www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Fri, 22 Feb 2019 09:31:01 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/22 09:31:00

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.471&r2=1.472
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.32&r2=1.33

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- de.po       22 Feb 2019 11:31:42 -0000      1.32
+++ de.po       22 Feb 2019 14:30:58 -0000      1.33
@@ -2130,11 +2130,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- es.po       22 Feb 2019 11:31:43 -0000      1.42
+++ es.po       22 Feb 2019 14:30:58 -0000      1.43
@@ -1687,11 +1687,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- fr.po       22 Feb 2019 11:31:43 -0000      1.57
+++ fr.po       22 Feb 2019 14:30:58 -0000      1.58
@@ -1686,11 +1686,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- it.po       22 Feb 2019 11:31:43 -0000      1.32
+++ it.po       22 Feb 2019 14:30:58 -0000      1.33
@@ -2074,11 +2074,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- ja.po       22 Feb 2019 11:31:43 -0000      1.32
+++ ja.po       22 Feb 2019 14:30:58 -0000      1.33
@@ -1752,11 +1752,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-appliances.de-diff.html     22 Feb 2019 11:31:43 -0000      1.33
+++ malware-appliances.de-diff.html     22 Feb 2019 14:30:58 -0000      1.34
@@ -66,58 +66,57 @@
 here, please write</em></ins></span>
 to <span class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
         of</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
-to serve as specific substantiation.&lt;/p&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span> 
two <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span class="inserted"><ins><em>to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt; which save it
+    permanently.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
+      is a surveillance device.</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
        Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact
-      that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> the 
<span class="removed"><del><strong>fact
+      that</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt; which save</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span>
-    <span class="inserted"><ins><em>permanently.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>TV sees,” in</em></ins></span> the <span 
class="removed"><del><strong>company
+    &lt;p&gt;But it also demonstrates that the device gives the company
       surveillance capability.&lt;/p&gt;
 &lt;/li&gt;
   
 &lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals is connected to</strong></del></span> <span 
class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally &lt;a
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump 
designed</strong></del></span> <span class="inserted"><ins><em>third parties. 
This is in return</em></ins></span> for
+    <span class="removed"><del><strong>hospitals</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span> to <span 
class="removed"><del><strong>the internet. Naturally &lt;a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note that</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and</em></ins></span> this <span class="removed"><del><strong>article 
misuses the term &lt;a
+  &lt;p&gt;Note that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the term &lt;a
 
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring</strong></del></span> <span class="inserted"><ins><em>data is 
sold</em></ins></span> to <span class="removed"><del><strong>crackers.&lt;/p&gt;
+     referring to crackers.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;The bad security</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>many Internet of Stings devices
-    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>snoop on the people that use 
them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
 <span class="inserted"><ins><em>spying acceptable, according</em></ins></span> 
to <span class="removed"><del><strong>snoop on the people that use 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
-  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according to him,</em></ins></span>
+  &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>him,</em></ins></span>
     is <span class="removed"><del><strong>unfortunate</strong></del></span> 
that <span class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>article 
uses</strong></del></span> <span class="inserted"><ins><em>Vizio software is
     nonfree, we don't know what is actually happening behind</em></ins></span> 
the
   <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
@@ -127,457 +126,400 @@
   &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
   They have login accounts with hard-coded passwords, which can't be
   changed,</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
-    and <span class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>there</em></ins></span> is no <span 
class="removed"><del><strong>way to
-  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>guarantee</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
-medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span> <span class="inserted"><ins><em>all future 
updates will leave the
+    and <span class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>there</em></ins></span> is no <span 
class="inserted"><ins><em>guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span> 
for <span class="removed"><del><strong>its headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses</strong></del></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
-If the fine print of</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that</strong></del></span> <span class="inserted"><ins><em>easiest way 
to</em></ins></span> make <span 
class="inserted"><ins><em>sure</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on 
you is</em></ins></span>
-    to <span class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
+    matter), the easiest</em></ins></span> way to
+  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with</strong></del></span> 
<span class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
-  tethered them</strong></del></span>
-    <span class="inserted"><ins><em>firewall to block 
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's 
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote 
server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>make sure it isn't 
spying on you is
+    to disconnect it from the Internet,</em></ins></span> and <span 
class="removed"><del><strong>other
+medical devices</strong></del></span> <span class="inserted"><ins><em>use a 
terrestrial antenna
+    instead. Unfortunately, this</em></ins></span> is <span 
class="inserted"><ins><em>not always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher 
is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span>
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>cracker can gain 
access to the dishwasher's filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>better
+    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>with malware, and force the 
dishwasher</strong></del></span> <span class="inserted"><ins><em>suggested that 
these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
- other devices</strong></del></span> <span class="inserted"><ins><em>look at 
what's</em></ins></span> in the <span class="removed"><del><strong>network. 
Since these dishwashers</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's 
not</em></ins></span>
+    security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>for your home. Security means making sure they 
don't get to
+    see through your camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>used in hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span 
class="inserted"><ins><em>very innovative&mdash;at blocking the
-    use</em></ins></span> of <span class="removed"><del><strong>lives at 
risk.&lt;/p&gt;
-
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>independent 
replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> <span 
class="inserted"><ins><em>very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="inserted"><ins><em>thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything that is viewed on them, and not just 
broadcasts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance,</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>danger of sabotage&lt;/a&gt; (of a specific 
user, or of
-    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>risk of an outage (which</em></ins></span> is <span 
class="removed"><del><strong>coming from the user's own
-    computer, the TV reports</strong></del></span> what <span 
class="removed"><del><strong>it is. The existence of a way to
-    disable</strong></del></span>
-    <span class="inserted"><ins><em>just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>desired temperature 
requires running
-    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span class="removed"><del><strong>was in
-    these TVs, does not legitimize</strong></del></span>
-    <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>thermostat.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
+    only through</em></ins></span> the <span class="removed"><del><strong>app 
would record</strong></del></span> <span class="inserted"><ins><em>company's 
server. They have
+    all</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>nasty characteristics</em></ins></span> of <span 
class="removed"><del><strong>the audio files</strong></del></span> <span 
class="inserted"><ins><em>such devices: &lt;a
+    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
+    all</em></ins></span> users <span class="removed"><del><strong>listen to 
along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>at once), as well 
as</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span 
class="inserted"><ins><em>risk</em></ins></span> of <span 
class="inserted"><ins><em>an outage (which is what
+    just happened).&lt;/p&gt;
+
+    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>desired 
temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span class="removed"><del><strong>acceptable? No way! 
It should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design</strong></del></span>
+    <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
+  &lt;li <span class="removed"><del><strong>id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a 
downgrade</strong></del></span> <span 
class="inserted"><ins><em>id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to &lt;a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="inserted"><ins><em>people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807050"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>Jawbone fitness tracker</em></ins></span> was <span 
class="removed"><del><strong>as of 2014, but we don't expect this has got
-better.&lt;/p&gt;
-
-&lt;p&gt;This shows that laws requiring products</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-consent before collecting personal data are totally inadequate.  And
-what happens if</strong></del></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>proprietary phone
-    app.  In 2017,</em></ins></span> the <span class="removed"><del><strong>TV 
will say,
-&ldquo;Without your consent to tracking,</strong></del></span> <span 
class="inserted"><ins><em>company shut down and made</em></ins></span> the 
<span class="removed"><del><strong>TV will not
-work.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>app stop working. &lt;a
+  &lt;li id="M201807050"&gt;
+    &lt;p&gt;The Jawbone fitness tracker was</em></ins></span> tethered <span 
class="removed"><del><strong>them</strong></del></span> to a <span 
class="removed"><del><strong>remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone
+    app.  In 2017, the company shut down and made the app stop working. &lt;a
     
