>watch</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>people 
who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
+    send</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>track the car's 
movements all
+    the time;</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt; which save</em></ins></span> it <span 
class="removed"><del><strong>is possible to physically remove the cell phone 
modem
+    though.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>permanently.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These systems 
are</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer</em></ins></span> an
+      <span class="removed"><del><strong>intolerable 
invasion</strong></del></span> <span class="inserted"><ins><em>unencrypted 
copy</em></ins></span> of <span class="removed"><del><strong>privacy, and 
should</strong></del></span> <span class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -1977,15 +1962,35 @@
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that</em></ins></span> allow <span 
class="removed"><del><strong>the company</strong></del></span> <span 
class="inserted"><ins><em>anyone</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>state 
orders</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>to get</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
     to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2050,19 +2055,18 @@
     broker,</em></ins></span> the <span class="removed"><del><strong>TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who the
-    user was.&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
+    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>company has been ordered to pay</em></ins></span> a 
<span class="removed"><del><strong>step further than other TV manufacturers in 
spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
 
-  &lt;li id="M201702280"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
@@ -2137,7 +2141,7 @@
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such</em></ins></span> as <span 
class="inserted"><ins><em>China or the US
-    told Amazon to do this, or cease</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>sell the product in</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product 
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.  
Once your
       Internet devices</strong></del></span> <span 
class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
@@ -2218,7 +2222,8 @@
   &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>to transmit conversations
+    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2236,12 +2241,11 @@
     tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could</em></ins></span> 
have <span class="inserted"><ins><em>got that easily by
-    sneaking it into the contract that users sign for some digital service
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking</em></ins></span> it <span class="inserted"><ins><em>into the 
contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to
-      <span class="removed"><del><strong>give it</strong></del></span> <span 
class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
@@ -2288,11 +2292,14 @@
       &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
       could spy this way.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2304,16 +2311,13 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>the car remotely, 
the cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
     it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
       a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2399,6 +2403,13 @@
   &lt;li&gt;&lt;p&gt;Online</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2716,7 +2727,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/01/21 09:31:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.ja.po      13 Jan 2019 09:29:35 -0000      1.237
+++ proprietary-surveillance.ja.po      21 Jan 2019 09:31:05 -0000      1.238
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3229,6 +3229,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
 "revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
 "the reporters that use it</a>."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-surveillance.pot        13 Jan 2019 09:29:35 -0000      1.185
+++ proprietary-surveillance.pot        21 Jan 2019 09:31:05 -0000      1.186
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2299,6 +2299,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a "
+"href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";> "
+"sent the precise GPS location to Twitter's server</a>. It still contains "
+"these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a "
 
"href=\"https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch\";>spies
 "
 "on the reporters that use it</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.452
retrieving revision 1.453
diff -u -b -r1.452 -r1.453
--- proprietary-surveillance.ru.po      17 Jan 2019 06:30:32 -0000      1.452
+++ proprietary-surveillance.ru.po      21 Jan 2019 09:31:05 -0000      1.453
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3303,6 +3304,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
 "revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
 "the reporters that use it</a>."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary.de-diff.html    17 Jan 2019 15:29:36 -0000      1.35
+++ proprietary.de-diff.html    21 Jan 2019 09:31:05 -0000      1.36
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -123,12 +123,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -183,6 +183,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -229,16 +236,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -299,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:36 $
+$Date: 2019/01/21 09:31:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.de.po   17 Jan 2019 15:29:36 -0000      1.77
+++ proprietary.de.po   21 Jan 2019 09:31:05 -0000      1.78
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -487,18 +494,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.es.po   19 Jan 2019 12:30:55 -0000      1.82
+++ proprietary.es.po   21 Jan 2019 09:31:05 -0000      1.83
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2019-01-03 11:29+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -302,6 +302,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -375,23 +382,6 @@
 "incluidas <cite>Accuweather</cite> y <cite>WeatherBug</cite>, rastrean la "
 "ubicación de los usuarios."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Los nuevos modelos de vehículos de GM <a href=\"https://media.gm.com/media/";
-"us/en/gmc/vehicles/canyon/2019.html\">están dotados de una puerta trasera "
-"universal</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Todo programa que no es libre ofrece seguridad nula frente a su "
-"desarrollador, pero de este modo GM ha agravado aún más esa situación."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,6 +461,21 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Los nuevos modelos de vehículos de GM <a href=\"https://media.gm.com/";
+#~ "media/us/en/gmc/vehicles/canyon/2019.html\">están dotados de una puerta "
+#~ "trasera universal</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Todo programa que no es libre ofrece seguridad nula frente a su "
+#~ "desarrollador, pero de este modo GM ha agravado aún más esa situación."
