www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 28 Feb 2019 04:00:42 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/28 04:00:40

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-drm.de-diff.html 
                         proprietary-drm.de.po proprietary-drm.fr.po 
                         proprietary-drm.it-diff.html 
                         proprietary-drm.it.po 
                         proprietary-drm.ja-diff.html 
                         proprietary-drm.ja.po proprietary-drm.pot 
                         proprietary-drm.ru.po 
                         proprietary-subscriptions.de-diff.html 
                         proprietary-subscriptions.de.po 
                         proprietary-subscriptions.fr.po 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ja.po 
                         proprietary-subscriptions.pot 
                         proprietary-subscriptions.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.477&r2=1.478
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.36&r2=1.37

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- de.po       25 Feb 2019 10:31:06 -0000      1.36
+++ de.po       28 Feb 2019 09:00:38 -0000      1.37
@@ -2123,6 +2123,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- es.po       25 Feb 2019 10:31:06 -0000      1.46
+++ es.po       28 Feb 2019 09:00:38 -0000      1.47
@@ -1675,6 +1675,21 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- fr.po       25 Feb 2019 12:05:44 -0000      1.64
+++ fr.po       28 Feb 2019 09:00:38 -0000      1.65
@@ -1675,6 +1675,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- it.po       25 Feb 2019 10:31:06 -0000      1.36
+++ it.po       28 Feb 2019 09:00:38 -0000      1.37
@@ -2067,6 +2067,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- ja.po       25 Feb 2019 10:31:06 -0000      1.36
+++ ja.po       28 Feb 2019 09:00:38 -0000      1.37
@@ -1745,6 +1745,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-appliances.de-diff.html     25 Feb 2019 10:31:07 -0000      1.35
+++ malware-appliances.de-diff.html     28 Feb 2019 09:00:38 -0000      1.36
@@ -78,13 +78,26 @@
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact
-      that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+       Canary camera</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the 
user</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies</em></ins></span> on <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>use of a printer</em></ins></span> that <span 
class="inserted"><ins><em>would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span>
@@ -111,399 +124,428 @@
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;The bad security</strong></del></span>
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>many Internet</strong></del></span> <span 
class="inserted"><ins><em>the own words</em></ins></span> of <span 
class="removed"><del><strong>Stings devices
-    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</strong></del></span> the <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>company's
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> the 
<span class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>own words 
of the company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is</em></ins></span> that <span class="removed"><del><strong>use 
them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>stings.&lt;/p&gt;
-  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>Vizio 
software</em></ins></span> is <span 
class="removed"><del><strong>unfortunate</strong></del></span>
-    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind the scenes,
-    and there is no guarantee</em></ins></span> that <span 
class="inserted"><ins><em>all future updates will leave</em></ins></span> the 
<span class="removed"><del><strong>article uses</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter),</em></ins></span> the
-  <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;What is supposed to make this spying acceptable, according to 
him,</em></ins></span>
+    is <span class="removed"><del><strong>unfortunate</strong></del></span> 
that <span class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>article uses the
+  term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
+  They have login accounts with hard-coded passwords, which can't be
+  changed,</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
+    nonfree, we don't know what is actually happening behind the 
scenes,</em></ins></span>
+    and <span class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>there</em></ins></span> is no <span 
class="removed"><del><strong>way to
+  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Many models of Internet-connected cameras</strong></del></span> 
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on you 
is
-    to disconnect it from the Internet, and use a terrestrial antenna
+&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>guarantee</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span> <span class="inserted"><ins><em>all future 
updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span> 
for <span class="removed"><del><strong>its headphones&lt;/a&gt;.
+Specifically, the app would record the names of the audio files
+users listen to along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses</strong></del></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
+If the fine print of</strong></del></span>
+    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that</strong></del></span> <span class="inserted"><ins><em>easiest way 
to</em></ins></span> make <span 
class="inserted"><ins><em>sure</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on 
you is</em></ins></span>
+    to <span class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you</em></ins></span> are <span 
class="removed"><del><strong>tremendously insecure.
-  They have login accounts with hard-coded passwords, which 
can't</strong></del></span> <span class="inserted"><ins><em>technically 
oriented, is to get your own router (which can</em></ins></span>
-    be
-  <span class="removed"><del><strong>changed,</strong></del></span> <span 
class="inserted"><ins><em>an old computer running completely free 
software),</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span> <span class="inserted"><ins><em>set up a
-    firewall</em></ins></span> to
-  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last 
resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is</strong></del></span>
+&lt;li id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with</strong></del></span> 
<span class="inserted"><ins><em>get your own router (which can
+    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
+  tethered them</strong></del></span>
+    <span class="inserted"><ins><em>firewall to block 
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's 
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote 
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
+    you can replace your TV with another model.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    give the manufacturer</em></ins></span> an <span 
class="removed"><del><strong>account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet</strong></del></span> <span 
class="inserted"><ins><em>unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's 
not</em></ins></span>
-    security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>for your home. Security means making sure they 
don't get to
-    see through your camera.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> <span 
class="inserted"><ins><em>very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>Internet,
+its</strong></del></span> <span class="inserted"><ins><em>videos. That's 
not</em></ins></span>
+    security <span class="removed"><del><strong>is crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>for your home. Security means making sure they don't 
get</em></ins></span> to
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
+ infect it with malware,</strong></del></span>
+    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP</em></ins></span> and <span 
class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>Epson have done this&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through</em></ins></span> the <span class="removed"><del><strong>app 
would record</strong></del></span> <span class="inserted"><ins><em>company's 
server. They have
-    all</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>nasty characteristics</em></ins></span> of <span 
class="removed"><del><strong>the audio files</strong></del></span> <span 
class="inserted"><ins><em>such devices: &lt;a
+    only through</em></ins></span> the <span 
class="removed"><del><strong>dishwasher to launch attacks on
+ other devices in</strong></del></span> <span 
class="inserted"><ins><em>company's server. They have
+    all</em></ins></span> the <span class="removed"><del><strong>network. 
Since these dishwashers are used in hospitals,</strong></del></span> <span 
class="inserted"><ins><em>nasty characteristics of</em></ins></span> such <span 
class="removed"><del><strong>attacks could potentially put 
hundreds</strong></del></span> <span class="inserted"><ins><em>devices: &lt;a
     
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all</em></ins></span> users <span class="removed"><del><strong>listen to 
along with</strong></del></span> <span class="inserted"><ins><em>at once), as 
well as</em></ins></span> the <span class="removed"><del><strong>headphone's 
unique serial number.
-&lt;/p&gt;
+    surveillance, and danger</em></ins></span> of <span 
class="removed"><del><strong>lives</strong></del></span> <span 
class="inserted"><ins><em>sabotage&lt;/a&gt; (of a specific user, or of
+    all users</em></ins></span> at <span 
class="removed"><del><strong>risk.&lt;/p&gt;
 
-&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>risk of an outage (which is what
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>once), as 
well as the risk of an outage (which is what
     just happened).&lt;/p&gt;
 
     &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
+    nonfree software. With an old-fashioned thermostat,</em></ins></span> you 
<span class="removed"><del><strong>buy a used &ldquo;smart&rdquo; car, house, 
TV, refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners</strong></del></span> can <span 
class="removed"><del><strong>still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do it
+    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
 