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on a further nasty fillip,</em></ins></span> 
that <span class="removed"><del><strong>TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>sales of the
-    broken devices continued. But I think that is a secondary issue;
-    it made the nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
-    The fundamental wrong was to design</em></ins></span> the <span 
class="inserted"><ins><em>devices to depend on something
-    else that didn't respect users' freedom.&lt;/p&gt;
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet</strong></del></span> <span 
class="inserted"><ins><em>a further nasty fillip, that sales</em></ins></span> 
of <span class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span>
+    <span class="inserted"><ins><em>broken devices continued. But I think 
that</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example,</strong></del></span> a <span 
class="removed"><del><strong>cracker can gain access to the dishwasher's 
filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>secondary 
issue;</em></ins></span>
+    it <span class="removed"><del><strong>with malware, and 
force</strong></del></span> <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>dishwasher</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span class="inserted"><ins><em>some 
additional people.
+    The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
+ such attacks could potentially put hundreds of lives at 
risk.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>devices 
to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company &lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>by
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
     sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;</em></ins></span>
-    &lt;p&gt;Some <span class="removed"><del><strong>LG</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;Smart&rdquo;</em></ins></span> TVs <span 
class="inserted"><ins><em>automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
-tyrants&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
 
-&lt;li&gt;&lt;a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into the base
-for</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>is viewed on them, and not just broadcasts
+      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>do this</strong></del></span> <span 
class="inserted"><ins><em>the article for the facts it presents. 
It</em></ins></span>
-    is <span class="inserted"><ins><em>too bad</em></ins></span> that <span 
class="removed"><del><strong>Linux is released under
-GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
-together with a weak interpretation</strong></del></span> <span 
class="inserted"><ins><em>the article finishes by advocating the
-    moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL 
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>article for the facts it presents. 
It</em></ins></span>
+    is <span class="removed"><del><strong>coming from</strong></del></span> 
<span class="inserted"><ins><em>too bad that</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>article 
finishes by advocating</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by</em></ins></span> being <span 
class="removed"><del><strong>sued for collecting lots of personal information 
about how
-people use it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>a data broker,</strong></del></span> <span 
class="inserted"><ins><em>be incompatible
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed to be incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>dangers 
of</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even</strong></del></span> <span 
class="inserted"><ins><em>dangers of the &ldquo;internet of stings&rdquo;
+    is that,</em></ins></span> if <span class="removed"><del><strong>it were 
not hidden as it was in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>you lose your internet service, you also &lt;a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;internet of stings&rdquo;
-    is that, if you lose your internet service, you also</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose</em></ins></span> control <span class="removed"><del><strong>products 
that depended on</strong></del></span> <span class="inserted"><ins><em>of your 
house and appliances&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
-on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the
-    real internet.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;For your safety, don't use any appliance with a connection 
to</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;ARRIS cable modem</strong></del></span>
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has a <span 
class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The report was as of 2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>front 
doors&lt;/a&gt;. Wouldn't you know
+    it, the system</em></ins></span> has <span class="removed"><del><strong>got
+better.&lt;/p&gt;
+
+&lt;p&gt;This shows that laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate.  And
+what happens if</strong></del></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking, the TV will not
+work.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;Proper laws would say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
+&lt;p&gt;Some LG
+TVs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access to</strong></del></span>
+    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>server through which</em></ins></span> the 
<span class="removed"><del><strong>back door allows
-installation of software changes,</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
+    turning off</em></ins></span> the <span class="removed"><del><strong>base
+for a tyrant system&lt;/a&gt; so as to impose DRM.
+What enables Samsung to do</strong></del></span> <span 
class="inserted"><ins><em>server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this is to pressure them to 
buy</em></ins></span> a <span class="removed"><del><strong>change could be 
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
-<span class="removed"><del><strong>would give access</strong></del></span>
-    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>talk with 
them through some specialized service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The owners suspect</em></ins></span> this is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>Linux is 
released under
+GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together</strong></del></span>
+    <span class="inserted"><ins><em>requires users to talk</em></ins></span> 
with <span class="removed"><del><strong>a weak interpretation of GPL version 
2.</strong></del></span> <span class="inserted"><ins><em>them through some 
specialized service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have a back door for changing settings 
in</strong></del></span>
+&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is</em></ins></span> a
-<span class="removed"><del><strong>dlink of an eye.&lt;/p&gt;
-
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>surveillance 
device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many
 models of routers
-have back doors&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has</strong></del></span>
+    manufacturer can communicate with it, is a surveillance 
device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+being sued for collecting lots of personal information about how
+people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on
-    the fact that the device is tethered to</em></ins></span> a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>server.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>company's statement that 
it anonymizes</strong></del></span> <span class="inserted"><ins><em>article 
describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If it sells</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>fact that the device is tethered</em></ins></span> to 
a <span class="removed"><del><strong>data broker,
+the data broker can figure out who</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates that the device gives the company
+    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
     surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was</strong></del></span>
+&lt;p&gt;Google/Alphabet</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump</em></ins></span>
-    designed <span class="removed"><del><strong>with DRM&lt;/a&gt;: it won't 
accept
-third-party printing materials.  It</strong></del></span> <span 
class="inserted"><ins><em>for hospitals</em></ins></span> is <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
-being discontinued, which means</strong></del></span> <span 
class="inserted"><ins><em>internet. Naturally &lt;a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
+    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic control 
products</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>eventually authorized materials won't
-be available and</strong></del></span> <span class="inserted"><ins><em>this 
article misuses</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
-
-&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring to crackers.&lt;/p&gt;
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>depended on
+a server&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
article misuses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+    referring</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
+on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;ARRIS cable modem has a &lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="inserted"><ins><em>many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
-even</strong></del></span> <span class="inserted"><ins><em>people that use 
them&lt;/a&gt;.&lt;/p&gt;
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be a <span 
class="removed"><del><strong>remote possibility.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that use <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>author of</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="inserted"><ins><em>the</em></ins></span> article <span 
class="removed"><del><strong>says that there was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>give HP</strong></del></span> <span 
class="inserted"><ins><em>the article uses the term</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708230"&gt;
     &lt;p&gt;Sonos &lt;a
     