+
+#~ msgid ""
 #~ "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 #~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 #~ "over-call-log-consent\"> upload call logs automatically from Android "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.fr.po   17 Jan 2019 16:28:52 -0000      1.104
+++ proprietary.fr.po   21 Jan 2019 09:31:05 -0000      1.105
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2019-01-17 17:04+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -383,23 +391,6 @@
 "party-weather-apps\">D'autres applis météo</a>, en particulier Accuweather "
 "et WeatherBug, suivent l'utilisateur à la trace."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Les nouveaux modèles de véhicules GM <a 
href=\"https://media.gm.com/media/us/";
-"en/gmc/vehicles/canyon/2019.html\">sont dotés d'une fonctionnalité de porte 
"
-"dérobée universelle</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Aucun des programmes non libres n'offre à l'utilisateur de sécurité contre 
"
-"les attaques de son développeur, mais GM a explicitement aggravé les 
choses."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,3 +464,19 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Les nouveaux modèles de véhicules GM <a 
href=\"https://media.gm.com/media/";
+#~ "us/en/gmc/vehicles/canyon/2019.html\">sont dotés d'une fonctionnalité de 
"
+#~ "porte dérobée universelle</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Aucun des programmes non libres n'offre à l'utilisateur de sécurité "
+#~ "contre les attaques de son développeur, mais GM a explicitement aggravé "
+#~ "les choses."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary.it-diff.html    17 Jan 2019 15:29:36 -0000      1.47
+++ proprietary.it-diff.html    21 Jan 2019 09:31:05 -0000      1.48
@@ -182,6 +182,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -228,16 +235,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -298,7 +295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:36 $
+$Date: 2019/01/21 09:31:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.it.po   17 Jan 2019 15:29:36 -0000      1.86
+++ proprietary.it.po   21 Jan 2019 09:31:06 -0000      1.87
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -491,18 +498,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary.ja-diff.html    17 Jan 2019 15:29:37 -0000      1.48
+++ proprietary.ja-diff.html    21 Jan 2019 09:31:08 -0000      1.49
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -155,10 +155,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -179,6 +179,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -225,16 +232,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -295,7 +292,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.ja.po   17 Jan 2019 15:29:37 -0000      1.69
+++ proprietary.ja.po   21 Jan 2019 09:31:08 -0000      1.70
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -411,18 +418,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary.nl-diff.html    17 Jan 2019 15:29:37 -0000      1.47
+++ proprietary.nl-diff.html    21 Jan 2019 09:31:08 -0000      1.48
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -182,6 +182,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -228,16 +235,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -298,7 +295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary.nl.po   17 Jan 2019 15:29:37 -0000      1.58
+++ proprietary.nl.po   21 Jan 2019 09:31:08 -0000      1.59
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -484,18 +491,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.pl-diff.html    17 Jan 2019 15:29:37 -0000      1.65
+++ proprietary.pl-diff.html    21 Jan 2019 09:31:08 -0000      1.66
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -125,17 +125,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -156,10 +156,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -180,6 +180,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -226,16 +233,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -296,7 +293,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary.pl.po   17 Jan 2019 15:29:37 -0000      1.53
+++ proprietary.pl.po   21 Jan 2019 09:31:08 -0000      1.54
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -566,18 +573,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.pot     17 Jan 2019 15:29:37 -0000      1.50
+++ proprietary.pot     21 Jan 2019 09:31:08 -0000      1.51
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a "
+"href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";> "
+"sent the precise GPS location to Twitter's server</a>. It still contains "
+"these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -300,19 +308,6 @@
 "people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a "
-"href=\"https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html\";> "
-"offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its "
-"developer. With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.pt-br.po        20 Jan 2019 12:02:11 -0000      1.63
+++ proprietary.pt-br.po        21 Jan 2019 09:31:08 -0000      1.64
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2019-01-20 09:42-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -382,23 +390,6 @@
 "party-weather-apps\"> Outros aplicativos de meteorologia</a>, incluindo "
 "Accuweather e WeatherBug, estão rastreando as localizações das pessoas."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Novos carros da GM <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> oferecem o recurso de um back door universal</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Todo programa não livre oferece ao usuário segurança zero contra seu "
-"desenvolvedor. Com este mal-funcionamento, a GM explicitamente tornou as "
-"coisas ainda piores."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -474,6 +465,22 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Novos carros da GM <a href=\"https://media.gm.com/media/us/en/gmc/";
+#~ "vehicles/canyon/2019.html\"> oferecem o recurso de um back door "
+#~ "universal</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Todo programa não livre oferece ao usuário segurança zero contra seu "
+#~ "desenvolvedor. Com este mal-funcionamento, a GM explicitamente tornou as "
+#~ "coisas ainda piores."
