www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Wed, 13 Feb 2019 07:00:27 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/13 07:00:26

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.466&r2=1.467
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.27&r2=1.28

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- de.po       11 Feb 2019 12:59:22 -0000      1.27
+++ de.po       13 Feb 2019 12:00:23 -0000      1.28
@@ -7159,6 +7159,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -10177,27 +10184,6 @@
 msgid "Latest additions"
 msgstr "Letzte Ergänzungen"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>
@@ -10228,6 +10214,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- es.po       11 Feb 2019 12:59:22 -0000      1.34
+++ es.po       13 Feb 2019 12:00:23 -0000      1.35
@@ -5094,6 +5094,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -7425,37 +7432,6 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"El software para para tratamiento de gráficos de Foundry <a href=\"https://";
-"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
-"computers-181102/\">envía información para identificar a quien lo está "
-"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
-"elevada suma de dinero."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
-"hace incuso más vil."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Esto muestra que hacer copias no autorizadas de software que no es libre no "
-"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
-"se pague por algo malo, pero no lo hace menos malo."
-
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>
@@ -7490,6 +7466,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+"El software para para tratamiento de gráficos de Foundry <a href=\"https://";
+"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
+"computers-181102/\">envía información para identificar a quien lo está "
+"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
+"elevada suma de dinero."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
+"hace incuso más vil."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+"Esto muestra que hacer copias no autorizadas de software que no es libre no "
+"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
+"se pague por algo malo, pero no lo hace menos malo."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- fr.po       12 Feb 2019 10:46:00 -0000      1.50
+++ fr.po       13 Feb 2019 12:00:23 -0000      1.51
@@ -5629,6 +5629,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -8158,6 +8165,28 @@
 msgid "Latest additions"
 msgstr "Ajouts récents"
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr "Copyright &copy; 2013-2019 Free Software Foundation, Inc."
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr "Sabotage privateur - Projet GNU - Free Software Foundation"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr "Sabotage privateur"
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+"Voici des exemples de logiciels privateurs qui ont des caractéristiques "
+"encore pires qu'une porte dérobée."
+
 #. type: Content of: <ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
@@ -8189,28 +8218,6 @@
 "remède contre l'injustice qu'ils représentent. Elle permet ne pas payer 
pour "
 "ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr "Copyright &copy; 2013-2019 Free Software Foundation, Inc."
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr "Sabotage privateur - Projet GNU - Free Software Foundation"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr "Sabotage privateur"
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-"Voici des exemples de logiciels privateurs qui ont des caractéristiques "
-"encore pires qu'une porte dérobée."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- it.po       11 Feb 2019 12:59:22 -0000      1.27
+++ it.po       13 Feb 2019 12:00:24 -0000      1.28
@@ -6732,6 +6732,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -9472,27 +9479,6 @@
 msgid "Latest additions"
 msgstr "Ultime aggiunte"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>
@@ -9525,6 +9511,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- ja.po       11 Feb 2019 12:59:22 -0000      1.27
+++ ja.po       13 Feb 2019 12:00:24 -0000      1.28
@@ -5708,6 +5708,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -8022,27 +8029,6 @@
 msgid "Latest additions"
 msgstr "最新の追加"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
@@ -8074,6 +8060,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-mobiles.de-diff.html        11 Feb 2019 12:59:22 -0000      1.40