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>restrict users 
in</strong></del></span> <span class="inserted"><ins><em>snooping 
or</em></ins></span> the <span class="removed"><del><strong>first place.  This 
is like putting a &ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed, it is</strong></del></span> 
<span class="inserted"><ins><em>product will stop working&lt;/a&gt;.  &lt;a
+    to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if the back door allows
+installation of software changes, a</strong></del></span> <span 
class="inserted"><ins><em>product will stop working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
-    Another article&lt;/a&gt; says they won't forcibly 
change</em></ins></span> the <span class="removed"><del><strong>acceptance of
-their unjust practice that teaches</strong></del></span> <span 
class="inserted"><ins><em>software, but</em></ins></span>
-    people <span class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>won't</em></ins></span> be <span 
class="removed"><del><strong>doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>able to get any upgrades and eventually it will
+    Another article&lt;/a&gt; says they won't forcibly</em></ins></span> 
change <span class="removed"><del><strong>could</strong></del></span> <span 
class="inserted"><ins><em>the software, but
+    people won't</em></ins></span> be <span 
class="removed"><del><strong>installed that
+would give access</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>get any 
upgrades and eventually it will
     stop working.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs &lt;a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been designed not</strong></del></span>
+&lt;p&gt;&lt;a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>interact with</strong></del></span> 
<span class="inserted"><ins><em>snoop on</em></ins></span> other <span 
class="removed"><del><strong>companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>back door for changing 
settings</strong></del></span> <span class="inserted"><ins><em>DJI drone
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>a
+dlink of an eye.&lt;/p&gt;
 