+
+#~ msgid ""
 #~ "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 #~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 #~ "over-call-log-consent\"> upload call logs automatically from Android "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.ru.po   17 Jan 2019 16:28:52 -0000      1.129
+++ proprietary.ru.po   21 Jan 2019 09:31:08 -0000      1.130
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-12-11 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -387,23 +395,6 @@
 "party-weather-apps\"> Другие погодные приложения</a>, 
в том числе "
 "Accuweather и WeatherBug, отслеживают 
местоположение людей."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Новые автомобили GM <a 
href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> предлагают функцию 
универсального черного хода</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Любая несвободная программа предлагает 
нулевую защиту от своего "
-"разработчика. С помощью этой вредоносной 
функции GM явным образом еще "
-"ухудшило ситуацию."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -483,6 +474,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Новые автомобили GM <a 
href=\"https://media.gm.com/media/us/en/gmc/";
+#~ "vehicles/canyon/2019.html\"> предлагают функцию 
универсального черного "
+#~ "хода</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Любая несвободная программа предлагает 
нулевую защиту от своего "
+#~ "разработчика. С помощью этой 
вредоносной функции GM явным образом еще "
+#~ "ухудшило ситуацию."
+
+#~ msgid ""
 #~ "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 #~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 #~ "over-call-log-consent\"> upload call logs automatically from Android "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary.zh-tw-diff.html 17 Jan 2019 15:29:37 -0000      1.25
+++ proprietary.zh-tw-diff.html 21 Jan 2019 09:31:08 -0000      1.26
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -123,12 +123,12 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -183,6 +183,13 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201901101"&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    href="https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201612290"&gt;
     &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
     a high score. The player gets coins at the end of each game, and can
@@ -229,16 +236,6 @@
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-
-  &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars &lt;a
-    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers the user zero security against its
-    developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -299,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary.zh-tw.po        17 Jan 2019 15:29:37 -0000      1.36
+++ proprietary.zh-tw.po        21 Jan 2019 09:31:08 -0000      1.37
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "In the game Fruit Pop, the player buys boosts with coins to get a high "
 "score. The player gets coins at the end of each game, and can buy more coins "
 "with real money."
@@ -400,18 +407,6 @@
 "WeatherBug, are tracking people's locations."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/";
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- pt-br.po    19 Jan 2019 09:30:12 -0000      1.20
+++ pt-br.po    21 Jan 2019 09:31:08 -0000      1.21
@@ -5788,6 +5788,13 @@
 msgid "Latest additions"
 msgstr "Últimas adições"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- ru.po       19 Jan 2019 10:30:55 -0000      1.31
+++ ru.po       21 Jan 2019 09:31:08 -0000      1.32
@@ -7966,6 +7966,13 @@
 msgid "Latest additions"
 msgstr "Последние добавления"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- zh-tw.po    19 Jan 2019 09:30:12 -0000      1.14
+++ zh-tw.po    21 Jan 2019 09:31:08 -0000      1.15
@@ -5660,6 +5660,13 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www.";
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]