+++ malware-mobiles.de-diff.html        13 Feb 2019 12:00:24 -0000      1.41
@@ -457,6 +457,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -1226,7 +1232,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-mobiles.de.po       11 Feb 2019 12:59:22 -0000      1.97
+++ malware-mobiles.de.po       13 Feb 2019 12:00:24 -0000      1.98
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -760,6 +760,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.es.po       12 Feb 2019 10:59:31 -0000      1.101
+++ malware-mobiles.es.po       13 Feb 2019 12:00:24 -0000      1.102
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -634,6 +635,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- malware-mobiles.fr.po       12 Feb 2019 10:46:00 -0000      1.121
+++ malware-mobiles.fr.po       13 Feb 2019 12:00:24 -0000      1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-11 19:48+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -635,6 +636,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-mobiles.it-diff.html        11 Feb 2019 12:59:22 -0000      1.45
+++ malware-mobiles.it-diff.html        13 Feb 2019 12:00:24 -0000      1.46
@@ -463,6 +463,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -1261,7 +1267,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-mobiles.it.po       11 Feb 2019 12:59:22 -0000      1.97
+++ malware-mobiles.it.po       13 Feb 2019 12:00:24 -0000      1.98
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -729,6 +729,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-mobiles.ja-diff.html        11 Feb 2019 12:59:22 -0000      1.59
+++ malware-mobiles.ja-diff.html        13 Feb 2019 12:00:24 -0000      1.60
@@ -457,6 +457,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -1101,7 +1107,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-mobiles.ja.po       11 Feb 2019 12:59:22 -0000      1.85
+++ malware-mobiles.ja.po       13 Feb 2019 12:00:24 -0000      1.86
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -599,6 +599,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-mobiles.pot 11 Feb 2019 12:59:22 -0000      1.63
+++ malware-mobiles.pot 13 Feb 2019 12:00:24 -0000      1.64
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -432,6 +432,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";>
 "
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a "
 "href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- malware-mobiles.ru.po       11 Feb 2019 13:29:21 -0000      1.153
+++ malware-mobiles.ru.po       13 Feb 2019 12:00:24 -0000      1.154
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -625,6 +626,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- nl.po       11 Feb 2019 12:59:22 -0000      1.27
+++ nl.po       13 Feb 2019 12:00:24 -0000      1.28
@@ -4490,6 +4490,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -6491,27 +6498,6 @@
 msgid "Latest additions"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>
@@ -6543,6 +6529,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- pl.po       11 Feb 2019 12:59:22 -0000      1.27
+++ pl.po       13 Feb 2019 12:00:24 -0000      1.28
@@ -3936,6 +3936,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -6004,27 +6011,6 @@
 msgid "Latest additions"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>
@@ -6054,6 +6040,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- pot 11 Feb 2019 12:59:22 -0000      1.27
+++ pot 13 Feb 2019 12:00:24 -0000      1.28
@@ -3759,6 +3759,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -5501,6 +5508,26 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr ""
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+
 #. type: Content of: <ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
@@ -5522,26 +5549,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr ""
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr ""
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-surveillance.de-diff.html       8 Feb 2019 09:30:04 -0000       
1.42
+++ proprietary-surveillance.de-diff.html       13 Feb 2019 12:00:24 -0000      
1.43
@@ -1015,16 +1015,42 @@
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that</em></ins></span> this
-      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+      <span class="removed"><del><strong>would require circumventing the iOS 
DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
+    makes it even</em></ins></span> more <span 
class="removed"><del><strong>advanced way really does turn them off&mdash;only 
until 5am.