-&lt;p&gt;If a product</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;smart&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models of Internet-connected cameras
-    are tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be 
changed,</em></ins></span> and <span class="removed"><del><strong>you didn't 
build it, it</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</em></ins></span>
-    is
-<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>no way to delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs and Bluray disks have DRM&lt;/a&gt;.
-&lt;/p&gt;
+    &lt;p&gt;Many</em></ins></span> models of <span 
class="removed"><del><strong>routers</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras
+    are tremendously insecure.  They</em></ins></span> have <span 
class="removed"><del><strong>back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;That page uses spin terms</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
-    &lt;p&gt;The proprietary code</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
-including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>runs pacemakers,
-    insulin pumps,</em></ins></span> and <span class="inserted"><ins><em>other 
medical devices is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross
+&lt;li&gt;
+&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed</strong></del></span> <span 
class="inserted"><ins><em>login
+    accounts</em></ins></span> with <span 
class="removed"><del><strong>DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is the Keurig of printers.  Now it is
+being discontinued,</strong></del></span> <span 
class="inserted"><ins><em>hard-coded passwords,</em></ins></span> which <span 
class="removed"><del><strong>means that eventually authorized materials 
won't</strong></del></span> <span 
class="inserted"><ins><em>can't</em></ins></span> be <span 
class="removed"><del><strong>available</strong></del></span> <span 
class="inserted"><ins><em>changed,</em></ins></span> and <span 
class="removed"><del><strong>the printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705250"&gt;
+    &lt;p&gt;The proprietary code</em></ins></span> that <span 
class="removed"><del><strong>gets the Respects Your Freedom&lt;/a&gt;, this 
problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
+    insulin pumps, and other medical devices is &lt;a
+    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
-    &lt;p&gt;Bird</em></ins></span> and <span class="removed"><del><strong>it 
claims</strong></del></span> <span class="inserted"><ins><em>rabbit pets were 
implemented for Second
-    Life by a company</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;artists&rdquo; (rather than 
companies)</strong></del></span> <span class="inserted"><ins><em>tethered their 
food to a server.  &lt;a
+    &lt;p&gt;Bird and rabbit pets were implemented for Second
+    Life by</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> that <span 
class="inserted"><ins><em>tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+    It shut down</em></ins></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>server and the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users</em></ins></span> are
-<span class="removed"><del><strong>primarily responsible</strong></del></span> 
<span class="inserted"><ins><em>suing Bose</em></ins></span> for <span 
class="removed"><del><strong>putting digital restrictions management into
-these disks.  Nonetheless, it is</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>reference</strong></del></span> <span 
class="inserted"><ins><em>spyware app</em></ins></span> for <span 
class="inserted"><ins><em>its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>app would record the names</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance cameras have &lt;a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that allow anyone</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen</em></ins></span> to 
<span class="removed"><del><strong>watch through them&lt;/a&gt;.&lt;/p&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>that article says that there was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the <span 
class="removed"><del><strong>device to restrict</strong></del></span> <span 
class="inserted"><ins><em>audio files</em></ins></span> users <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>listen to
+    along with</em></ins></span> the <span class="removed"><del><strong>first 
place.  This is like putting a &ldquo;cheat me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all 
companies</strong></del></span> <span class="inserted"><ins><em>headphone's 
unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>take advantage of people like him.  Indeed, it 
is</strong></del></span> <span class="inserted"><ins><em>this was done 
without</em></ins></span> the <span 
class="removed"><del><strong>acceptance</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If the fine print</em></ins></span> of
+<span class="removed"><del><strong>their unjust practice</strong></del></span> 
<span class="inserted"><ins><em>the app said</em></ins></span> that <span 
class="removed"><del><strong>teaches people to</strong></del></span> <span 
class="inserted"><ins><em>users gave consent for this,
+    would that make it acceptable? No way! It should</em></ins></span> be 
<span class="removed"><del><strong>doormats.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims</strong></del></span>
-    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses</em></ins></span> that this <span 
class="removed"><del><strong>is an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>was done 
without</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>users' consent.
-    If</em></ins></span> the <span 
class="removed"><del><strong>fault</strong></del></span> <span 
class="inserted"><ins><em>fine print</em></ins></span> of <span 
class="inserted"><ins><em>the</em></ins></span> app <span 
class="removed"><del><strong>developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>said that users gave 
consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to 
design</em></ins></span>
-    the <span class="removed"><del><strong>apps are proprietary 
software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to
-<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snoop at 
all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span> <span 
class="inserted"><ins><em>flat out</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>interact</strong></del></span> <span 
class="inserted"><ins><em>design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Malware found on &lt;a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera that records locally on physical media, and has no network
-connection, does not threaten people</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704120"&gt;
+  &lt;li id="M201704120"&gt;
     &lt;p&gt;Anova sabotaged users' cooking devices</em></ins></span>
-    with <span class="removed"><del><strong>surveillance&mdash;neither
-by watching people through the camera, nor through malware in the
-camera.&lt;/p&gt;
+    with <span class="removed"><del><strong>other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If</strong></del></span> a <span class="removed"><del><strong>product 
is &ldquo;smart&rdquo;, and you didn't build it, it is
+cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have</strong></del></span> a <span 
class="removed"><del><strong>Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>downgrade</em></ins></span> that <span 
class="removed"><del><strong>allows
-attackers</strong></del></span> <span class="inserted"><ins><em>tethered 
them</em></ins></span> to <span class="removed"><del><strong>send 
malware</strong></del></span> <span class="inserted"><ins><em>a remote server. 
&lt;a
-    
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
+&lt;p&gt;&lt;a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>downgrade</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>tethered them 
to a remote server.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
     users create an account on Anova's servers, their cookers won't
     function&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected</em></ins></span> to the <span 
class="removed"><del><strong>devices, which</strong></del></span> <span 
class="inserted"><ins><em>Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For example, a cracker</em></ins></span> can <span 
class="removed"><del><strong>subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>gain 
access</em></ins></span> to <span 
class="removed"><del><strong>computers</strong></del></span> <span 
class="inserted"><ins><em>the dishwasher's
+    &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware,</em></ins></span> and <span 
class="inserted"><ins><em>force the dishwasher to launch
-    attacks on</em></ins></span> other <span 
class="removed"><del><strong>FitBit trackers that interact with
-them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
<span class="inserted"><ins><em>devices in</em></ins></span> the <span 
class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it.  Western Digital's &lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which</strong></del></span> <span 
class="inserted"><ins><em>network. Since these dishwashers</em></ins></span> are
-    used <span class="removed"><del><strong>to administer drugs to
-a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>in hospitals, such attacks could potentially 
put hundreds of
+    attacks on other devices in the network. Since these dishwashers are
+    used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -587,145 +529,76 @@
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded</em></ins></span> by a 
<span class="removed"><del><strong>security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending on what drug is being infused,</strong></del></span> <span 
class="inserted"><ins><em>person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; 
(rather</strong></del></span> <span class="inserted"><ins><em>was surrounded by 
a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>door to murder.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Due to bad security in</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate proposed 
response:</em></ins></span> a <span class="removed"><del><strong>drug pump, 
crackers</strong></del></span> <span class="inserted"><ins><em>labeling
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users</em></ins></span> could 
<span class="removed"><del><strong>use it to &lt;a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
-intrusion.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>have checked
-    and changed.&lt;/p&gt;</em></ins></span>
+    products, rather</em></ins></span> than <span 
class="removed"><del><strong>companies) are
+primarily responsible</strong></del></span> <span 
class="inserted"><ins><em>free software which users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>&lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished a</strong></del></span> company <span 
class="inserted"><ins><em>that made the vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued</em></ins></span> for <span class="removed"><del><strong>making 
webcams with bad security&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>collecting lots of personal information about how 
people
+    was sued</em></ins></span> for <span class="removed"><del><strong>putting 
digital restrictions management into</strong></del></span> <span 
class="inserted"><ins><em>collecting lots of personal information about how 
people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement</em></ins></span> that it was <span 
class="removed"><del><strong>easy for anyone</strong></del></span> <span 
class="inserted"><ins><em>anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>watch 
them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker, the data broker would have been able</em></ins></span> to <span 
class="inserted"><ins><em>figure out who the
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total</em></ins></span> of <span 
class="removed"><del><strong>medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Lots of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
-into a botnet for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
     Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen 
to</em></ins></span> these <span class="removed"><del><strong>disks.  
Nonetheless,</strong></del></span>
+    <span class="inserted"><ins><em>conversations was unacceptable by 
itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702200"&gt;
     &lt;p&gt;If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually &lt;a
     
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-    previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201702060"&gt;</em></ins></span>
-    &lt;p&gt;Vizio <span 
class="inserted"><ins><em>&ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="inserted"><ins><em>them, and not just broadcasts and
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports</em></ins></span> what
-<span class="removed"><del><strong>users 
watch&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>it 
is.</em></ins></span> The <span class="removed"><del><strong>TVs 
did</strong></del></span> <span class="inserted"><ins><em>existence of a way to 
disable the
-    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>do that when first sold.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;LG &lt;a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-&ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>hidden as it was in these</em></ins></span> TVs, 
<span class="removed"><del><strong>unless</strong></del></span>
-    <span class="inserted"><ins><em>does not legitimize</em></ins></span> the 
<span class="removed"><del><strong>purchasers agreed to let LG
-begin to snoop on them and distribute their personal 
data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
+  &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential for the most intimate
-    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
+    surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You can bet Facebook will implement the maximum possible
-    surveillance</em></ins></span> on <span 
class="removed"><del><strong>children and adults.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones are spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
-    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>developer of Ham Radio 
Deluxe</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged
+  &lt;li id="M201612200"&gt;
+    &lt;p&gt;The developer of Ham Radio Deluxe &lt;a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged
     a customer's installation as punishment for posting a negative
     review&lt;/a&gt;.&lt;/p&gt;
 
@@ -735,88 +608,59 @@
   &lt;/li&gt;
 
   &lt;li id="M201612060.1"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que can be &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
-    controlled with a mobile phone&lt;/a&gt;; physical 
access</em></ins></span> is <span class="removed"><del><strong>always 
watching&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>not
+    controlled with a mobile phone&lt;/a&gt;; physical access is not
     necessary. This would enable crackers to listen in on a child's
-    conversations, and</em></ins></span> even <span 
class="removed"><del><strong>when</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the
-<span class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span> <span 
class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    conversations, and even speak into the toys themselves.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> means <span 
class="removed"><del><strong>the manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>a burglar could speak into the toys and ask the 
child</em></ins></span>
-    to <span class="removed"><del><strong>outsmart
-you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>unlock 
the front door while Mommy's not looking.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This means a burglar could speak into the toys and ask the child
+    to unlock the front door while Mommy's not looking.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609200"&gt;
+  &lt;li id="M201609200"&gt;
     &lt;p&gt;HP's firmware downgrade &lt;a
     