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="removed"><del><strong>is viewed on</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear</em></ins></span>
+    them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and 
<span class="removed"><del><strong>not just broadcasts</strong></del></span> 
<span class="inserted"><ins><em>Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker</em></ins></span> was <span 
class="removed"><del><strong>done without</strong></del></span> <span 
class="inserted"><ins><em>tethered to a proprietary phone
-    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>company shut down and 
made</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span class="inserted"><ins><em>app stop working. 
&lt;a
-    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
-    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on a further nasty fillip, that 
sales</em></ins></span> of the <span class="removed"><del><strong>app 
said</strong></del></span>
-    <span class="inserted"><ins><em>broken devices continued. But I 
think</em></ins></span> that <span class="removed"><del><strong>users gave 
consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>is a 
secondary issue;</em></ins></span>
-    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>made the nasty 
consequences extend to some additional people.
-    The fundamental wrong was</em></ins></span> to design the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>devices</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>depend on 
something
-    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the company shut down</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>app stop working. &lt;a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
+    the <span class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on a further nasty fillip, that sales 
of</em></ins></span> the <span class="removed"><del><strong>TV reports 
what</strong></del></span>
+    <span class="inserted"><ins><em>broken devices continued. But I think that 
is a secondary issue;</em></ins></span>
+    it <span class="removed"><del><strong>is.</strong></del></span> <span 
class="inserted"><ins><em>made the nasty consequences extend to some additional 
people.</em></ins></span>
+    The <span class="removed"><del><strong>existence of a 
way</strong></del></span> <span class="inserted"><ins><em>fundamental wrong 
was</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>devices to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with</strong></del></span> 
<span class="inserted"><ins><em>id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that
-  <span class="removed"><del><strong>tethered them to a remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account</strong></del></span> <span 
class="inserted"><ins><em>snoops</em></ins></span> on <span 
class="removed"><del><strong>Anova's servers, their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher 
is</strong></del></span>
+&lt;p&gt;More or less all &ldquo;smart&rdquo;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example,</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo;</em></ins></span> TVs <span 
class="inserted"><ins><em>automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The report was as of 2014, but we don't expect this has got
+better.&lt;/p&gt;
+
+&lt;p&gt;This shows</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>cracker can gain access</strong></del></span> 
<span class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate.  And
+what happens if</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV will say,
+&ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will not
+work.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>article for the facts it presents. It
+    is too bad</em></ins></span> that <span class="removed"><del><strong>TVs 
are not allowed to report what</strong></del></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Some LG
+TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;We link</em></ins></span> to the <span 
class="removed"><del><strong>dishwasher's filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>article for the 
facts</em></ins></span> it <span class="removed"><del><strong>with malware, and 
force</strong></del></span> <span class="inserted"><ins><em>presents. It
-    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>dishwasher</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
- other</strong></del></span> <span class="inserted"><ins><em>Netflix. The 
Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the <span class="removed"><del><strong>base
+for a tyrant system&lt;/a&gt; so as to impose DRM.
+What enables Samsung</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness of 
surrendering</em></ins></span> to <span class="removed"><del><strong>do this is 
that Linux is released under
+GNU GPL version 2,</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not 
version 3&lt;/a&gt;,
+together with a weak interpretation of GPL version 2.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple</em></ins></span> devices <span 
class="inserted"><ins><em>lock users</em></ins></span> in <span 
class="inserted"><ins><em>&lt;a
-    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by</em></ins></span> being <span 
class="removed"><del><strong>sued for collecting lots of personal information 
about how
+people use it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The company's statement that it anonymizes the data may be true,
+but it doesn't really matter. If it sells the data</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>a data broker,</strong></del></span> <span 
class="inserted"><ins><em>be incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span 
class="inserted"><ins><em>dangers</em></ins></span> of <span 
class="removed"><del><strong>lives at risk.&lt;/p&gt;
-
+    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>dangers 
of</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
 &lt;/li&gt;
+
 &lt;li&gt;
-&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>the 
&ldquo;internet of stings&rdquo;
-    is that, if</em></ins></span> you <span class="removed"><del><strong>buy a 
used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>lose your 
internet service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely</strong></del></span>
+&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose</em></ins></span> control <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything that is viewed on them, and not just broadcasts
-      and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence</strong></del></span> 
of <span class="inserted"><ins><em>your house and 
appliances&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
-    these TVs, does not legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
+    lose</em></ins></span> control <span class="removed"><del><strong>products 
that depended on</strong></del></span> <span class="inserted"><ins><em>of your 
house and appliances&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
+on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the
+    real internet.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
+&lt;p&gt;ARRIS cable modem</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;The report was as of 2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>front 
doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has <span class="removed"><del><strong>got
-better.&lt;/p&gt;
-
-&lt;p&gt;This shows that laws requiring products to get users' formal
-consent before collecting personal data are totally inadequate.  And
-what happens if</strong></del></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV will say,
-&ldquo;Without your consent to tracking, the TV will not
-work.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;Proper laws would say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it, the system</em></ins></span> has a <span 
class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span> <span class="inserted"><ins><em>conversation between 
two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Some LG
-TVs</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
+  &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
-tyrants&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span>
+    all Harmony Link household control devices by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span class="removed"><del><strong>base
-for a tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung to do</strong></del></span> <span 
class="inserted"><ins><em>server through which the products' supposed owners
+    turning off</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>server through which</em></ins></span> the 
<span class="removed"><del><strong>back door allows
+installation of software changes,</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect</em></ins></span> this is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>Linux is 
released under
-GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
-together</strong></del></span>
-    <span class="inserted"><ins><em>requires users to talk</em></ins></span> 
with <span class="removed"><del><strong>a weak interpretation of GPL version 
2.</strong></del></span> <span class="inserted"><ins><em>them through some 
specialized service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The owners suspect this is to pressure them to 
buy</em></ins></span> a <span class="removed"><del><strong>change could be 
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
+<span class="removed"><del><strong>would give access</strong></del></span>
+    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+dlink of an eye.&lt;/p&gt;
+
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
+have back doors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is a surveillance 
device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-being sued for collecting lots of personal information about how
-people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Canary camera</em></ins></span> is <span class="inserted"><ins><em>an 
example&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+    the <span class="removed"><del><strong>printers may become 
unusable.&lt;/p&gt;
+
+&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer</strong></del></span> <span 
class="inserted"><ins><em>fact</em></ins></span> that <span 
class="removed"><del><strong>gets</strong></del></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
+even be</strong></del></span> <span class="inserted"><ins><em>device is 
tethered to</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>company's statement that 
it anonymizes</strong></del></span> <span class="inserted"><ins><em>article 
describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
-but it doesn't really matter. If it sells</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>fact that the device is tethered</em></ins></span> to 
a <span class="removed"><del><strong>data broker,
-the data broker can figure out who</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
+&lt;p&gt;How pitiful that the author of that article 
says</strong></del></span> <span class="inserted"><ins><em>server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
-    surveillance capability.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>there was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="removed"><del><strong>to restrict users in</strong></del></span> 
<span class="inserted"><ins><em>gives</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like putting a &ldquo;cheat 
me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all companies
+that take advantage of people like him.  Indeed, it</strong></del></span> 
<span class="inserted"><ins><em>company
+    surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
+  &lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals is connected to the internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic control 
products</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    designed for hospitals</em></ins></span> is <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
+their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>internet. Naturally &lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>depended on
-a server&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
article misuses the term &lt;a
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>teaches people</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
-on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span class="removed"><del><strong>be 
doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;ARRIS cable modem has a &lt;a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor</strong></del></span>
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security</em></ins></span> in <span 
class="inserted"><ins><em>many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>interact with other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that use <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>stings.&lt;/p&gt;
+&lt;p&gt;&lt;a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>give HP</strong></del></span> <span 
class="inserted"><ins><em>the article uses the term</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access</strong></del></span>
+&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>unfortunate</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>the article 
uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos &lt;a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
-    to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if the back door allows
-installation of software changes, a</strong></del></span> <span 
class="inserted"><ins><em>product will stop working&lt;/a&gt;.  &lt;a
+    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
-    Another article&lt;/a&gt; says they won't forcibly</em></ins></span> 
change <span class="removed"><del><strong>could</strong></del></span> <span 
class="inserted"><ins><em>the software, but
-    people won't</em></ins></span> be <span 
class="removed"><del><strong>installed that
-would give access</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>get any 
upgrades and eventually it will
-    stop working.&lt;/p&gt;</em></ins></span>
+    Another article&lt;/a&gt; says they won't forcibly change the software, but
+    people won't be able to get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; (rather than 
companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is</strong></del></span> <span 
class="inserted"><ins><em>will
+    stop working.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-Some D-Link routers&lt;/a&gt; have</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>back door for changing 
settings</strong></del></span> <span class="inserted"><ins><em>DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>a
-dlink of an eye.&lt;/p&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>reference for the facts.
+&lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764"&gt;Many</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706200"&gt;
-    &lt;p&gt;Many</em></ins></span> models of <span 
class="removed"><del><strong>routers</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras
-    are tremendously insecure.  They</em></ins></span> have <span 
class="removed"><del><strong>back doors&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was designed</strong></del></span> <span 
class="inserted"><ins><em>login
-    accounts</em></ins></span> with <span 
class="removed"><del><strong>DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It</strong></del></span> <span 
class="inserted"><ins><em>hard-coded passwords, which can't be changed, and 
&lt;a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</em></ins></span>
-    is <span class="removed"><del><strong>the Keurig of printers.  Now 
it</strong></del></span> <span class="inserted"><ins><em>no way to delete these 
accounts either&lt;/a&gt;.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200"&gt;
+    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>network-connected 
surveillance</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
+    <span class="inserted"><ins><em>are tremendously insecure.  
They</em></ins></span> have <span class="inserted"><ins><em>login
+    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical devices</em></ins></span> is
-<span class="removed"><del><strong>being discontinued, which 
means</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    insulin pumps, and other medical devices is &lt;a
     href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
     &lt;p&gt;Bird and rabbit pets were implemented for Second
-    Life by a company</em></ins></span> that <span 
class="removed"><del><strong>eventually authorized materials won't
-be available</strong></del></span> <span class="inserted"><ins><em>tethered 
their food to a server.  &lt;a
+    Life by a company that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down the server</em></ins></span> and the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
-
-&lt;p&gt;With a</strong></del></span> <span class="inserted"><ins><em>pets 
more or less died&lt;/a&gt;.&lt;/p&gt;
+    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, 
this problem</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> would <span 
class="removed"><del><strong>not
-even be a remote possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>record</em></ins></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of <span 
class="removed"><del><strong>that article says that there was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the <span 
class="removed"><del><strong>device to restrict</strong></del></span> <span 
class="inserted"><ins><em>audio files</em></ins></span> users <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>listen to
-    along with</em></ins></span> the <span class="removed"><del><strong>first 
place.  This is like putting a &ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all 
companies</strong></del></span> <span class="inserted"><ins><em>headphone's 
unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>take advantage of people like him.  Indeed, it 
is</strong></del></span> <span class="inserted"><ins><em>this was done 
without</em></ins></span> the <span 
class="removed"><del><strong>acceptance</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
-    If the fine print</em></ins></span> of
-<span class="removed"><del><strong>their unjust practice</strong></del></span> 
<span class="inserted"><ins><em>the app said</em></ins></span> that <span 
class="removed"><del><strong>teaches people to</strong></del></span> <span 
class="inserted"><ins><em>users gave consent for this,
-    would that make it acceptable? No way! It should</em></ins></span> be 
<span class="removed"><del><strong>doormats.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span> <span 
class="inserted"><ins><em>flat out</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been designed not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>interact</strong></del></span> <span 
class="inserted"><ins><em>design
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704120"&gt;
-    &lt;p&gt;Anova sabotaged users' cooking devices</em></ins></span>
-    with <span class="removed"><del><strong>other companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;If</strong></del></span> a <span class="removed"><del><strong>product 
is &ldquo;smart&rdquo;, and you didn't build it, it is
-cleverly serving</strong></del></span> <span 
class="inserted"><ins><em>downgrade that tethered them to a remote server. &lt;a
+    &lt;p&gt;Anova sabotaged users' cooking devices
+    with a downgrade that tethered them to a remote server. &lt;a
     
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
     users create an account on Anova's servers, their cookers won't
     function&lt;/a&gt;.&lt;/p&gt;
@@ -525,7 +567,7 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on</em></ins></span> its <span 
class="inserted"><ins><em>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
@@ -560,16 +602,11 @@
     Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the</em></ins></span> manufacturer <span 
class="removed"><del><strong>&lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702200"&gt;
+  &lt;li id="M201702200"&gt;
     &lt;p&gt;If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually &lt;a
     
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
@@ -653,7 +690,7 @@
     
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="removed"><del><strong>Bluray 
disks</strong></del></span> <span class="inserted"><ins><em>has no network
+    &lt;p&gt;A camera that records locally on physical media, and has no 
network
     connection, does not threaten people with surveillance&mdash;neither
     by watching people through the camera, nor through malware in the
     camera.&lt;/p&gt;
@@ -669,38 +706,34 @@
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance 
cameras</em></ins></span> have <span class="removed"><del><strong>DRM&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>allow anyone 
to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to</em></ins></span> watch through 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201601100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601100"&gt;
+    &lt;p&gt;The &lt;a
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
     &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it
     won't accept third-party printing materials.  It is the Keurig of
     printers.  Now it is being discontinued, which means that eventually
-    authorized materials won't be available</em></ins></span> and <span 
class="inserted"><ins><em>the printers may become
+    authorized materials won't be available and the printers may become
     unusable.&lt;/p&gt;
 
-    &lt;p&gt;With a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+    &lt;p&gt;With a &lt;a
+    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
     printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would
     not even be a remote possibility.&lt;/p&gt;
 