+      That's Apple</strong></del></span> <span 
class="inserted"><ins><em>vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    is not a cure</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> the 
<span class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users</strong></del></span> <span 
class="inserted"><ins><em>the nasty thing, but</em></ins></span> cannot make 
<span class="removed"><del><strong>an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span> <span class="inserted"><ins><em>it 
less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1032,102 +1058,82 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
-      obvious way</strong></del></span> <span class="inserted"><ins><em>150 
most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span>
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have</em></ins></span> a <span 
class="removed"><del><strong>valid email address and 
receiving</strong></del></span> <span class="inserted"><ins><em>surveillance 
feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="inserted"><ins><em>150</em></ins></span> most popular <span 
class="removed"><del><strong>iOS</strong></del></span>
+    <span class="inserted"><ins><em>gratis VPN</em></ins></span> apps <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;
+    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>use it without 
having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>DNS leaks. In
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>users’ privacy&lt;/a&gt; due</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>tell whether the phone is 
snooping</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
-    found as well.&lt;/p&gt;
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found</em></ins></span> as <span class="removed"><del><strong>accessed on 
24 Sep 2015.) The iCloud feature is</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal data to Apple's 
servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
+      startup</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span>
     <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>a way 
to &lt;a href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis,</em></ins></span> but <span 
class="removed"><del><strong>it's active by default so</strong></del></span> 
<span class="inserted"><ins><em>they are &lt;em&gt;not&lt;/em&gt; &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that <span 
class="inserted"><ins><em>it notify</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>users of 
what it will do
-    with</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>valid email address and 
receiving</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company does
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS</strong></del></span> <span 
class="inserted"><ins><em>gratis Android</em></ins></span> apps &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span>
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>photos 
and
-      videos</strong></del></span> <span class="inserted"><ins><em>user's 
actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>send</em></ins></span> 
the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by 
default</strong></del></span> <span class="inserted"><ins><em>machine's 
&ldquo;advertising ID,&rdquo;</em></ins></span> so <span 
class="removed"><del><strong>it still counts as a
-      surveillance functionality.&lt;/p&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>that
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook</em></ins></span> can <span class="removed"><del><strong>access 
any</strong></del></span> <span class="inserted"><ins><em>correlate the data it 
obtains from the same machine via
     various apps. Some</em></ins></span> of them <span 
class="removed"><del><strong>through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
@@ -1143,36 +1149,34 @@
   &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
       <span class="removed"><del><strong>&lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
       enabled by default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span>
-    <span class="inserted"><ins><em>using that app,</em></ins></span> but 
<span class="removed"><del><strong>it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> that <span class="removed"><del><strong>can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>alone is often quite informative.&lt;/p&gt;
+    <span class="inserted"><ins><em>using that app,</em></ins></span> but 
<span class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>that alone</em></ins></span> is <span 
class="removed"><del><strong>still true in iOS 
7.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>often quite 
informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span>
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>data in an 
iThing,
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>NSA snoop 
on all the data in an iThing,
       or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1236,32 +1240,33 @@
     &lt;p&gt;If you learn to care</em></ins></span> much <span 
class="removed"><del><strong>data that their transmission</strong></del></span> 
<span class="inserted"><ins><em>less about sports, you will benefit in
     many ways. This</em></ins></span> is <span class="removed"><del><strong>a
       substantial expense for users.  Said transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+      requested</strong></del></span> <span class="inserted"><ins><em>one 
more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied</em></ins></span> by <span 
class="inserted"><ins><em>researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>user, clearly must 
constitute spying of</strong></del></span> <span class="inserted"><ins><em>apps 
were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only</em></ins></span> some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>5,855</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>apps studied</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
-      reports</strong></del></span> <span 
class="inserted"><ins><em>researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? 