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
-    DRM</em></ins></span> on 
-<span class="removed"><del><strong>their users: their</strong></del></span> 
<span class="inserted"><ins><em>some printers, which now refuse to function 
with third-party
+    DRM on some printers, which now refuse to function with third-party
     ink cartridges&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608080"&gt;
-    &lt;p&gt;Ransomware</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;
-    has been developed for a thermostat</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>uses proprietary
+    &lt;p&gt;Ransomware &lt;a
+    
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;
+    has been developed for a thermostat that uses proprietary
     software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605020"&gt;
     &lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
     
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-    unauthorized people</em></ins></span> can <span 
class="removed"><del><strong>track you 
-across devices.&lt;/p&gt;
+    unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Samsung claims that</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by 
default</strong></del></span> is an <span 
class="removed"><del><strong>injustice already.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households 
to</strong></del></span> <span class="inserted"><ins><em>&ldquo;open&rdquo; 
platform so</em></ins></span> the <span class="removed"><del><strong>600
-millions social media profiles</strong></del></span>
-    <span class="inserted"><ins><em>problem is partly</em></ins></span> the 
<span class="removed"><del><strong>company already monitors.  Tivo
-customers</strong></del></span> <span class="inserted"><ins><em>fault of app 
developers. That is clearly true
-    if the apps</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by advertisers.  By
-combining TV viewing information with online social media
-participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+    &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+    problem is partly the fault of app developers. That is clearly true
+    if the apps are proprietary software.&lt;/p&gt;
 
     &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
     to screw you.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604110"&gt;
-    &lt;p&gt;Malware was found on</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-correlate TV advertisement</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+    &lt;p&gt;Malware was found on &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;A camera that records locally on physical media, and has no 
network
-    connection, does not threaten people</em></ins></span> with <span 
class="removed"><del><strong>online purchases&lt;/a&gt;, exposing all
-users to new combined surveillance</strong></del></span> <span 
class="inserted"><ins><em>surveillance&mdash;neither</em></ins></span>
-    by <span 
class="removed"><del><strong>default.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watching people through the camera, nor through 
malware in the
-    camera.&lt;/p&gt;</em></ins></span>
+    connection, does not threaten people with surveillance&mdash;neither
+    by watching people through the camera, nor through malware in the
+    camera.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604050"&gt;
+  &lt;li id="M201604050"&gt;
     &lt;p&gt;Google/Alphabet &lt;a
     
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
     intentionally broke Revolv home automatic control products that
-    depended on a server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>be picked
-up</strong></del></span> <span 
class="inserted"><ins><em>function,</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running</strong></del></span> 
<span class="inserted"><ins><em>shutting down the server.
+    depended on a server&lt;/a&gt; to function, by shutting down the server.
     The lesson is, reject all such products.  Insist on self-contained
     computers that run free software!&lt;/p&gt;
   &lt;/li&gt;
@@ -857,35 +701,50 @@
     later the company updated the firmware to disallow
     interoperability&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it,
-    it is cleverly serving its manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;
+    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build 
it,</em></ins></span>
+    it is <span class="inserted"><ins><em>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+    Some D-Link routers&lt;/a&gt; have</em></ins></span> a <span 
class="removed"><del><strong>reference</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> for <span 
class="removed"><del><strong>the facts.
+&lt;/p&gt;
+
+&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>changing settings in a
     dlink of an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router has a back door&lt;/a&gt;.&lt;/p&gt;
+    router</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
-    routers have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;li id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>a back door&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance 
cameras</strong></del></span>
+    <span class="inserted"><ins><em>routers</em></ins></span> have <span 
class="inserted"><ins><em>back doors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511198"&gt;
-    &lt;p&gt;ARRIS cable modem has a &lt;a
-    
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511198"&gt;
+    &lt;p&gt;ARRIS cable modem</em></ins></span> has a <span 
class="removed"><del><strong>big security hole;</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
     back door in the back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -894,7 +753,9 @@
     sounds to be picked up by proprietary malware running
     on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -904,78 +765,155 @@
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
+    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="inserted"><ins><em>advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="inserted"><ins><em>off, but having it enabled by 
default</em></ins></span>
+    is an <span class="removed"><del><strong>&ldquo;open&rdquo; platform so the
+problem is partly</strong></del></span> <span 
class="inserted"><ins><em>injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
+    to</em></ins></span> the <span class="removed"><del><strong>fault of app 
developers. That is clearly true if</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles</em></ins></span> 
the <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>company
+    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
+screw you.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Malware found on</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither</strong></del></span> 
<span class="inserted"><ins><em>online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance</em></ins></span> by <span 
class="removed"><del><strong>watching people through the camera, nor through 
malware in the
+camera.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a &lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt; &lt;a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit</em></ins></span> fitness trackers have a <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
     Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused, the insecurity could
+open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506080"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to &lt;a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
-    the door to murder.&lt;/p&gt;
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
+    the door to murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -1027,7 +965,7 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405200.1"&gt;
+  &lt;li id="M201405200.1"&gt;</em></ins></span>
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
@@ -1035,35 +973,80 @@
     to snoop on them and distribute their personal data.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of &lt;a
     href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;
+    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>adults.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it can be fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
-    &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a
+<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554"&gt; 
Some flash
     memories have modifiable software&lt;/a&gt;, which makes them vulnerable
     to viruses.&lt;/p&gt;
 
-    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; because it is normal
-    that you can install a new system in a computer, given physical access
-    to it.  However, memory sticks and cards should not be modifiable in
-    this way.&lt;/p&gt;
+    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; 
because</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>normal
+    that you can install a new system in a computer, given physical 
access</em></ins></span>
+    to <span class="removed"><del><strong>outsmart
+you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it.  
However, memory sticks and cards should not be modifiable in
+    this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Vizio goes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312040"&gt;
     &lt;p&gt;&lt;a
     