     &lt;p&gt;How pitiful that the author of that article says that there was
     &ldquo;nothing wrong&rdquo; with designing the device to restrict
-    users in the first place.  This is like putting a &ldquo;cheat 
me</em></ins></span> and
-    <span class="inserted"><ins><em>mistreat me&rdquo; sign on your chest.  We 
should know better: we
+    users in the first place.  This is like putting a &ldquo;cheat me and
+    mistreat me&rdquo; sign on your chest.  We should know better: we
     should condemn all companies that take advantage of people like him. 
-    Indeed,</em></ins></span> it <span 
class="removed"><del><strong>claims</strong></del></span> <span 
class="inserted"><ins><em>is the acceptance of their unjust 
practice</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;artists&rdquo; (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless,</strong></del></span> <span 
class="inserted"><ins><em>teaches
+    Indeed, it is the acceptance of their unjust practice that teaches
     people to be doormats.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -711,50 +744,37 @@
     later the company updated the firmware to disallow
     interoperability&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build 
it,</em></ins></span>
-    it is <span class="inserted"><ins><em>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have</em></ins></span> a <span 
class="removed"><del><strong>reference</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> for <span 
class="removed"><del><strong>the facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>changing settings in a
+    Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
     dlink of an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;
-&lt;/li&gt;
+    router</em></ins></span> has a <span class="removed"><del><strong>big 
security hole;</strong></del></span> <span class="inserted"><ins><em>back 
door&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>a back door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance 
cameras</strong></del></span>
-    <span class="inserted"><ins><em>routers</em></ins></span> have <span 
class="inserted"><ins><em>back doors&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
+    routers have back doors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that allow anyone</strong></del></span>
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511198"&gt;
-    &lt;p&gt;ARRIS cable modem</em></ins></span> has a <span 
class="removed"><del><strong>big security hole;</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  &lt;li id="M201511198"&gt;
+    &lt;p&gt;ARRIS cable modem has a &lt;a
+    
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
     back door in the back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1265,7 +1285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-appliances.de.po    25 Feb 2019 10:31:07 -0000      1.69
+++ malware-appliances.de.po    28 Feb 2019 09:00:38 -0000      1.70
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -108,6 +108,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-appliances.fr.po    25 Feb 2019 12:05:44 -0000      1.110
+++ malware-appliances.fr.po    28 Feb 2019 09:00:38 -0000      1.111
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-25 13:03+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-appliances.pot      25 Feb 2019 10:31:07 -0000      1.54
+++ malware-appliances.pot      28 Feb 2019 09:00:38 -0000      1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a "
 
"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\";>
 "
 "send the video they capture to Amazon servers</a>, which save it long-term."

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-appliances.ru.po    25 Feb 2019 10:31:07 -0000      1.142
+++ malware-appliances.ru.po    28 Feb 2019 09:00:38 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- nl.po       25 Feb 2019 10:31:07 -0000      1.36
+++ nl.po       28 Feb 2019 09:00:38 -0000      1.37
@@ -1718,6 +1718,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- pl.po       25 Feb 2019 10:31:07 -0000      1.36
+++ pl.po       28 Feb 2019 09:00:38 -0000      1.37
@@ -1285,6 +1285,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- pot 25 Feb 2019 10:31:07 -0000      1.36
+++ pot 28 Feb 2019 09:00:38 -0000      1.37
@@ -1155,6 +1155,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-drm.de-diff.html        4 Feb 2019 07:31:23 -0000       1.20
+++ proprietary-drm.de-diff.html        28 Feb 2019 09:00:38 -0000      1.21
@@ -50,53 +50,63 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;DRM does more nastiness to published works than merely 
stopping
-people from looking at and/or copying them. Even when it allows you to
-look, it harasses</strong></del></span>
+people from looking at and/or copying them. Even when it 
allows</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;div class="important"&gt;
-&lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>in many 
ways. Cory Doctorow's article presents
-&lt;a href="https://boingboing.net/2010/02/18/infographic-buying-d.html"&gt;
-DVDs as</strong></del></span> <span class="inserted"><ins><em>know 
of</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;If</em></ins></span> you <span class="inserted"><ins><em>know of an 
example that ought</em></ins></span> to
+<span class="removed"><del><strong>look, it harasses you</strong></del></span> 
<span class="inserted"><ins><em>be</em></ins></span> in <span 
class="removed"><del><strong>many ways. Cory Doctorow's article 
presents</strong></del></span> <span class="inserted"><ins><em>this page but 
isn't
+here, please write
+to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://boingboing.net/2010/02/18/infographic-buying-d.html"&gt;
+DVDs as an example&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;We condemn the propaganda term &ldquo;pirate&rdquo; when it is
-applied to people</strong></del></span> <span 
class="inserted"><ins><em>example</em></ins></span> that <span 
class="removed"><del><strong>share copies. Many of these DVDs are made and
-distributed commercially; in reference</strong></del></span> <span 
class="inserted"><ins><em>ought</em></ins></span> to <span 
class="removed"><del><strong>that practice,
-&ldquo;pirate&rdquo; might</strong></del></span> be <span 
class="removed"><del><strong>partly justified. But not when they
-protect users from harassment.&lt;/p&gt;
-
-&lt;p&gt;The fundamental cause of this harassment, and the fundamental wrong
-of the DRM</strong></del></span> in <span class="removed"><del><strong>DVDs, 
is the requirement to use nonfree software</strong></del></span> <span 
class="inserted"><ins><em>this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>play
+applied</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
+to <span class="removed"><del><strong>people that share copies. 
Many</strong></del></span> <span class="inserted"><ins><em>inform us. Please 
include the URL</em></ins></span> of <span class="removed"><del><strong>these 
DVDs are made and
+distributed commercially; in</strong></del></span> <span 
class="inserted"><ins><em>a trustworthy</em></ins></span> reference <span 
class="inserted"><ins><em>or two</em></ins></span>
+to <span class="removed"><del><strong>that practice,
+&ldquo;pirate&rdquo; might be partly justified. But not when they
+protect users from harassment.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>fundamental cause of this 
harassment, and the fundamental wrong
+of the</strong></del></span> <span class="inserted"><ins><em>HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have</em></ins></span> DRM <span 
class="removed"><del><strong>in DVDs, is the requirement to use nonfree 
software</strong></del></span> <span class="inserted"><ins><em>that constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>play
 the DVD. Fortunately we have free replacement software.
 &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;The Netflix Android app</strong></del></span> &lt;a 
-<span 
class="removed"><del><strong>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-forces the use of Google DNS&lt;/a&gt;. This is one of the methods that Netflix
-uses</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
-to <span class="removed"><del><strong>enforce the geolocation restrictions 
dictated by</strong></del></span> <span class="inserted"><ins><em>inform us. 
Please include</em></ins></span> the <span class="removed"><del><strong>movie
+&lt;li&gt;&lt;p&gt;The Netflix Android app &lt;a 
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+forces</strong></del></span> <span class="inserted"><ins><em>make 
sure</em></ins></span> the <span class="removed"><del><strong>use of Google 
DNS&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>one of</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>methods that Netflix
+uses to enforce</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>geolocation</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally 
unacceptable</em></ins></span>
+    restrictions <span class="removed"><del><strong>dictated 
by</strong></del></span> <span class="inserted"><ins><em>in</em></ins></span> 
the <span class="removed"><del><strong>movie
 studios.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;&lt;a
 
href="https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection"&gt;
-HDCP&lt;/a&gt; is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>DRM system that 
encrypts video and audio data from the
-processor</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
-to <span class="removed"><del><strong>the monitor. It is implemented mainly in 
hardware, but
-the system software also participates, which makes it 
qualify</strong></del></span> <span 
class="inserted"><ins><em>serve</em></ins></span> as
-<span class="removed"><del><strong>malware.&lt;/p&gt;
-
-&lt;p&gt;Besides controlling users, HDCP denies their fair-use 
rights</strong></del></span> <span class="inserted"><ins><em>specific 
substantiation.&lt;/p&gt;
-&lt;/div&gt;
-&lt;/div&gt;
-&lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
+HDCP&lt;/a&gt; is</strong></del></span> <span class="inserted"><ins><em>use 
of</em></ins></span> a <span class="removed"><del><strong>DRM 
system</strong></del></span> <span 
class="inserted"><ins><em>printer</em></ins></span> that <span 
class="removed"><del><strong>encrypts video and audio data from the
+processor to the monitor. It is implemented mainly</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>hardware, but</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>system 
software also participates, which makes it qualify as
+malware.&lt;/p&gt;
+
+&lt;p&gt;Besides controlling users, HDCP denies their fair-use 
rights</strong></del></span>
+    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
     upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
     
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
     HP</em></ins></span> and
@@ -140,15 +150,13 @@
     not make what Google has done any less wrong.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Windows DRM
-files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
-be used to identify people browsing through 
Tor&lt;/a&gt;.</strong></del></span>
+<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704130"&gt;
-    &lt;p&gt;&lt;a 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;</em></ins></span>
-    The <span class="removed"><del><strong>vulnerability
-exists only if you</strong></del></span> <span 
class="inserted"><ins><em>Amazon Kindle has DRM&lt;/a&gt;.  That article is 
flawed in that it
-    fails to treat DRM as an ethical question; it takes for granted that
+    &lt;p&gt;&lt;a 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
+    The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
+    fails to treat</em></ins></span> DRM
+<span class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>as an ethical question; it takes for granted that
     whatever Amazon might do to its users is legitimate.  It refers to
     DRM as digital &ldquo;rights&rdquo; management, which is the spin
     term used to promote DRM.  Nonetheless it serves as a reference for
@@ -168,19 +176,19 @@
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to</em></ins></span> use <span 
class="removed"><del><strong>Windows.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>the term &lt;a
-    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    to describe the DRM, but we prefer to use the term</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;
 digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702020"&gt;
-    &lt;p&gt;DRM-restricted files can be used to &lt;a
-    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;
+    &lt;p&gt;DRM-restricted files can</em></ins></span> be used to <span 
class="inserted"><ins><em>&lt;a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;</em></ins></span>
     identify people browsing through Tor&lt;/a&gt;. The vulnerability exists
-    only if you use Windows.&lt;/p&gt;
+    only if you use <span class="removed"><del><strong>Windows.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>Windows.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701300"&gt;</em></ins></span>
@@ -483,7 +491,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-drm.de.po       5 Jan 2019 11:31:34 -0000       1.61
+++ proprietary-drm.de.po       28 Feb 2019 09:00:38 -0000      1.62
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -105,6 +105,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-drm.fr.po       5 Jan 2019 16:13:43 -0000       1.59
+++ proprietary-drm.fr.po       28 Feb 2019 09:00:38 -0000      1.60
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-01-05 17:13+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -91,6 +92,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-drm.it-diff.html        8 Feb 2019 09:30:04 -0000       1.34
+++ proprietary-drm.it-diff.html        28 Feb 2019 09:00:38 -0000      1.35
@@ -62,6 +62,20 @@
 &lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -224,15 +238,9 @@
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
-The Amazon Kindle has DRM&lt;/a&gt;.  That article</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201501030"&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
-    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces the use of Google DNS&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>flawed in that it
-fails to treat DRM as an ethical question; it takes for 
granted</strong></del></span> <span class="inserted"><ins><em>one of the 
methods</em></ins></span> that
-<span class="removed"><del><strong>whatever Amazon might do to its users is 
legitimate.  It refers</strong></del></span>
-    <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>DRM
+The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
+fails to treat DRM as an ethical question; it takes for granted that
+whatever Amazon might do to its users is legitimate.  It refers to DRM
 as digital &ldquo;rights&rdquo; management, which is the spin term
 used to promote DRM.  Nonetheless it serves as a reference for the
 facts.
@@ -248,8 +256,13 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM
-in Windows&lt;/a&gt;, introduced to cater to &lt;a 
href="#bluray"&gt;Bluray&lt;/a&gt;
-disks.  (The article talks about how the same malware would later be
+in Windows&lt;/a&gt;, introduced to cater to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201501030"&gt;
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#bluray"&gt;Bluray&lt;/a&gt;
+disks.  (The article talks about how</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+    forces</em></ins></span> the <span class="removed"><del><strong>same 
malware would later be
 introduced in MacOS.  That had not been done at the time, but it was
 done subsequently.)
 &lt;/p&gt;
@@ -257,8 +270,9 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;DRM
-in MacOS&lt;/a&gt;.  This article focuses on the fact that a new model of
-Macbook introduced a requirement for monitors to have malicious
+in MacOS&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>use 
of Google DNS&lt;/a&gt;.</em></ins></span> This <span 
class="removed"><del><strong>article focuses on</strong></del></span> <span 
class="inserted"><ins><em>is one of</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>methods</em></ins></span> that <span 
class="removed"><del><strong>a new model of
+Macbook introduced a requirement for monitors</strong></del></span>
+    <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>have malicious
 hardware, but DRM software in MacOS is involved in 
activating</strong></del></span> <span 
class="inserted"><ins><em>enforce</em></ins></span> the
 <span class="removed"><del><strong>hardware.  The software for accessing 
iTunes is also responsible.
 &lt;/p&gt;
@@ -312,10 +326,12 @@
 