laptops):</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
+    source code they cannot look at.</em></ins></span>  The <span 
class="removed"><del><strong>Wall
+      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    Android</em></ins></span> by <span class="removed"><del><strong>a paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching to Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns</em></ins></span>
@@ -1306,8 +1311,9 @@
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
       (The US says it will eventually require</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads</em></ins></span> all <span class="removed"><del><strong>new 
portable phones</strong></del></span> <span class="inserted"><ins><em>phone 
numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses the words
+    uploads</em></ins></span> all <span class="removed"><del><strong>new 
portable phones
+      to</strong></del></span> <span class="inserted"><ins><em>phone numbers 
and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -3131,7 +3137,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- proprietary-surveillance.de.po      8 Feb 2019 09:30:04 -0000       1.258
+++ proprietary-surveillance.de.po      13 Feb 2019 12:00:24 -0000      1.259
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- proprietary-surveillance.fr.po      8 Feb 2019 10:10:56 -0000       1.373
+++ proprietary-surveillance.fr.po      13 Feb 2019 12:00:24 -0000      1.374
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-08 11:08+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1407,6 +1408,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-surveillance.it-diff.html       8 Feb 2019 09:30:04 -0000       
1.109
+++ proprietary-surveillance.it-diff.html       13 Feb 2019 12:00:24 -0000      
1.110
@@ -1136,98 +1136,68 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN</em></ins></span> apps <span class="inserted"><ins><em>in 
Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>top 10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
-    with the data is a secondary issue. The principal wrong here 
is</em></ins></span> that
-    <span class="inserted"><ins><em>the company gets that 
data</em></ins></span> at <span class="removed"><del><strong>least is 
visible</strong></del></span> <span class="inserted"><ins><em>all.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>mobile devices report which other
+    apps the user has
+    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>interacting with</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect privacy:
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile apps for children don't respect privacy:
       &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>data it obtains 
from</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span> <span 
class="inserted"><ins><em>popular
+    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>snoop 
on the user&lt;/a&gt;. This is</strong></del></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question</strong></del></span> 
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    
href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>whether</strong></del></span>
+    the <span class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of whether the 
<span class="removed"><del><strong>app developers get</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span class="removed"><del><strong>because it 
asked the user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This 
shows</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>what it will do
+    with the data.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending it to</strong></del></span> other <span 
class="removed"><del><strong>companies.  This shows the
-      weakness</strong></del></span> <span 
class="inserted"><ins><em>kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
-    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>flashlight
       app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1236,118 +1206,193 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
+    with the</em></ins></span> data <span class="removed"><del><strong>about 
them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
-    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's</strong></del></span> <span class="inserted"><ins><em>obtains 
from the same machine via
+    various apps. Some of them send Facebook detailed</em></ins></span> 
information <span class="removed"><del><strong>on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More</strong></del></span> <span class="inserted"><ins><em>care much 
less</em></ins></span> about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;
+      More</strong></del></span> about <span class="removed"><del><strong>NSA 
app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span>
+    <span class="inserted"><ins><em>the user's activities</em></ins></span> in 
the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> of <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute by
+      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>user's 
location even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span> <span class="inserted"><ins><em>apps 
were
-    found to insecurely snitch</em></ins></span> on its <span 
class="removed"><del><strong>users through the</strong></del></span> <span 
class="inserted"><ins><em>users.  Furthermore, they could
-    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>totally inadequate proposed 
response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>had sold the data</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="inserted"><ins><em>save</em></ins></span>
+    a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>recording. But I can't be sure 
from</em></ins></span> the <span class="removed"><del><strong>data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
     
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span class="removed"><del><strong>company has 
been ordered</strong></del></span> <span class="inserted"><ins><em>5,855 
Android apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>the apps were
+    found</em></ins></span> to <span class="inserted"><ins><em>insecurely 