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
     Point-of-sale terminals running Windows were taken over&lt;/a&gt; and
-    turned into a botnet for the purpose of collecting customers' credit
+    turned into</em></ins></span> a <span class="removed"><del><strong>step 
further than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
     card numbers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311210"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; TVs 
<span class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    reports what the user watches,</em></ins></span> and 
+<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span 
class="removed"><del><strong>off, but having it enabled by default
+is an injustice already.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to the 600
+millions social media profiles the company already monitors.  Tivo
+customers are unaware they're being watched by advertisers.  By
+combining TV viewing information with online social media
+participation, Tivo can now &lt;a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+users to new combined surveillance by default.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1272,7 +1255,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:43 $
+$Date: 2019/02/22 14:30:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-appliances.de.po    22 Feb 2019 11:31:43 -0000      1.67
+++ malware-appliances.de.po    22 Feb 2019 14:30:58 -0000      1.68
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -115,11 +115,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-appliances.fr.po    22 Feb 2019 11:31:43 -0000      1.106
+++ malware-appliances.fr.po    22 Feb 2019 14:30:58 -0000      1.107
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-10 16:42+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -94,11 +94,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-appliances.pot      22 Feb 2019 11:31:43 -0000      1.52
+++ malware-appliances.pot      22 Feb 2019 14:30:58 -0000      1.53
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -71,12 +71,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
 "
-"collect “whatever the TV sees,” in the own words of the company's CTO, 
and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\";>
 "
+"collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"&ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly "
+"lower retail prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-appliances.ru.po    22 Feb 2019 11:31:43 -0000      1.138
+++ malware-appliances.ru.po    22 Feb 2019 14:30:58 -0000      1.139
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -95,11 +95,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- nl.po       22 Feb 2019 11:31:43 -0000      1.32
+++ nl.po       22 Feb 2019 14:30:58 -0000      1.33
@@ -1725,11 +1725,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pl.po       22 Feb 2019 11:31:43 -0000      1.32
+++ pl.po       22 Feb 2019 14:30:58 -0000      1.33
@@ -1292,11 +1292,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pot 22 Feb 2019 11:31:44 -0000      1.32
+++ pot 22 Feb 2019 14:30:58 -0000      1.33
@@ -1162,11 +1162,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-surveillance.de-diff.html       22 Feb 2019 11:31:44 -0000      
1.45
+++ proprietary-surveillance.de-diff.html       22 Feb 2019 14:30:59 -0000      
1.46
@@ -712,12 +712,13 @@
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
     &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that the non-premium version</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    nude photos</em></ins></span> of <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed to break Apple's
     security to get at them, but NSA can access any of them through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -725,7 +726,8 @@
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>app does
+      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
@@ -737,8 +739,8 @@
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
+    for <span class="removed"><del><strong>tracking</strong></del></span> 
<span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is the &lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -746,21 +748,23 @@
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201312300"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>display 
ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span>
+    <span class="inserted"><ins><em>get other info 
too.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+    Either Apple helps the NSA snoop on all the data</em></ins></span> in 
<span class="removed"><del><strong>2015&lt;/a&gt; found</strong></del></span> 
<span class="inserted"><ins><em>an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though that can be
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>90% of the 
top-ranked</strong></del></span> <span class="inserted"><ins><em>can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -774,7 +778,8 @@
   &lt;li id="M201204280"&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
+    to install even</em></ins></span> gratis
+  <span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;) without giving a valid
     email address and receiving the verification code Apple sends
     to it.&lt;/p&gt;
   &lt;/li&gt;
@@ -790,7 +795,7 @@
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    upload call logs automatically from</em></ins></span> Android <span 
class="removed"><del><strong>apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>phones&lt;/a&gt; 
while disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -813,39 +818,63 @@
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>tracking.  
This is
+    yet another example</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending to obey</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</em></ins></span>
+    that <span class="inserted"><ins><em>users can't delete&lt;/a&gt;, 
and</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps that track users</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us</em></ins></span> by <span 
class="inserted"><ins><em>a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of</strong></del></span> Android <span 
class="removed"><del><strong>apps can collude to transmit users' personal
+       data to servers.</strong></del></span> <span 
class="inserted"><ins><em>phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
+    by Google, use a modified version</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>Android</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
     sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -853,28 +882,32 @@
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="inserted"><ins><em>users is not enough to
-    legitimize actions like this.  At</em></ins></span> this <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>point, most users</em></ins></span> have
-      <span class="removed"><del><strong>confirmed</strong></del></span> <span 
class="inserted"><ins><em>stopped
-    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="inserted"><ins><em>spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, 
instead</em></ins></span> of
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information 
in</em></ins></span> the <span class="removed"><del><strong>app 
does</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
@@ -889,31 +922,25 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain</em></ins></span> JavaScript <span 
class="removed"><del><strong>injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>code,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>paid proprietary apps, it was only 
60%.&lt;/p&gt;
 
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but</strong></del></span> <span class="inserted"><ins><em>e-reader used 
by</em></ins></span> most <span class="inserted"><ins><em>US libraries, &lt;a
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>them are 
not</strong></del></span> <span class="inserted"><ins><em>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    send lots</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span class="inserted"><ins><em>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -937,25 +964,14 @@
     reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used</em></ins></span> for <span 
class="inserted"><ins><em>repression of forbidden sharing
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates</em></ins></span> that <span 
class="removed"><del><strong>word</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps</strong></del></span> <span class="inserted"><ins><em>not a 
cure</em></ins></span> for <span class="removed"><del><strong>BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -964,54 +980,46 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="removed"><del><strong>that track users by</strong></del></span> <span 
class="inserted"><ins><em>have a surveillance feature for</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>interacting with the app.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android</strong></del></span>
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo;</em></ins></span> apps 
<span class="removed"><del><strong>can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs</strong></del></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable</strong></del></span> <span 
class="inserted"><ins><em>actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google</strong></del></span> <span class="inserted"><ins><em>used to
-    be on Google</em></ins></span> Play <span 
class="removed"><del><strong>intentionally sends app 
developers</strong></del></span> <span class="inserted"><ins><em>had one or 
more malicious functionalities, such as</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on</em></ins></span> Google Play <span 
class="removed"><del><strong>itself</strong></del></span> <span 
class="inserted"><ins><em>had one or more malicious functionalities, such as 
&lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>users is not enough
-to legitimize actions like this.  At this point,</strong></del></span> most 
<span class="removed"><del><strong>users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what</strong></del></span> <span class="inserted"><ins><em>of them was 
designed to make uninstallation
+    them</em></ins></span> to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>phishing sites that 
stole their credentials. Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>tracking.  This is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>most of them was designed</em></ins></span> to 
<span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  
Google</strong></del></span> should <span class="removed"><del><strong>clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>also stay away 
from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>hiding it</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really do.&lt;/p&gt;
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span class="removed"><del><strong>an 
obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Google 
Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span 
class="removed"><del><strong>truly</strong></del></span> protect <span 
class="removed"><del><strong>people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span class="inserted"><ins><em>their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="inserted"><ins><em>150</em></ins></span> most popular <span 
class="removed"><del><strong>Android</strong></del></span>
+    <span class="inserted"><ins><em>gratis VPN</em></ins></span> apps <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>users’ 
privacy&lt;/a&gt; due</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
     addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
@@ -1019,62 +1027,42 @@
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>top 10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>500 most 
popular</strong></del></span> <span class="inserted"><ins><em>top 
10</em></ins></span> gratis <span class="removed"><del><strong>Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;p&gt;The article should not</strong></del></span> <span 
class="inserted"><ins><em>VPN apps</em></ins></span> have <span 
class="removed"><del><strong>described</strong></del></span> <span 
class="inserted"><ins><em>lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+    &lt;p&gt;It is unfortunate that</em></ins></span> these <span 
class="inserted"><ins><em>articles talk about &ldquo;free
+    apps.&rdquo; These</em></ins></span> apps <span 
class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they</strong></del></span> are <span 
class="removed"><del><strong>not free software.</strong></del></span> <span 
class="inserted"><ins><em>gratis, but they are &lt;em&gt;not&lt;/em&gt; &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's 
server&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>clear way</strong></del></span> <span 
class="inserted"><ins><em>company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users</em></ins></span> of <span class="removed"><del><strong>nonfree software 
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what 
it will do
-    with</em></ins></span> the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable</strong></del></span> <span class="inserted"><ins><em>side 
issue. What the company does</em></ins></span>
-    with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
data is a secondary issue. The principal wrong here is that
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>gratis</em></ins></span> Android apps &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>machine's 
&ldquo;advertising ID,&rdquo; so that
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way 
to</strong></del></span> <span class="inserted"><ins><em>app; others 
only</em></ins></span> say
+    the user's activities in the app; others only</em></ins></span> say
   <span class="removed"><del><strong>&ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
 