     &lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
     don't use Bluray <span class="removed"><del><strong>disks!
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201102250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201102250"&gt;
     &lt;p&gt;Android &lt;a
     
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
     contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
@@ -336,12 +352,10 @@
 
     &lt;p&gt;The fundamental cause of this harassment, and the fundamental
     wrong of the DRM in DVDs, is the requirement to use nonfree software
-    to play the DVD. Fortunately we have free replacement 
software.&lt;/p&gt;</em></ins></span>
+    to play the DVD. Fortunately we have free replacement software.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;</em></ins></span>
+  &lt;li id="M200811210"&gt;</em></ins></span>
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;</em></ins></span>
     DRM <span class="inserted"><ins><em>(digital restrictions 
mechanisms)</em></ins></span> in <span class="removed"><del><strong>Cars Will 
Drive Consumers Crazy&lt;/a&gt;.
@@ -445,7 +459,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-drm.it.po       8 Feb 2019 08:59:36 -0000       1.51
+++ proprietary-drm.it.po       28 Feb 2019 09:00:38 -0000      1.52
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2017-12-30 14:17+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -99,6 +99,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-drm.ja-diff.html        4 Feb 2019 07:31:23 -0000       1.33
+++ proprietary-drm.ja-diff.html        28 Feb 2019 09:00:38 -0000      1.34
@@ -63,6 +63,20 @@
 &lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810150"&gt;
     &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
     use of independent replacement ink cartridges. Their &ldquo;security
@@ -438,7 +452,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.ja.po       5 Jan 2019 11:31:34 -0000       1.46
+++ proprietary-drm.ja.po       28 Feb 2019 09:00:38 -0000      1.47
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:55+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -84,6 +84,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-drm.pot 5 Jan 2019 11:31:34 -0000       1.29
+++ proprietary-drm.pot 28 Feb 2019 09:00:38 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -69,6 +69,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "

Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-drm.ru.po       25 Feb 2019 09:37:05 -0000      1.79
+++ proprietary-drm.ru.po       28 Feb 2019 09:00:38 -0000      1.80
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-10-08 17:34+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -91,6 +92,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Printer manufacturers are very innovative&mdash;at blocking the use of "
 "independent replacement ink cartridges. Their &ldquo;security "
 "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="

Index: proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-subscriptions.de-diff.html      4 Feb 2019 07:31:23 -0000       
1.16
+++ proprietary-subscriptions.de-diff.html      28 Feb 2019 09:00:38 -0000      
1.17
@@ -54,7 +54,21 @@
 &lt;div class="column-limit" 
id="proprietary-subscriptions"&gt;&lt;/div&gt;</em></ins></span>
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201711010"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
     with a universal back door, and tethered to a server that requires
@@ -156,7 +170,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-subscriptions.de.po     5 Jan 2019 11:31:35 -0000       1.20
+++ proprietary-subscriptions.de.po     28 Feb 2019 09:00:38 -0000      1.21
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -91,6 +91,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Sony has brought back its robotic pet Aibo, this time <a href=\"https://";
 "motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
 "subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "

Index: proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-subscriptions.fr.po     5 Jan 2019 16:13:44 -0000       1.27
+++ proprietary-subscriptions.fr.po     28 Feb 2019 09:00:38 -0000      1.28
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-01-05 17:13+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -76,6 +77,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Sony has brought back its robotic pet Aibo, this time <a href=\"https://";
 "motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
 "subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "

Index: proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-subscriptions.ja-diff.html      4 Feb 2019 07:31:23 -0000       
1.23
+++ proprietary-subscriptions.ja-diff.html      28 Feb 2019 09:00:38 -0000      
1.24
@@ -56,6 +56,20 @@
 &lt;div class="column-limit" id="proprietary-subscriptions"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
@@ -159,7 +173,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-subscriptions.ja.po     5 Jan 2019 11:31:35 -0000       1.14
+++ proprietary-subscriptions.ja.po     28 Feb 2019 09:00:39 -0000      1.15
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2016-09-16 09:36+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -73,6 +73,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Sony has brought back its robotic pet Aibo, this time <a href=\"https://";
 "motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
 "subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "

Index: proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-subscriptions.pot       5 Jan 2019 11:31:35 -0000       1.14
+++ proprietary-subscriptions.pot       28 Feb 2019 09:00:39 -0000      1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -60,6 +60,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Sony has brought back its robotic pet Aibo, this time <a "
 
"href=\"https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet\";>
 "
 "with a universal back door, and tethered to a server that requires a "

Index: proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-subscriptions.ru.po     25 Feb 2019 09:37:05 -0000      1.32
+++ proprietary-subscriptions.ru.po     28 Feb 2019 09:00:39 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-06-23 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -77,6 +78,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Sony has brought back its robotic pet Aibo, this time <a href=\"https://";
 "motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
 "subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-surveillance.de-diff.html       25 Feb 2019 10:31:07 -0000      
1.48
+++ proprietary-surveillance.de-diff.html       28 Feb 2019 09:00:39 -0000      
1.49
@@ -327,7 +327,8 @@
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
   Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-  ships with default settings that show no regard</strong></del></span>
+  ships with default settings that show no regard for the
+  privacy of its users&lt;/a&gt;, giving Microsoft</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -347,8 +348,8 @@
   &lt;li id="M201507300"&gt;
     &lt;p&gt;Windows 10 &lt;a
     
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-    ships with default settings that show no regard</em></ins></span> for the 
privacy of
-    its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    ships with default settings that show no regard for the privacy of
+    its users&lt;/a&gt;, giving Microsoft</em></ins></span> the 
&ldquo;right&rdquo; to snoop on
     the users' files, text input, voice input, location info, contacts,
     calendar records and web browsing history, as well as automatically
     connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
@@ -490,7 +491,12 @@
     that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;There's</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410200"&gt;
     &lt;p&gt;Various operations in &lt;a
@@ -499,14 +505,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201401100.1"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;p&gt;There's a lot more &lt;a href="#SpywareIniThings"&gt;iThing 
spyware&lt;/a&gt;, and
+&lt;p&gt;There's</em></ins></span> a lot more &lt;a 
href="#SpywareIniThings"&gt;iThing spyware&lt;/a&gt;, and
 &lt;a href="/proprietary/malware-apple.html"&gt;Apple 
malware&lt;/a&gt;.&lt;/p&gt;
 
 
@@ -529,12 +535,24 @@
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
-    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
+  &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
+    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
+    worked in various ways to prevent that, and deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping of these apps.&lt;/p&gt;
+
+  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
-    own malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
+    being nonfree. It also distributes</strong></del></span> its
+    own <span class="removed"><del><strong>nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -553,27 +571,42 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>contrary, it
-    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
+    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
+    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
+    <span class="removed"><del><strong>do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the
+    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>Edward 
Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
+    them</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
 
-  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
-    text messages, read call, location</em></ins></span> and
-    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
-    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>phones on and off, 
listen</em></ins></span> to the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span>
+    <span class="inserted"><ins><em>read</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -581,25 +614,37 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>injustice of their
-    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
-    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
+    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
+    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps</strong></del></span> <span class="inserted"><ins><em>bugs in the phones' 
radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt;</strong></del></span>
 <span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>users cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>has full access</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable 
phones</em></ins></span>
+    to
+      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -611,38 +656,63 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &lt;p&gt;In</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>JS injection is</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    to use</em></ins></span> it <span class="removed"><del><strong>redirects 
the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this 
app</strong></del></span> <span class="inserted"><ins><em>without having your 
fingerprints taken. Users would</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version of</strong></del></span>
+    <span class="inserted"><ins><em>no way to tell whether</em></ins></span> 
the <span class="removed"><del><strong>app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>phone is 
snooping on them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  &lt;li id="M201611170"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -651,13 +721,13 @@
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps,</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>still counts as a
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
@@ -702,8 +772,8 @@
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
+  &lt;li id="M201308080"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
@@ -712,7 +782,7 @@
   &lt;li id="M201210170"&gt;
     &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="removed"><del><strong>confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>talks 
about iOS 6,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -735,8 +805,7 @@
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from
-    <span class="removed"><del><strong>cheating?  There</strong></del></span> 
<span class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -750,83 +819,94 @@
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact</strong></del></span> <span 
class="inserted"><ins><em>data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    disable Google Play itself to completely stop the tracking.  
This</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission</em></ins></span> is <span class="removed"><del><strong>no 
systematic way</strong></del></span> <span class="inserted"><ins><em>a 
substantial expense</em></ins></span> for <span 
class="removed"><del><strong>Google,</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
-    not wanted</em></ins></span> or <span class="removed"><del><strong>Android
-    users, to inspect executable proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</em></ins></span>
+    that <span class="inserted"><ins><em>users can't delete&lt;/a&gt;, 
and</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>see what they
-    do.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234</strong></del></span>
 