snitch on</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android</em></ins></span> by <span class="removed"><del><strong>a person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span>
-    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;</em></ins></span> that 
<span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    need</em></ins></span> to <span class="inserted"><ins><em>get rid 
of</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>free 
software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer 
and</strong></del></span> <span class="inserted"><ins><em>user if an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects</em></ins></span> information about <span 
class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>data may</strong></del></span> <span 
class="inserted"><ins><em>information to
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could</em></ins></span> be
-      <span class="removed"><del><strong>true,</strong></del></span> <span 
class="inserted"><ins><em>designed so that users communicate such info to each
-    other</em></ins></span> but <span class="removed"><del><strong>it doesn't 
really matter. If it had sold</strong></del></span> <span 
class="inserted"><ins><em>not to</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    It</em></ins></span> could <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>be designed so that users communicate such 
info</em></ins></span> to <span class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>each
+    other but not</em></ins></span> to <span class="inserted"><ins><em>the 
server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
+    spy on <span class="removed"><del><strong>children</strong></del></span> 
<span class="inserted"><ins><em>users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1355,149 +1400,129 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="removed"><del><strong>figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that</em></ins></span> this 
<span class="removed"><del><strong>lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>article misuses</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>words
+    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
+    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>zero 
price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    &lt;p&gt;Google</em></ins></span> did not <span 
class="removed"><del><strong>affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that, and deleted these apps 
after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="inserted"><ins><em>better job of preventing apps from
-    cheating? There is no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="inserted"><ins><em>study</em></ins></span>
-    the <span class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>source code somehow to determine whether they 
mistreat users in
-    various ways. If it did a good job of this, it</em></ins></span> could 
<span class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>more or less
-    prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>outsmart the 
checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
+    &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>demands to personal data in</em></ins></span> the 
<span class="removed"><del><strong>emails of members</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+  &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
@@ -1888,12 +1913,7 @@
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was</em></ins></span> in 
<span class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
+    surveillance, even if it were not hidden as it was in these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1958,30 +1978,21 @@
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
+    software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
+  &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
@@ -2953,7 +2964,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.it.po      8 Feb 2019 09:30:04 -0000       1.271
+++ proprietary-surveillance.it.po      13 Feb 2019 12:00:24 -0000      1.272
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1799,6 +1799,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-surveillance.ja-diff.html       8 Feb 2019 09:30:04 -0000       
1.119
+++ proprietary-surveillance.ja-diff.html       13 Feb 2019 12:00:24 -0000      
1.120
@@ -1026,8 +1026,7 @@
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1036,48 +1035,55 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>150 most 
popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>mobile devices report which other
+    apps the user has
+    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
     is doing this</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>others do.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>interacting with</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile</strong></del></span> <span 
class="inserted"><ins><em>popular
+    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often</em></ins></span> used <span 
class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>for invasive advertising&mdash;that could
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>users of what it will 
do
-    with</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that 
these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>what it will do
+    with</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>question of 
whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
secondary issue. The principal wrong here is that
+    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>about 
a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1123,15 +1129,15 @@
   &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them</strong></del></span> <span class="inserted"><ins><em>that have 
deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them</strong></del></span> <span class="inserted"><ins><em>disable 
&ldquo;location
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways</em></ins></span> to
@@ -1307,26 +1313,36 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that, and deleted these apps 
after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