   &lt;p&gt;The article takes for granted</strong></del></span> that the <span 
class="removed"><del><strong>usual analytics tools are
@@ -1305,39 +1293,37 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps</em></ins></span> for <span class="removed"><del><strong>web 
sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    &lt;p&gt;Apps</em></ins></span> for <span class="removed"><del><strong>web 
sites to track users, which is</strong></del></span> <span 
class="inserted"><ins><em>BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
       enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>BART</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+      is still true in iOS 7.)&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data</strong></del></span>
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound</em></ins></span> from <span 
class="removed"><del><strong>iPhones for</strong></del></span> <span 
class="inserted"><ins><em>beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played</em></ins></span> by 
<span class="removed"><del><strong>default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV
+    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
@@ -1463,9 +1449,9 @@
       &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>GPS location on
-      remote command</strong></del></span>
-    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span> <span 
class="inserted"><ins><em>infringe their
+    privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
@@ -1595,7 +1581,7 @@
   &lt;li&gt;&lt;p&gt;A</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
-    &lt;p&gt;A</em></ins></span> pregnancy test <span 
class="removed"><del><strong>controller application not only
+    &lt;p&gt;A</em></ins></span> pregnancy test controller <span 
class="removed"><del><strong>application not only
   can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
   on many sorts of data in the phone, and in server accounts, it can
   alter them too&lt;/a&gt;.
@@ -1609,7 +1595,7 @@
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>application not only can</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
       all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
     spy on many sorts of data in the phone, and in server accounts,
@@ -1692,15 +1678,15 @@
     <span class="inserted"><ins><em>Android</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which other
     apps</strong></del></span> <span class="inserted"><ins><em>contained 
recognizable tracking libraries. For</em></ins></span> the <span 
class="removed"><del><strong>user has
     installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad</strong></del></span> <span 
class="inserted"><ins><em>paid
+    is doing this</strong></del></span> <span class="inserted"><ins><em>paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps</em></ins></span> 
as <span class="removed"><del><strong>what</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of them are 
not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also 
uses</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    ugly word &ldquo;monetize&rdquo;. A good replacement for</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
+    is <span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
@@ -1902,118 +1888,127 @@
   