-  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the
-    <span class="removed"><del><strong>source code somehow to determine 
whether they mistreat users</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and 
microphone</em></ins></span> in
-    <span class="removed"><del><strong>various ways. If it 
did</strong></del></span> <span class="inserted"><ins><em>Android phones
+    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps that track users</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us</em></ins></span> by <span 
class="inserted"><ins><em>a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use</em></ins></span> a <span class="removed"><del><strong>good 
job</strong></del></span> <span class="inserted"><ins><em>modified 
version</em></ins></span> of <span class="removed"><del><strong>this, it could 
more or less
-    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>Android that &lt;a
+    by Google, use a modified version</em></ins></span> of Android <span 
class="removed"><del><strong>apps can collude to transmit 
users'</strong></del></span> <span class="inserted"><ins><em>that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app developers 
<span class="removed"><del><strong>are clever</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the personal details of users that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is 
not</em></ins></span> enough to <span 
class="removed"><del><strong>outsmart</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>install the app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot 
trust</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.</em></ins></span>  Google <span 
class="inserted"><ins><em>should clearly and
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
     honestly identify the information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="inserted"><ins><em>truly</em></ins></span> protect <span 
class="removed"><del><strong>us. We</strong></del></span> <span 
class="inserted"><ins><em>people's privacy, we</em></ins></span> must <span 
class="removed"><del><strong>demand release of source code 
to</strong></del></span> <span class="inserted"><ins><em>prevent Google
-    and other companies from getting this personal information 
in</em></ins></span> the
-    <span class="removed"><del><strong>public, so we</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
@@ -844,24 +924,21 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="removed"><del><strong>depend</strong></del></span> <span 
class="inserted"><ins><em>contain JavaScript code, and &lt;a
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>each other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    the e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
     send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>privacy and security</strong></del></span> 
<span class="inserted"><ins><em>Kindle: &lt;a
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
     report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -885,19 +962,14 @@
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
     reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>283 Android VPN apps 
concluded</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of the
-    promises</strong></del></span> <span class="inserted"><ins><em>this is 
used</em></ins></span> for <span class="removed"><del><strong>privacy, 
security, and anonymity given by the
-    majority</strong></del></span> <span 
class="inserted"><ins><em>repression</em></ins></span> of <span 
class="removed"><del><strong>VPN apps&mdash;millions</strong></del></span> 
<span class="inserted"><ins><em>forbidden sharing
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>users may be 
unawarely subject
-    to poor security guarantees and abusive practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>nonfree software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice</em></ins></span> of <span 
class="removed"><del><strong>proprietary VPN</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>nonfree software</em></ins></span>
+    is not <span class="removed"><del><strong>enough
+to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>a cure for the 
injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -909,66 +981,44 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>have a surveillance feature for &lt;a
+    &lt;p&gt;Many nonfree apps</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>research paper that tracks and 
infringes</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with</em></ins></span> the <span 
class="removed"><del><strong>privacy of
-    users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious 
functionalities,</em></ins></span> such as <span 
class="removed"><del><strong>NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access 
to</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps</em></ins></span> 
that <span class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>used to
+    be on</em></ins></span> Google <span class="removed"><del><strong>should 
clearly</strong></del></span> <span class="inserted"><ins><em>Play had one or 
more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing</em></ins></span> users' <span class="removed"><del><strong>text 
messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps</strong></del></span> <span 
class="inserted"><ins><em>photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; 
them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users,</em></ins></span> and <span class="removed"><del><strong>may 
turn</strong></del></span> <span 
class="inserted"><ins><em>redirecting</em></ins></span>
-    them <span class="removed"><del><strong>over to the UK government if
-      requested.&lt;/dd&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>honestly identify the information it 
collects</strong></del></span> <span class="inserted"><ins><em>often malicious 
ads</em></ins></span> on users, <span 
class="removed"><del><strong>instead</strong></del></span> <span 
class="inserted"><ins><em>and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> to <span class="inserted"><ins><em>phishing 
sites that stole their credentials. Furthermore,</em></ins></span>
-    the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span class="inserted"><ins><em>user 
interface</em></ins></span> of <span class="removed"><del><strong>the JS 
injection is</strong></del></span> <span class="inserted"><ins><em>most of them 
was designed</em></ins></span> to <span class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also, it redirects the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, 
and</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>most 
of them was designed</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
+and other companies</strong></del></span> <span class="inserted"><ins><em>make 
uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should</em></ins></span> also <span 
class="removed"><del><strong>uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>this app have
-      confirmed that the non-premium version</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really do.&lt;/p&gt;
+    haven't yet, but they should also stay away</em></ins></span> from <span 
class="removed"><del><strong>getting this personal 
information</strong></del></span> <span class="inserted"><ins><em>nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>the first
+place!&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span> <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable</strong></del></span> <span class="inserted"><ins><em>150 most 
popular
+    gratis VPN apps in</em></ins></span> Google Play <span 
class="removed"><del><strong>itself</strong></del></span> <span 
class="inserted"><ins><em>found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
@@ -976,46 +1026,28 @@
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had</em></ins></span> found 
that <span class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of
-    the <span class="removed"><del><strong>top-ranked</strong></del></span> 
<span class="inserted"><ins><em>top 10</em></ins></span> gratis
-  <span class="removed"><del><strong>proprietary Android</strong></del></span> 
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis</strong></del></span> 
<span class="inserted"><ins><em>have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These</em></ins></span> apps <span 
class="removed"><del><strong>as &ldquo;free&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>are gratis,</em></ins></span> but <span 
class="removed"><del><strong>most of them</strong></del></span> <span 
class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>not in fact</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
-    href="/philosophy/free-sw.html"&gt;free <span 
class="removed"><del><strong>software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>software&lt;/a&gt;.&lt;/p&gt;
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly 
always</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding</em></ins></span> 
that <span class="removed"><del><strong>will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps,</strong></del></span> <span 
class="inserted"><ins><em>it notify the</em></ins></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>of what 
it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>lawsuit is about a side issue. What the company 
does
-    with the data is a secondary issue. The principal wrong here 
is</em></ins></span> that <span class="removed"><del><strong>they 
don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps</strong></del></span>
-    <span class="inserted"><ins><em>the company gets</em></ins></span> that 
<span class="removed"><del><strong>track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>data 
at all.&lt;/p&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is
+    <span class="removed"><del><strong>yet another 
example</strong></del></span>
+    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users</em></ins></span> of <span class="removed"><del><strong>nonfree software 
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what 
it will do
+    with</em></ins></span> the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
+    unthinkable</strong></del></span> <span class="inserted"><ins><em>side 
issue. What the company does</em></ins></span>
+    with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1023,187 +1055,82 @@
     tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="inserted"><ins><em>gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>can collude</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>transmit users' personal</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>it obtains from the same machine via
-    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed information about
-    the user's activities in the app; others only say</em></ins></span> that 
<span class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>gratis</em></ins></span> Android apps &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
<span class="inserted"><ins><em>the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>machine's 
&ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities</em></ins></span> in the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way 
to</strong></del></span> <span class="inserted"><ins><em>app; others 
only</em></ins></span> say
+  <span class="removed"><del><strong>&ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes for granted</strong></del></span> that the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
+    <span class="inserted"><ins><em>using</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>app, 
but</em></ins></span> that <span class="removed"><del><strong>snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some</em></ins></span> Android apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span class="removed"><del><strong>personal 
details</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> of users that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some</strong></del></span>
 
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on</em></ins></span> Android <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of</strong></del></span> 
<span class="inserted"><ins><em>user's location even when</em></ins></span> 
users <span class="removed"><del><strong>is not enough</strong></del></span> 
<span class="inserted"><ins><em>disable &ldquo;location
+    record the user's location even</em></ins></span> when <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this 
point,</strong></del></span> <span class="inserted"><ins><em>turn off the other 
kinds of location
-    tracking, but</em></ins></span> most users <span 
class="removed"><del><strong>have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>will be 
tricked by</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>misleading 
control.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>honestly identify</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google
-and other companies</strong></del></span> <span class="inserted"><ins><em>save
-    a recording. But I can't be sure</em></ins></span> from <span 
class="removed"><del><strong>getting this personal information 
in</strong></del></span> the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>tracking.  This is
-    yet another example</strong></del></span> <span 
class="inserted"><ins><em>apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
-
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
-
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span> <span 
class="inserted"><ins><em>get rid</em></ins></span> of the <span 
class="removed"><del><strong>most popular</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both 
proprietary</em></ins></span>
-    Android <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>app's 
functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>proprietary apps 
by getting apps from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article</strong></del></span> <span 
class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr</em></ins></span> should not have <span 
class="removed"><del><strong>described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>the usual analytics tools are
-  legitimate,</strong></del></span> <span class="inserted"><ins><em>users 
communicate such info to each
-    other</em></ins></span> but <span class="removed"><del><strong>is that 
valid?  Software developers have no right</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to
-  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>the server's database.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on</em></ins></span> users <span class="removed"><del><strong>are 
doing or how.  &ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular</em></ins></span> Android apps <span 
class="removed"><del><strong>(but not</strong></del></span>
-    <span class="inserted"><ins><em>is pervasive and sometimes very clever. 
Some trackers can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span> <span 
class="inserted"><ins><em>other ways</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="removed"><del><strong>any file on the system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1215,88 +1142,156 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>implements 
DRM, too&mdash;that there is no way</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
 
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>other hand, Google 
redistributes nonfree Android apps,</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span class="removed"><del><strong>latest iThings 
system, &ldquo;turning off&rdquo; WiFi</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
+    and <span class="removed"><del><strong>Bluetooth</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the
       <span class="removed"><del><strong>obvious way &lt;a
  