 <span class="inserted"><ins><em>various ways to prevent that, and deleted 
these apps after
-    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
-    for <span class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
+    to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
@@ -1335,10 +1351,7 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
-
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -1346,19 +1359,12 @@
   &lt;li&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
       href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If</em></ins></span> it <span class="inserted"><ins><em>did 
a good job of this, it could more or less
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and 
study</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer is 
using</strong></del></span> <span class="inserted"><ins><em>source code somehow 
to determine whether they mistreat users in
+    various ways. If it did a good job of this,</em></ins></span> it <span 
class="inserted"><ins><em>could more or less
     prevent such snooping, except when the app developers are clever
     enough</em></ins></span> to outsmart
       <span class="removed"><del><strong>you.&lt;/p&gt;
@@ -1491,15 +1497,10 @@
     explicitly opt-in before</em></ins></span> the <span 
class="removed"><del><strong>data
       and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</em></ins></span>
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+  &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
     user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
@@ -1987,12 +1988,16 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span>
+
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2014,7 +2019,7 @@
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
     manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making</em></ins></span> sure <span 
class="inserted"><ins><em>they don't get to
+    security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2065,7 +2070,7 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
@@ -2781,7 +2786,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary-surveillance.ja.po      8 Feb 2019 09:30:04 -0000       1.244
+++ proprietary-surveillance.ja.po      13 Feb 2019 12:00:24 -0000      1.245
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-surveillance.pot        8 Feb 2019 09:30:04 -0000       1.192
+++ proprietary-surveillance.pot        13 Feb 2019 12:00:24 -0000      1.193
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";>
 "
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a "
 "href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.466
retrieving revision 1.467
diff -u -b -r1.466 -r1.467
--- proprietary-surveillance.ru.po      8 Feb 2019 12:29:08 -0000       1.466
+++ proprietary-surveillance.ru.po      13 Feb 2019 12:00:24 -0000      1.467
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary.de-diff.html    8 Feb 2019 09:30:04 -0000       1.44
+++ proprietary.de-diff.html    13 Feb 2019 12:00:24 -0000      1.45
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -237,20 +243,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +303,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.de.po   8 Feb 2019 09:30:04 -0000       1.86
+++ proprietary.de.po   13 Feb 2019 12:00:24 -0000      1.87
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -500,27 +507,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.es.po   11 Feb 2019 12:15:03 -0000      1.96
+++ proprietary.es.po   13 Feb 2019 12:00:24 -0000      1.97
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-11 12:49+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -409,37 +417,6 @@
 "El espionaje se produce con independencia de que el usuario tenga cuenta en "
 "Facebook."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"El software para para tratamiento de gráficos de Foundry <a href=\"https://";
-"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
-"computers-181102/\">envía información para identificar a quien lo está "
-"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
-"elevada suma de dinero."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
-"hace incuso más vil."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Esto muestra que hacer copias no autorizadas de software que no es libre no "
-"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
-"se pague por algo malo, pero no lo hace menos malo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +496,34 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "El software para para tratamiento de gráficos de Foundry <a href="
+#~ "\"https://torrentfreak.com/software-company-fines-pirates-after-";
+#~ "monitoring-their-computers-181102/\">envía información para identificar 
a "
+#~ "quien lo está utilizando</a>. La consecuencia es a menudo una amenaza "
+#~ "lega exigiendo una elevada suma de dinero."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "El hecho de que lo utilicen para reprimir la compartición no autorizada "
+#~ "lo hace incuso más vil."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Esto muestra que hacer copias no autorizadas de software que no es libre "
+#~ "no es un remedio contra la injusticia de ese tipo de software. Puede "
+#~ "evitar que se pague por algo malo, pero no lo hace menos malo."
+
+#~ msgid ""
 #~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
 #~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
 #~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.fr.po   8 Feb 2019 10:10:56 -0000       1.119
+++ proprietary.fr.po   13 Feb 2019 12:00:25 -0000      1.120
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-08 11:08+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -405,37 +413,6 @@
 msgstr ""
 "Cet espionnage se produit que l'utilisateur ait un compte Facebook ou non."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"Les logiciels de Foundry <a href=\"https://torrentfreak.com/software-company-";
-"fines-pirates-after-monitoring-their-computers-181102/\">font remonter des "
-"informations permettant d'identifier qui les utilise</a>. Cela se traduit "
-"souvent par la demande d'une grosse somme d'argent sous la menace d'un "
-"procès."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"Le fait qu'il soit utilisé pour réprimer le partage non autorisé rend ce "