   &lt;li&gt;&lt;p&gt;Barbie
       &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
-    to spy <span class="inserted"><ins><em>through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span class="removed"><del><strong>children 
and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an 
Android</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    to spy <span class="inserted"><ins><em>through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA</em></ins></span> app
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is a <span 
class="removed"><del><strong>back door, but</strong></del></span> <span 
class="inserted"><ins><em>hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on</em></ins></span> a
-      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
+    spies on every process running on a gamer's computer</em></ins></span> and 
<span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 <span 
class="removed"><del><strong>id="SpywareOnSmartWatches"&gt;Spyware on 
&ldquo;Smart&rdquo; Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
+
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>report its 
location</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>television?&rdquo; 
I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>someone 
else</strong></del></span> <span class="inserted"><ins><em>me</em></ins></span> 
and <span class="removed"><del><strong>to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>TV sees,” in the own words of the company's
-    CTO, and this data is sold to third parties. This</em></ins></span> is 
<span class="removed"><del><strong>not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> in <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>return for
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says</strong></del></span> <span 
class="inserted"><ins><em>return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
+    &lt;p&gt;What is supposed to make</em></ins></span> this <span 
class="inserted"><ins><em>spying acceptable, according to him,</em></ins></span>
+    is <span class="removed"><del><strong>a back door, 
but</strong></del></span> that <span class="removed"><del><strong>could be a
+      misunderstanding.  However,</strong></del></span> it is <span 
class="removed"><del><strong>certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;If you already</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>opt-in</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the 
scenes,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>there is no 
guarantee</em></ins></span> that <span class="inserted"><ins><em>all future 
updates will leave</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV 
(or any smart TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this</em></ins></span> is not <span 
class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its</strong></del></span> <span class="inserted"><ins><em>always 
possible. Another option,
+    if you are technically oriented, is to get your</em></ins></span> own 
<span class="removed"><del><strong>malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>a 
Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to</em></ins></span> make sure <span 
class="removed"><del><strong>to place new items</strong></del></span> <span 
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>router (which can
+    be an old computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2023,25 +2018,20 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>you is
-    to disconnect</em></ins></span> it <span class="inserted"><ins><em>from 
the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router 
(which</em></ins></span> can <span 
class="removed"><del><strong>collect</strong></del></span>
-    <span class="inserted"><ins><em>be an old computer running completely free 
software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
+        Shows</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link to the article for the facts</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>presents. It
     is too bad that the article finishes by advocating</em></ins></span> the 
<span class="removed"><del><strong>emails of members</strong></del></span>
     <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>Parliament
   this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
@@ -3195,7 +3185,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary-surveillance.de.po      22 Feb 2019 11:31:44 -0000      1.261
+++ proprietary-surveillance.de.po      22 Feb 2019 14:30:59 -0000      1.262
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3147,11 +3147,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- proprietary-surveillance.fr.po      22 Feb 2019 11:31:44 -0000      1.378
+++ proprietary-surveillance.fr.po      22 Feb 2019 14:30:59 -0000      1.379
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-21 12:12+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -2588,11 +2588,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-surveillance.it-diff.html       22 Feb 2019 11:31:44 -0000      
1.112
+++ proprietary-surveillance.it-diff.html       22 Feb 2019 14:30:59 -0000      
1.113
@@ -1907,9 +1907,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -2999,7 +2999,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary-surveillance.it.po      22 Feb 2019 11:31:44 -0000      1.274
+++ proprietary-surveillance.it.po      22 Feb 2019 14:30:59 -0000      1.275
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -2950,11 +2950,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-surveillance.ja-diff.html       22 Feb 2019 11:31:44 -0000      
1.122
+++ proprietary-surveillance.ja-diff.html       22 Feb 2019 14:30:59 -0000      
1.123
@@ -1751,9 +1751,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -2816,7 +2816,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary-surveillance.ja.po      22 Feb 2019 11:31:44 -0000      1.247
+++ proprietary-surveillance.ja.po      22 Feb 2019 14:30:59 -0000      1.248
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -2451,11 +2451,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary-surveillance.pot        22 Feb 2019 11:31:44 -0000      1.195
+++ proprietary-surveillance.pot        22 Feb 2019 14:30:59 -0000      1.196
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1785,12 +1785,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
 "
-"collect “whatever the TV sees,” in the own words of the company's CTO, 
and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\";>
 "
+"collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"&ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly "
+"lower retail prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.471
retrieving revision 1.472
diff -u -b -r1.471 -r1.472
--- proprietary-surveillance.ru.po      22 Feb 2019 11:31:44 -0000      1.471
+++ proprietary-surveillance.ru.po      22 Feb 2019 14:30:59 -0000      1.472
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -2563,11 +2563,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.de-diff.html    22 Feb 2019 11:31:44 -0000      1.49
+++ proprietary.de-diff.html    22 Feb 2019 14:30:59 -0000      1.50
@@ -186,9 +186,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -317,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.de.po   22 Feb 2019 11:31:46 -0000      1.91
+++ proprietary.de.po   22 Feb 2019 14:30:59 -0000      1.92
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,11 +431,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.es.po   22 Feb 2019 11:31:46 -0000      1.103
+++ proprietary.es.po   22 Feb 2019 14:30:59 -0000      1.104
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-21 13:07+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,11 +299,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary.fr.po   22 Feb 2019 11:31:46 -0000      1.126
+++ proprietary.fr.po   22 Feb 2019 14:30:59 -0000      1.127
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-21 12:12+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -295,11 +295,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.it-diff.html    22 Feb 2019 11:31:46 -0000      1.61
+++ proprietary.it-diff.html    22 Feb 2019 14:30:59 -0000      1.62
@@ -101,18 +101,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,9 +185,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.it.po   22 Feb 2019 11:31:46 -0000      1.100
+++ proprietary.it.po   22 Feb 2019 14:30:59 -0000      1.101
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,11 +435,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.ja-diff.html    22 Feb 2019 11:31:46 -0000      1.62
+++ proprietary.ja-diff.html    22 Feb 2019 14:30:59 -0000      1.63
@@ -97,17 +97,17 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -182,9 +182,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -313,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary.ja.po   22 Feb 2019 11:31:46 -0000      1.83
+++ proprietary.ja.po   22 Feb 2019 14:30:59 -0000      1.84
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,11 +355,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.nl-diff.html    22 Feb 2019 11:31:46 -0000      1.61
+++ proprietary.nl-diff.html    22 Feb 2019 14:30:59 -0000      1.62
@@ -185,9 +185,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.nl.po   22 Feb 2019 11:31:46 -0000      1.72
+++ proprietary.nl.po   22 Feb 2019 14:30:59 -0000      1.73
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,11 +428,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.pl-diff.html    22 Feb 2019 11:31:46 -0000      1.79
+++ proprietary.pl-diff.html    22 Feb 2019 14:30:59 -0000      1.80
@@ -183,9 +183,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -314,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.pl.po   22 Feb 2019 11:31:47 -0000      1.67
+++ proprietary.pl.po   22 Feb 2019 14:30:59 -0000      1.68
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,11 +510,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.pot     22 Feb 2019 11:31:47 -0000      1.64
+++ proprietary.pot     22 Feb 2019 14:30:59 -0000      1.65
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,12 +245,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
 "
-"collect “whatever the TV sees,” in the own words of the company's CTO, 
and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\";>
 "
+"collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"&ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly "
+"lower retail prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.pt-br.po        22 Feb 2019 11:31:47 -0000      1.91
+++ proprietary.pt-br.po        22 Feb 2019 14:30:59 -0000      1.92
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-02-21 21:29-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,11 +293,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.ru.po   22 Feb 2019 11:31:47 -0000      1.156
+++ proprietary.ru.po   22 Feb 2019 14:30:59 -0000      1.157
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -299,11 +299,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.zh-tw-diff.html 22 Feb 2019 11:31:47 -0000      1.39
+++ proprietary.zh-tw-diff.html 22 Feb 2019 14:30:59 -0000      1.40
@@ -186,9 +186,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs
-    
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
-    collect “whatever the TV sees,” in the own words of the company's
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
@@ -317,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/22 11:31:47 $
+$Date: 2019/02/22 14:30:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.zh-tw.po        22 Feb 2019 11:31:47 -0000      1.50
+++ proprietary.zh-tw.po        22 Feb 2019 14:30:59 -0000      1.51
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,11 +344,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- pt-br.po    22 Feb 2019 11:31:47 -0000      1.45
+++ pt-br.po    22 Feb 2019 14:30:59 -0000      1.46
@@ -1263,11 +1263,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- ru.po       22 Feb 2019 11:31:47 -0000      1.73
+++ ru.po       22 Feb 2019 14:30:59 -0000      1.74
@@ -1687,11 +1687,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- zh-tw.po    22 Feb 2019 11:31:47 -0000      1.32
+++ zh-tw.po    22 Feb 2019 14:30:59 -0000      1.33
@@ -1255,11 +1255,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-";
-"tv-bill-baxter-interview-vergecast-ces-2019 collect “whatever the TV 
sees,” "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for &ldquo;better service&rdquo; (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
+"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for &ldquo;better "
+"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
+"prices."
 msgstr ""
 
 #. type: Content of: <ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]