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span> <span 
class="inserted"><ins><em>responsibility</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>get 
rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;</em></ins></span>
+    which <span class="removed"><del><strong>would mean no 
way</strong></del></span> <span class="inserted"><ins><em>users are 
HIV-positive, then provides the information</em></ins></span> to <span 
class="removed"><del><strong>use it without having your fingerprints
+      taken. Users would</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="removed"><del><strong>no way</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> the <span class="removed"><del><strong>phone is 
snooping</strong></del></span> <span class="inserted"><ins><em>server's 
database.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Could Google</em></ins></span> have <span 
class="inserted"><ins><em>done a better job of preventing apps from
-    cheating? There is</em></ins></span> no <span 
class="inserted"><ins><em>systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother 
can
-        get them from there.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers</em></ins></span> can
+        <span class="removed"><del><strong>get them from 
there.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>at least 30
-        days.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all</em></ins></span> phone <span 
class="removed"><del><strong>number</strong></del></span> <span 
class="inserted"><ins><em>numbers and email addresses&lt;/a&gt; in user's 
address
+    book to developer's server.  Note</em></ins></span> that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>user types into it&lt;/a&gt;; the server records 
these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
-    the <span class="inserted"><ins><em>source</em></ins></span> code <span 
class="removed"><del><strong>Apple
-      sends</strong></del></span> <span 
class="inserted"><ins><em>somehow</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>most 
popular iOS apps
       &lt;a class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>determine whether 
they mistreat</em></ins></span> users <span class="removed"><del><strong>with 
third parties.&lt;/p&gt;
+       behavioral</strong></del></span> <span class="inserted"><ins><em>other 
hand, Google redistributes nonfree Android apps,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>photos and
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
       videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
       iCloud Photo Library stores every photo and video you take,
       and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>app developers</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
+      Any edits you make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>clever
-    enough to outsmart</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>being
+    nonfree. It also distributes its own nonfree apps, such</em></ins></span> 
as <span class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud 
feature is</strong></del></span> <span class="inserted"><ins><em>Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
+      startup</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>preventing apps from
+    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+    to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps to see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>did</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>protect us. We must demand 
release</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> to <span 
class="inserted"><ins><em>the
+    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> to <span 
class="inserted"><ins><em>the
     public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1335,43 +1330,42 @@
       enabled</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access</em></ins></span> it
-      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple</strong></del></span>
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>this was done without</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+    distributing a spyware app</em></ins></span> for <span 
class="inserted"><ins><em>its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
-    If</em></ins></span> the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>fine print 
of</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>app said that 
users gave consent for this,
-    would that make</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+      Either Apple helps the NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>app would record</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
-    the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen</em></ins></span> to 
<span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span>
+    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of</em></ins></span> the <span 
class="inserted"><ins><em>app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1409,32 +1403,33 @@
 
     &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the 
phones</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>off, listen to</strong></del></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>user must
-    explicitly opt-in before</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span> 
<span class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>user's
     consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>designed to
       disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>inadequate as a protection against
     massive surveillance.&lt;/p&gt;</em></ins></span>
@@ -1657,40 +1652,42 @@
 scans your</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of</em></ins></span> mobile <span 
class="removed"><del><strong>phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>applications, from Android</em></ins></span> and 
<span class="removed"><del><strong>suggests you to share the picture you take 
according to who</strong></del></span> <span class="inserted"><ins><em>iOS
+    &lt;p&gt;More than 73% and 47% of</em></ins></span> mobile <span 
class="removed"><del><strong>phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>applications, from Android</em></ins></span> and 
<span class="removed"><del><strong>suggests you to share the picture you take 
according to who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;
+    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt;</em></ins></span> of 
<span class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
users with
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
 
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+    &lt;p&gt;Like</em></ins></span> most &ldquo;music screaming&rdquo; 
disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;, and</em></ins></span> 
some
-      <span class="removed"><del><strong>known-faces database, which means the 
pictures</strong></del></span> are <span 
class="removed"><del><strong>likely</strong></del></span> <span 
class="inserted"><ins><em>starting</em></ins></span>
-    to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
-
-    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    &lt;p&gt;This article shows the &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</em></ins></span>
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>attitude 
of</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
+    typical example of the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+  &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
     study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis proprietary
@@ -1698,34 +1695,24 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but</em></ins></span> most <span 
class="removed"><del><strong>&ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>of them are not 
in fact &lt;a
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that 
word</em></ins></span>
-    is <span class="removed"><del><strong>based on proprietary malware (DRM 
and snooping). In August
-      2015 it</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the 
<span class="inserted"><ins><em>average.&lt;/p&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that.</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;.</em></ins></span> This 
is <span class="removed"><del><strong>a typical example 
of</strong></del></span> <span class="inserted"><ins><em>in addition 
to</em></ins></span>
-    the <span class="removed"><del><strong>attitude</strong></del></span> 
<span class="inserted"><ins><em>snooping done by the phone company, and perhaps 
by the OS in
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
@@ -1775,13 +1762,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC</em></ins></span> says most mobile apps for children don't 
respect privacy: &lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    &lt;p&gt;FTC</em></ins></span> says most mobile apps for children don't 
respect privacy: &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1791,9 +1777,8 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
@@ -1825,12 +1810,15 @@
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
     
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201512290"&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
     video game consoles</em></ins></span> snoop on <span 
class="inserted"><ins><em>their users and report to</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
@@ -1873,23 +1861,24 @@
     to <span class="removed"><del><strong>the app developer but did not
       ask about sending</strong></del></span> <span 
class="inserted"><ins><em>spy through</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
       weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.  Here's</em></ins></span> information 
<span class="removed"><del><strong>to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>on &lt;a
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
+    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    have nothing</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1913,16 +1902,42 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> security <span 
class="removed"><del><strong>vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers to listen</strong></del></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based 
in</strong></del></span> <span class="inserted"><ins><em>sucker&mdash;reject 
all</em></ins></span> the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on <span class="removed"><del><strong>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>article uses the term &lt;a
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1933,97 +1948,54 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>joke: The other day</em></ins></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>its users 
through</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Emo Phillips made</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see</em></ins></span> out
+      <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
     