-"procédé encore plus vicieux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Ceci montre que la copie non autorisée de logiciels non libres n'est pas un "
-"remède contre l'injustice qu'ils représentent. Elle permet ne pas payer 
pour "
-"ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -509,3 +486,32 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "Les logiciels de Foundry <a href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\">font "
+#~ "remonter des informations permettant d'identifier qui les utilise</a>. "
+#~ "Cela se traduit souvent par la demande d'une grosse somme d'argent sous "
+#~ "la menace d'un procès."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "Le fait qu'il soit utilisé pour réprimer le partage non autorisé rend 
ce "
+#~ "procédé encore plus vicieux."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Ceci montre que la copie non autorisée de logiciels non libres n'est pas "
+#~ "un remède contre l'injustice qu'ils représentent. Elle permet ne pas "
+#~ "payer pour ces choses malfaisantes, mais ne peut pas les rendre moins "
+#~ "malfaisantes."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.it-diff.html    8 Feb 2019 09:30:05 -0000       1.56
+++ proprietary.it-diff.html    13 Feb 2019 12:00:25 -0000      1.57
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
@@ -182,6 +182,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -236,20 +242,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.it.po   8 Feb 2019 09:30:05 -0000       1.95
+++ proprietary.it.po   13 Feb 2019 12:00:25 -0000      1.96
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -504,27 +511,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.ja-diff.html    8 Feb 2019 09:30:05 -0000       1.57
+++ proprietary.ja-diff.html    13 Feb 2019 12:00:25 -0000      1.58
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -95,16 +95,16 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -155,10 +155,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -179,6 +179,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -233,20 +239,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.ja.po   8 Feb 2019 09:30:05 -0000       1.78
+++ proprietary.ja.po   13 Feb 2019 12:00:25 -0000      1.79
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -424,27 +431,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.nl-diff.html    8 Feb 2019 09:30:05 -0000       1.56
+++ proprietary.nl-diff.html    13 Feb 2019 12:00:25 -0000      1.57
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -182,6 +182,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -236,20 +242,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.nl.po   8 Feb 2019 09:30:05 -0000       1.67
+++ proprietary.nl.po   13 Feb 2019 12:00:25 -0000      1.68
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -497,27 +504,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.pl-diff.html    8 Feb 2019 09:30:05 -0000       1.74
+++ proprietary.pl-diff.html    13 Feb 2019 12:00:25 -0000      1.75
@@ -87,8 +87,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
-instances of malicious functionalities (with more than 400 references to
+&lt;p&gt;As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -124,14 +124,14 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -156,10 +156,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -180,6 +180,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -234,20 +240,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -308,7 +300,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.pl.po   8 Feb 2019 09:30:05 -0000       1.62
+++ proprietary.pl.po   13 Feb 2019 12:00:25 -0000      1.63
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -579,27 +586,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary.pot     8 Feb 2019 09:30:05 -0000       1.59
+++ proprietary.pot     13 Feb 2019 12:00:25 -0000      1.60
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";>
 "
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a "
 "href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "
@@ -314,27 +321,6 @@
 msgid "This spying occurs regardless of whether the user has a Facebook 
account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a "
-"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\";>
 "
-"reports information to identify who is running it</a>. The result is often a "
-"legal threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary.pt-br.po        8 Feb 2019 20:12:35 -0000       1.80
+++ proprietary.pt-br.po        13 Feb 2019 12:00:25 -0000      1.81
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-02-08 16:42-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -400,36 +408,6 @@
 "Esta espionagem ocorre independentemente de o usuário ter uma conta no "
 "Facebook."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"O software gráfico da Foundry <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> relata "
-"informações para identificar quem está executando-o </a>. O resultado é "
-"muitas vezes uma ameaça legal que exige muito dinheiro."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"O fato de que isso é usado para repressão de compartilhamento proibido 
torna "
-"ainda mais cruel."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Isso mostra que fazer cópias não autorizadas de software não livre não é 
uma "
-"cura para a injustiça do software não livre. Pode evitar pagar pelo "
-"desagradável, mas não pode torná-lo menos desagradável."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +483,33 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "O software gráfico da Foundry <a 
href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> relata "
+#~ "informações para identificar quem está executando-o </a>. O resultado 
é "
+#~ "muitas vezes uma ameaça legal que exige muito dinheiro."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "O fato de que isso é usado para repressão de compartilhamento proibido "
+#~ "torna ainda mais cruel."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Isso mostra que fazer cópias não autorizadas de software não livre não 
é "
+#~ "uma cura para a injustiça do software não livre. Pode evitar pagar pelo "
+#~ "desagradável, mas não pode torná-lo menos desagradável."