-    &lt;p&gt;The app</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that</em></ins></span> 
was <span class="removed"><del><strong>reporting</strong></del></span>
-<span class="inserted"><ins><em>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of the <span class="removed"><del><strong>vibrator 
minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>is 
opt-in in newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>Vizio</em></ins></span> software <span 
class="removed"><del><strong>which users could have
-      checked</strong></del></span> <span class="inserted"><ins><em>is
-    nonfree, we don't know what is actually happening behind the 
scenes,</em></ins></span>
-    and <span class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>all future updates will leave</em></ins></span> the 
<span class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>collecting lots of 
personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but</strong></del></span> <span class="inserted"><ins><em>easiest 
way to make sure</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>isn't spying on you is
-    to disconnect</em></ins></span> it <span class="removed"><del><strong>had 
sold</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able to figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>terrestrial antenna
-    instead. Unfortunately,</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>firewall</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in the own words</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>facts 
it presents. It
-    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the 
<span class="removed"><del><strong>FBI could listen</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness of 
surrendering</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>him,
+    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
+    and <span class="inserted"><ins><em>there is no guarantee that all future 
updates will leave</em></ins></span> the <span class="removed"><del><strong>FBI 
could listen to these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
+    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> make sure <span 
class="removed"><del><strong>to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;
     (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2031,27 +2003,36 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
-    report <span class="removed"><del><strong>its location to someone else and 
to transmit
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>you</em></ins></span> is <span 
class="removed"><del><strong>designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
+    to <span class="removed"><del><strong>report its 
location</strong></del></span> <span class="inserted"><ins><em>disconnect it 
from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
+    be an old computer running completely free software),</em></ins></span> 
and <span class="inserted"><ins><em>set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>transmit
        conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but</strong></del></span> 
<span class="inserted"><ins><em>everything</em></ins></span> that <span 
class="removed"><del><strong>could be a
-      misunderstanding.  However, it</strong></del></span> is <span 
class="removed"><del><strong>certainly surveillance, at
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; 
comes</strong></del></span> <span class="inserted"><ins><em>block connections 
to Vizio's servers. Or, as a last resort,
+    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>an Android app</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> article <span 
class="removed"><del><strong>says this is a back door, but that could be a
+      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>for the facts</em></ins></span> it <span 
class="inserted"><ins><em>presents. It</em></ins></span>
+    is <span class="removed"><del><strong>certainly surveillance, at
       least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
+    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -2066,19 +2047,35 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that the specific sabotage method Lenovo used did</strong></del></span> 
not <span class="removed"><del><strong>affect
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>the specific sabotage method Lenovo used 
did</strong></del></span> <span class="inserted"><ins><em>is viewed on them, 
and</em></ins></span> not <span class="removed"><del><strong>affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>just broadcasts and
-    cable&lt;/a&gt;. Even if the image</em></ins></span> is <span 
class="removed"><del><strong>not really
+    cable&lt;/a&gt;. Even if the image</em></ins></span> is <span 
class="inserted"><ins><em>coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+puts</strong></del></span> <span class="inserted"><ins><em>hidden as it 
was</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>be picked up by 
proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2088,20 +2085,33 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span> <span class="inserted"><ins><em>other 
devices in range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
-    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>a way to disable the
-    surveillance, even if</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers</em></ins></span> 
can <span class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
+    across devices.&lt;/p&gt;
+
+    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off, but having</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2110,115 +2120,134 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users</em></ins></span> to <span 
class="removed"><del><strong>place</strong></del></span> new <span 
class="removed"><del><strong>items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware 
running</em></ins></span>
-    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as 
to determine that they
-    are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>communicate</strong></del></span> <span 
class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="removed"><del><strong>it,
-      is</strong></del></span> <span class="inserted"><ins><em>Web activity, 
and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
-    across devices.&lt;/p&gt;
+  &lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can communicate with it,
+      is</strong></del></span> <span class="inserted"><ins><em>it 
isn't</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing</strong></del></span> <span 
class="inserted"><ins><em>possible to turn this off, but having it 
enabled</em></ins></span> by <span class="inserted"><ins><em>default
-    is an injustice already.&lt;/p&gt;
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>the fact
+      that the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>what programs people watch, and even what they 
wanted</em></ins></span> to
+    <span class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>manufacturer, 
based on the fact
-      that</strong></del></span> <span class="inserted"><ins><em>600 millions 
social media profiles</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>company
-    already monitors. Tivo customers are unaware they're
-    being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that the device gives the 
company</strong></del></span> <span class="inserted"><ins><em>new 
combined</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; to make its TVs snoop 
on what
+    users watch&lt;/a&gt;.  The TVs did not do</em></ins></span> that <span 
class="removed"><del><strong>the device gives the company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>when first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to</em></ins></span> 
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is done by free
+    software</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span>
+    and</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
-    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch, and</em></ins></span> even <span 
class="removed"><del><strong>which page the user reads at</strong></del></span> 
what <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
+      Kindle:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the <span class="removed"><del><strong>user 
reads at what</strong></del></span> time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>they 
wanted</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>get users' 
formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2228,315 +2257,273 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>tracking, the TV 
will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in the car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span class="inserted"><ins><em>and would then 
have to give</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>US or some
-    other government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time;</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span class="removed"><del><strong>possible to 
physically remove the cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary</strong></del></span> 
<span class="inserted"><ins><em>done by free</em></ins></span>
-    software in <span class="removed"><del><strong>cars</strong></del></span> 
<span class="inserted"><ins><em>your own computer.&lt;/p&gt;
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>switch to turn this off</em></ins></span> has
+    no <span class="removed"><del><strong>authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>effect&lt;/a&gt;.  (The fact</em></ins></span> that 
<span class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>transmission reports a 404 error
+    really</em></ins></span> means <span class="removed"><del><strong>it 
demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive</em></ins></span> information <span 
class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201411090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article,</strong></del></span> <span 
class="inserted"><ins><em>Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is 
<span class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track</strong></del></span> <span 
class="inserted"><ins><em>nothing;</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>2014,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done by malware. The other
-      cases mentioned</strong></del></span> <span class="inserted"><ins><em>we 
don't expect this has got
-    better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware 
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>TV will not
-    work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>user watches, and the switch</em></ins></span> to 
<span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
-      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>break 
security on</em></ins></span> a <span class="removed"><del><strong>matter of 
proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>people who</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
-        designed</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>video they capture</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows</em></ins></span> everyone <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>that comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>house,</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>car's location</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look</em></ins></span>
+    at <span class="removed"><del><strong>any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information,</strong></del></span> <span 
class="inserted"><ins><em>the videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly</em></ins></span> all <span 
class="inserted"><ins><em>&ldquo;home security cameras&rdquo; &lt;a
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any 
way</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of
-    <span class="removed"><del><strong>making</strong></del></span> <span 
class="inserted"><ins><em>everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>device that can obey 
your voice commands without
-    potentially spying on you.  Even if it is 
air-gapped,</strong></del></span> <span class="inserted"><ins><em>better
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>could be
-    saving up records about you</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
-    security</em></ins></span> for <span class="removed"><del><strong>later 
examination.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making sure they don't get 
to
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in the videos. That's not
+    security for your home. Security means making sure they 
don't</em></ins></span> get <span class="inserted"><ins><em>to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span>
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>data
+      and hand</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
-    even when</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
+        designed</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span>
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>product as shipped 
doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to
-    <span class="removed"><del><strong>disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert</em></ins></span> it
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>everyone in</strong></del></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of
+    making</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response:</em></ins></span> a <span 
class="removed"><del><strong>device that can obey your voice commands without
+    potentially spying on you.  Even if it is air-gapped, it could be
+    saving up records</strong></del></span> <span 
class="inserted"><ins><em>labeling
+    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span> <span class="inserted"><ins><em>their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>personal information</em></ins></span> about <span 
class="inserted"><ins><em>how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
-    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
-    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>data
+    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see</strong></del></span> <span 
class="inserted"><ins><em>figure</em></ins></span> out <span 
class="inserted"><ins><em>who</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span class="inserted"><ins><em>company has 
been ordered to pay a total</em></ins></span> of <span 
class="inserted"><ins><em>C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    Crackers found</em></ins></span> a way to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less 
all</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>speech 
recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span> 
would <span class="removed"><del><strong>say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>report 
what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV 
manufacturers</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> on 
+      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>a child's speech, 
and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2549,13 +2536,13 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
-      <span class="removed"><del><strong>range so</strong></del></span> <span 
class="inserted"><ins><em>many cases &lt;a
+    to <span class="removed"><del><strong>turn this off, but having it enabled 
by default</strong></del></span> <span class="inserted"><ins><em>snoop on other 
people, DJI</em></ins></span> is <span class="removed"><del><strong>an 
injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2563,6 +2550,28 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>HP 
servers&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>make 
sure</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles</strong></del></span> <span 
class="inserted"><ins><em>user is still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>subscription,</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>hasn't printed more 
pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>cheaper in some
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in
+      <span class="removed"><del><strong>range so</strong></del></span> <span 
class="inserted"><ins><em>the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -3246,7 +3255,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.de.po      24 Feb 2019 14:00:05 -0000      1.263
+++ proprietary-surveillance.de.po      28 Feb 2019 09:00:39 -0000      1.264
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3833,6 +3833,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary-surveillance.fr.po      25 Feb 2019 12:05:44 -0000      1.382
+++ proprietary-surveillance.fr.po      28 Feb 2019 09:00:39 -0000      1.383
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-25 13:03+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3199,6 +3200,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-surveillance.it-diff.html       25 Feb 2019 10:31:07 -0000      
1.115
+++ proprietary-surveillance.it-diff.html       28 Feb 2019 09:00:39 -0000      
1.116
@@ -485,7 +485,7 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      Spotlight search&lt;/a&gt; sends users' search 
terms</strong></del></span>
+      Spotlight search&lt;/a&gt; sends users' search</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410200"&gt;
     &lt;p&gt;Various operations in &lt;a
@@ -496,7 +496,7 @@
   &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
Apple.&lt;/p&gt;
+    Spotlight search&lt;/a&gt; sends users' search</em></ins></span> terms to 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -519,8 +519,9 @@
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of</strong></del></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
   &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
@@ -603,36 +604,22 @@
     the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
 what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
     phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote 
command, and users cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
-    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -642,35 +629,56 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting</strong></del></span> 
<span class="inserted"><ins><em>the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because</em></ins></span>
+    this <span class="removed"><del><strong>personal information 
in</strong></del></span> <span class="inserted"><ins><em>would require 
circumventing</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location tracking,</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know</em></ins></span> you <span class="removed"><del><strong>must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>want</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> be <span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;
+
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
   &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
   behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
   found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>say
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
   legitimate, but is that valid?  Software developers have no right to
   analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
+  just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
       Some Motorola phones modify Android to
@@ -678,16 +686,13 @@
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span class="removed"><del><strong>any 
file on the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spied 
on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -746,10 +751,10 @@
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the photos
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -1423,100 +1428,35 @@
 &lt;li&gt;&lt;p&gt;
 &lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that,</em></ins></span> and 
<span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>deleted these apps 
after
+Note that the specific sabotage method Lenovo</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</em></ins></span> in <span class="inserted"><ins><em>the 
responsibility for the injustice of their being
-    nonfree. It also distributes</em></ins></span> its own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>nonfree 
apps, such as Google Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of 
members</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>these apps, and study
-    the source code somehow</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
     &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -2018,9 +1958,10 @@
 
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used <span class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to 
make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs</em></ins></span> did not <span 
class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>do that 
when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
@@ -2055,26 +1996,91 @@
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>user declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV 
will</em></ins></span> not <span class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>had 
installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
@@ -2085,11 +2091,8 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a</em></ins></span> 
&ldquo;smart&rdquo; <span class="inserted"><ins><em>TV&lt;/a&gt;
-    and use its</em></ins></span> camera <span class="removed"><del><strong>is 
&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</strong></del></span> to <span class="removed"><del><strong>outsmart
+    Crackers found a way to break security on a</em></ins></span> 
&ldquo;smart&rdquo; <span class="removed"><del><strong>device means the 
manufacturer is using it</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;
+    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>outsmart
       you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2123,27 +2126,13 @@
     passes by,</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring</em></ins></span> used
-      <span class="removed"><del><strong>by most US 
libraries,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>look at 
what's in the videos. That's not
-    security for your home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
+      <span class="removed"><del><strong>by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>let 
individual employees look
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
@@ -2151,35 +2140,52 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no 
authentication</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
-    even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
the <span class="removed"><del><strong>modem.  However, even 
if</strong></del></span> <span class="inserted"><ins><em>&ldquo;owner&rdquo; 
switches</em></ins></span> it <span class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>these
+    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
+    security for your home. Security</em></ins></span> means <span 
class="removed"><del><strong>it demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    to <span class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2193,9 +2199,8 @@
   &lt;li id="M201711244"&gt;
     &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
     <span class="inserted"><ins><em>into one.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2207,131 +2212,118 @@
   &lt;/li&gt;
 
   &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of</strong></del></span>
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>control app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>vibrator minute</em></ins></span> by <span 
class="removed"><del><strong>malware. The other
-      cases mentioned are done</strong></del></span>
-    <span class="inserted"><ins><em>minute (thus, indirectly, whether it was 
surrounded</em></ins></span> by <span class="removed"><del><strong>proprietary 
malware in</strong></del></span> <span class="inserted"><ins><em>a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have 
checked</em></ins></span>
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
+    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>users could 
have checked</em></ins></span>
     and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
+    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but</em></ins></span> it <span class="removed"><del><strong>to 
get</strong></del></span> <span class="inserted"><ins><em>doesn't really 
matter. If it had sold</em></ins></span> the data
-      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>to a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>state can 
store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
+    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems,</strong></del></span>
+    <span class="inserted"><ins><em>true,</em></ins></span> but <span 
class="inserted"><ins><em>it doesn't really matter. If it had 
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>data to a data
+    broker,</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>figure out who the
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>spy on their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>pay</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="inserted"><ins><em>has been ordered to pay a 
total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
     &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access the data&lt;/a&gt; collected by the
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>FBI could listen to 
these
-    conversations</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy</em></ins></span> on <span class="removed"><del><strong>them, 
and not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>children</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if the 
image</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>coming from the user's own
-    computer, the TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2342,8 +2334,24 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of a <span 
class="inserted"><ins><em>printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a way to
+    &lt;p&gt;Crackers found a</em></ins></span> way to
     <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
     these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
   &lt;/li&gt;
@@ -3011,7 +3019,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary-surveillance.it.po      24 Feb 2019 14:00:05 -0000      1.276
+++ proprietary-surveillance.it.po      28 Feb 2019 09:00:39 -0000      1.277
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3620,6 +3620,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-surveillance.ja-diff.html       25 Feb 2019 10:31:07 -0000      
1.125
+++ proprietary-surveillance.ja-diff.html       28 Feb 2019 09:00:39 -0000      
1.126
@@ -1244,7 +1244,17 @@
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>save
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>save
     a recording. But I can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
@@ -1252,39 +1262,76 @@
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop
+    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the apps were
     found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
+    source code</em></ins></span> they <span class="removed"><del><strong>pass 
it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The other apps might be 
snooping</em></ins></span>
+    in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201804020"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>other but not to the server's 
database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    spy</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -1292,7 +1339,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
@@ -1787,7 +1840,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
@@ -1845,32 +1898,18 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>what
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the</em></ins></span> 
US <span class="removed"><del><strong>Companies, NSA To Route Around Domestic 
Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>or some
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -1880,9 +1919,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -1890,7 +1932,7 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect</em></ins></span> this 
<span class="removed"><del><strong>way, because they pass</strong></del></span> 
<span class="inserted"><ins><em>has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
@@ -1914,184 +1956,147 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a</em></ins></span> 
&ldquo;smart&rdquo; <span class="removed"><del><strong>device means the 
manufacturer is using it</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;
+    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    send</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>video</em></ins></span> they <span 
class="removed"><del><strong>report even</strong></del></span> <span 
class="inserted"><ins><em>capture to Amazon 
servers&lt;/a&gt;,</em></ins></span> which <span 
class="removed"><del><strong>page</strong></del></span> <span 
class="inserted"><ins><em>save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>video 
shows everyone that comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used
+      <span class="removed"><del><strong>by most US 
libraries,</strong></del></span> <span class="inserted"><ins><em>to let 
individual employees look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
-    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>look at 
what's in the videos. That's not
+    security for your home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;</em></ins></span>
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow</em></ins></span> anyone <span 
class="removed"><del><strong>&lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
<span class="removed"><del><strong>it to outsmart
-      you.&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> through <span 
class="removed"><del><strong>the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,</em></ins></span>
+    even <span class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the &ldquo;owner&rdquo; 
switches</em></ins></span> it <span class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if no one connects</strong></del></span>
+    to <span class="inserted"><ins><em>outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through</strong></del></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>code could surely convert</em></ins></span> it 
<span class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span>
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
     <span class="inserted"><ins><em>into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span class="removed"><del><strong>car 
is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>users 
through</em></ins></span> the <span class="removed"><del><strong>phone company 
to track</strong></del></span> <span class="inserted"><ins><em>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
-    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>temperature of</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by 
a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
@@ -2099,161 +2104,178 @@
     and
       <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>company that made the vibrator &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>personal information 
about how people
+    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
+    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems,</strong></del></span>
+    <span class="inserted"><ins><em>true,</em></ins></span> but <span 
class="inserted"><ins><em>it doesn't really matter. If it had 
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>data to a data
+    broker,</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>article, is not
-      really</strong></del></span> <span class="inserted"><ins><em>lawsuit, 
&lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>total</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be 
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m&lt;/a&gt; 
to its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="inserted"><ins><em>has been ordered to pay a 
total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span class="removed"><del><strong>proprietary 
malware in</strong></del></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
-    company <span class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
 