+
+#~ msgid ""
 #~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
 #~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
 #~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.ru.po   8 Feb 2019 12:29:08 -0000       1.148
+++ proprietary.ru.po   13 Feb 2019 12:00:25 -0000      1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -407,36 +415,6 @@
 "Эта слежка происходит независимо от того, 
есть ли у пользователя учетная "
 "запись Facebook."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"Графические программы Foundry <a 
href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> 
сообщают "
-"сведения для идентификации того, кто с 
ними работает</a>. Часто это приводит "
-"к угрозе судебного преследования с 
требованием большого количества денег."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"Тот факт, что это применяется для 
подавления запрещенного обмена, делает это 
"
-"еще более порочным."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Это показывает, что создание 
несанкционированных копий несвободных 
программ "
-"не избавляет от несправедливости 
несвободных программ. Возможно, это "
-"позволяет не платить за эту гадость, но 
меньшей гадостью это ее не делает."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -516,6 +494,35 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "Графические программы Foundry <a 
href=\"https://torrentfreak.com/software-";
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> "
+#~ "сообщают сведения для идентификации 
того, кто с ними работает</a>. Часто "
+#~ "это приводит к угрозе судебного 
преследования с требованием большого "
+#~ "количества денег."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "Тот факт, что это применяется для 
подавления запрещенного обмена, делает "
+#~ "это еще более порочным."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Это показывает, что создание 
несанкционированных копий несвободных "
+#~ "программ не избавляет от 
несправедливости несвободных программ. 
Возможно, "
+#~ "это позволяет не платить за эту гадость, 
но меньшей гадостью это ее не "
+#~ "делает."
+
+#~ msgid ""
 #~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
 #~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
 #~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary.zh-tw-diff.html 8 Feb 2019 09:30:05 -0000       1.34
+++ proprietary.zh-tw-diff.html 13 Feb 2019 12:00:25 -0000      1.35
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
@@ -237,20 +243,6 @@
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +303,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.zh-tw.po        8 Feb 2019 09:30:05 -0000       1.45
+++ proprietary.zh-tw.po        13 Feb 2019 12:00:25 -0000      1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -413,27 +420,6 @@
 "This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pt-br.po    11 Feb 2019 12:59:23 -0000      1.37
+++ pt-br.po    13 Feb 2019 12:00:25 -0000      1.38
@@ -4017,6 +4017,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -5967,6 +5974,34 @@
 msgid "Latest additions"
 msgstr "Últimas adições"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
+#. type: Content of: <title>
+#, fuzzy
+#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+
 #. type: Content of: <ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
@@ -5997,34 +6032,6 @@
 "cura para a injustiça do software não livre. Pode evitar pagar pelo "
 "desagradável, mas não pode torná-lo menos desagradável."
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
-#. type: Content of: <title>
-#, fuzzy
-#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr ""
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- ru.po       11 Feb 2019 13:58:59 -0000      1.64
+++ ru.po       13 Feb 2019 12:00:25 -0000      1.65
@@ -5607,6 +5607,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -8145,6 +8152,31 @@
 msgid "Latest additions"
 msgstr "Последние добавления"
 
+#. type: Content of: <div><p>
+msgid ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr ""
+"Саботаж несвободных программ - Проект GNU - 
Фонд свободного программного "
+"обеспечения"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr "Саботаж несвободных программ"
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+"Вот примеры несвободных программ, в 
которых есть кое-что похуже, чем лазейки."
+
 #. type: Content of: <ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
@@ -8175,31 +8207,6 @@
 "не избавляет от несправедливости 
несвободных программ. Возможно, это "
 "позволяет не платить за эту гадость, но 
меньшей гадостью это ее не делает."
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr ""
-"Саботаж несвободных программ - Проект GNU - 
Фонд свободного программного "
-"обеспечения"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr "Саботаж несвободных программ"
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-"Вот примеры несвободных программ, в 
которых есть кое-что похуже, чем лазейки."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- zh-tw.po    11 Feb 2019 12:59:23 -0000      1.27
+++ zh-tw.po    13 Feb 2019 12:00:25 -0000      1.28
@@ -3888,6 +3888,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://";
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "An investigation of the 150 most popular gratis VPN apps in Google Play "
 "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
@@ -5780,27 +5787,6 @@
 msgid "Latest additions"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
@@ -5831,6 +5817,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Canary home surveillance camera has been sabotaged by its manufacturer, "
 "<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-";
 "smart-home-camera-free-service-update-change\"> turning off many features "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]