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>break the security of 
an Amazon device,
-    and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
   
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span>
 
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>tracking, the TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
+&lt;/ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
+    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
+    specific cases, it spies</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
+    restrictions in the use of a printer</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles</strong></del></span>
-    <span class="inserted"><ins><em>sending usage data back 
over</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break the security of an Amazon device,
+    and &lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
+    turn <span class="removed"><del><strong>this off, but 
having</strong></del></span> it <span class="removed"><del><strong>enabled by 
default
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>into a 
listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
       advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all users to
       new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>its 
user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
     listen</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>everyone in the house, all the 
time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
@@ -2823,7 +2845,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary-surveillance.ja.po      24 Feb 2019 14:00:05 -0000      1.249
+++ proprietary-surveillance.ja.po      28 Feb 2019 09:00:39 -0000      1.250
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3046,6 +3046,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-surveillance.pot        24 Feb 2019 14:00:05 -0000      1.197
+++ proprietary-surveillance.pot        28 Feb 2019 09:00:39 -0000      1.198
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2193,6 +2193,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a "
 "href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it "
 "into a listening device</a> for them."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.477
retrieving revision 1.478
diff -u -b -r1.477 -r1.478
--- proprietary-surveillance.ru.po      25 Feb 2019 10:00:30 -0000      1.477
+++ proprietary-surveillance.ru.po      28 Feb 2019 09:00:39 -0000      1.478
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3161,6 +3162,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary.de-diff.html    23 Feb 2019 12:00:35 -0000      1.51
+++ proprietary.de-diff.html    28 Feb 2019 09:00:39 -0000      1.52
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,17 +125,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -250,12 +264,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.de.po   23 Feb 2019 12:00:35 -0000      1.93
+++ proprietary.de.po   28 Feb 2019 09:00:39 -0000      1.94
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -512,13 +527,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.es.po   25 Feb 2019 10:10:20 -0000      1.106
+++ proprietary.es.po   28 Feb 2019 09:00:39 -0000      1.107
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-25 11:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -431,17 +447,6 @@
 "las aplicaciones que no son libres entrañan un riesgo potencial, ya que no "
 "es fácil saber qué hacen realmente."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Multitud de aplicaciones no libres cuentan con una funcionalidad de "
-"vigilancia que permite <a href=\"https://techcrunch.com/2019/02/06/iphone-";
-"session-replay-screenshots/\">registrar todas las acciones del usuario</a> "
-"en su interacción con la aplicación."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -521,6 +526,16 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Multitud de aplicaciones no libres cuentan con una funcionalidad de "
+#~ "vigilancia que permite <a href=\"https://techcrunch.com/2019/02/06/iphone-";
+#~ "session-replay-screenshots/\">registrar todas las acciones del usuario</"
+#~ "a> en su interacción con la aplicación."
+
+#~ msgid ""
 #~ "An investigation of the 150 most popular gratis VPN apps in Google Play "
 #~ "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 #~ "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. 
"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.fr.po   23 Feb 2019 20:08:22 -0000      1.130
+++ proprietary.fr.po   28 Feb 2019 09:00:39 -0000      1.131
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-23 20:39+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -428,17 +444,6 @@
 "risque potentiel parce qu'on ne peut pas vérifier facilement ce qu'elles "
 "font en réalité."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"De nombreuses applis non libres ont une fonctionnalité de surveillance qui "
-"<a href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-";
-"screenshots/\">enregistre toutes les actions de l'utilisateur</a> pendant "
-"qu'il interagit avec l'appli."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,3 +517,13 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "De nombreuses applis non libres ont une fonctionnalité de surveillance "
+#~ "qui <a href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-";
+#~ "screenshots/\">enregistre toutes les actions de l'utilisateur</a> pendant "
+#~ "qu'il interagit avec l'appli."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.it-diff.html    23 Feb 2019 12:00:35 -0000      1.63
+++ proprietary.it-diff.html    28 Feb 2019 09:00:39 -0000      1.64
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -249,12 +263,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +323,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.it.po   23 Feb 2019 12:00:35 -0000      1.102
+++ proprietary.it.po   28 Feb 2019 09:00:39 -0000      1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -516,13 +531,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.ja-diff.html    23 Feb 2019 12:00:35 -0000      1.64
+++ proprietary.ja-diff.html    28 Feb 2019 09:00:39 -0000      1.65
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -181,6 +181,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -246,12 +260,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -312,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.ja.po   23 Feb 2019 12:00:35 -0000      1.85
+++ proprietary.ja.po   28 Feb 2019 09:00:39 -0000      1.86
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -436,13 +451,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.nl-diff.html    23 Feb 2019 12:00:35 -0000      1.63
+++ proprietary.nl-diff.html    28 Feb 2019 09:00:39 -0000      1.64
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -249,12 +263,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +323,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.nl.po   23 Feb 2019 12:00:35 -0000      1.74
+++ proprietary.nl.po   28 Feb 2019 09:00:39 -0000      1.75
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -509,13 +524,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary.pl-diff.html    23 Feb 2019 12:00:35 -0000      1.81
+++ proprietary.pl-diff.html    28 Feb 2019 09:00:39 -0000      1.82
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -129,15 +129,15 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -182,6 +182,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -247,12 +261,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -313,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.pl.po   23 Feb 2019 12:00:35 -0000      1.69
+++ proprietary.pl.po   28 Feb 2019 09:00:39 -0000      1.70
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -591,13 +606,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.pot     23 Feb 2019 12:00:36 -0000      1.66
+++ proprietary.pot     28 Feb 2019 09:00:39 -0000      1.67
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a "
 
"href=\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds\";>
 "
 "designed to be addictive</a>, much like on-line games. They achieve this "
@@ -323,13 +338,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a "
-"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";>
 "
-"recording all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.pt-br.po        24 Feb 2019 21:01:08 -0000      1.95
+++ proprietary.pt-br.po        28 Feb 2019 09:00:39 -0000      1.96
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-02-24 15:49-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -421,16 +437,6 @@
 "potencial, porque não há uma maneira fácil de saber o que eles realmente "
 "fazem."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Muitos aplicativos não livres têm um recurso de vigilância para <a href="
-"\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> "
-"gravar todas as ações dos usuários</a> na interação com o aplicativo"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +512,15 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Muitos aplicativos não livres têm um recurso de vigilância para <a 
href="
+#~ "\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> "
+#~ "gravar todas as ações dos usuários</a> na interação com o aplicativo"
+
+#~ msgid ""
 #~ "An investigation of the 150 most popular gratis VPN apps in Google Play "
 #~ "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
 #~ "index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. 
"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.ru.po   25 Feb 2019 10:00:30 -0000      1.162
+++ proprietary.ru.po   28 Feb 2019 09:00:39 -0000      1.163
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -429,16 +445,6 @@
 "риском, потому что нет простого способа 
узнать, что они в действительности "
 "делают."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Во многих несвободных приложениях есть <a 
href=\"https://techcrunch.";
-"com/2019/02/06/iphone-session-replay-screenshots/\"> запись всех 
действий "
-"пользователей</a> при работе с приложением."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -518,6 +524,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Во многих несвободных приложениях есть 
<a href=\"https://techcrunch.";
+#~ "com/2019/02/06/iphone-session-replay-screenshots/\"> запись всех 
действий "
+#~ "пользователей</a> при работе с 
приложением."
+
+#~ msgid ""
 #~ "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 #~ "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"
 #~ "\">degrade the performance of older phones to force users to buy their "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary.zh-tw-diff.html 23 Feb 2019 12:00:36 -0000      1.41
+++ proprietary.zh-tw-diff.html 28 Feb 2019 09:00:39 -0000      1.42
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,17 +125,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,20 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of a printer that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902220"&gt;
     &lt;p&gt;On-line gambling services (and their nonfree
     client programs) are &lt;a
@@ -250,12 +264,6 @@
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/23 12:00:36 $
+$Date: 2019/02/28 09:00:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary.zh-tw.po        23 Feb 2019 12:00:36 -0000      1.52
+++ proprietary.zh-tw.po        28 Feb 2019 09:00:39 -0000      1.53
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "On-line gambling services (and their nonfree client programs) are <a href="
 "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -425,13 +440,6 @@
 "what they really do."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://";
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- pt-br.po    25 Feb 2019 10:31:07 -0000      1.50
+++ pt-br.po    28 Feb 2019 09:00:39 -0000      1.51
@@ -1251,6 +1251,21 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- ru.po       25 Feb 2019 10:31:07 -0000      1.82
+++ ru.po       28 Feb 2019 09:00:40 -0000      1.83
@@ -1677,6 +1677,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- zh-tw.po    25 Feb 2019 10:31:07 -0000      1.36
+++ zh-tw.po    28 Feb 2019 09:00:40 -0000      1.37
@@ -1248,6 +1248,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
+"&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
 "video they capture to Amazon servers</a>, which save it long-term."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]